WorldWideScience

Sample records for reveal key differences

  1. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  2. Same pattern, different mechanism: Locking onto the role of key species in seafloor ecosystem process.

    Science.gov (United States)

    Woodin, Sarah Ann; Volkenborn, Nils; Pilditch, Conrad A; Lohrer, Andrew M; Wethey, David S; Hewitt, Judi E; Thrush, Simon F

    2016-05-27

    Seafloor biodiversity is a key mediator of ecosystem functioning, but its role is often excluded from global budgets or simplified to black boxes in models. New techniques allow quantification of the behavior of animals living below the sediment surface and assessment of the ecosystem consequences of complex interactions, yielding a better understanding of the role of seafloor animals in affecting key processes like primary productivity. Combining predictions based on natural history, behavior of key benthic species and environmental context allow assessment of differences in functioning and process, even when the measured ecosystem property in different systems is similar. Data from three sedimentary systems in New Zealand illustrate this. Analysis of the behaviors of the infaunal ecosystem engineers in each system revealed three very different mechanisms driving ecosystem function: density and excretion, sediment turnover and surface rugosity, and hydraulic activities and porewater bioadvection. Integrative metrics of ecosystem function in some cases differentiate among the systems (gross primary production) and in others do not (photosynthetic efficiency). Analyses based on behaviors and activities revealed important ecosystem functional differences and can dramatically improve our ability to model the impact of stressors on ecosystem and global processes.

  3. Transcriptome analysis reveals key differentially expressed genes involved in wheat grain development

    Directory of Open Access Journals (Sweden)

    Yonglong Yu

    2016-04-01

    Full Text Available Wheat seed development is an important physiological process of seed maturation and directly affects wheat yield and quality. In this study, we performed dynamic transcriptome microarray analysis of an elite Chinese bread wheat cultivar (Jimai 20 during grain development using the GeneChip Wheat Genome Array. Grain morphology and scanning electron microscope observations showed that the period of 11–15 days post-anthesis (DPA was a key stage for the synthesis and accumulation of seed starch. Genome-wide transcriptional profiling and significance analysis of microarrays revealed that the period from 11 to 15 DPA was more important than the 15–20 DPA stage for the synthesis and accumulation of nutritive reserves. Series test of cluster analysis of differential genes revealed five statistically significant gene expression profiles. Gene ontology annotation and enrichment analysis gave further information about differentially expressed genes, and MapMan analysis revealed expression changes within functional groups during seed development. Metabolic pathway network analysis showed that major and minor metabolic pathways regulate one another to ensure regular seed development and nutritive reserve accumulation. We performed gene co-expression network analysis to identify genes that play vital roles in seed development and identified several key genes involved in important metabolic pathways. The transcriptional expression of eight key genes involved in starch and protein synthesis and stress defense was further validated by qRT-PCR. Our results provide new insight into the molecular mechanisms of wheat seed development and the determinants of yield and quality.

  4. Systematic Prioritization and Integrative Analysis of Copy Number Variations in Schizophrenia Reveal Key Schizophrenia Susceptibility Genes

    Science.gov (United States)

    Luo, Xiongjian; Huang, Liang; Han, Leng; Luo, Zhenwu; Hu, Fang; Tieu, Roger; Gan, Lin

    2014-01-01

    Schizophrenia is a common mental disorder with high heritability and strong genetic heterogeneity. Common disease-common variants hypothesis predicts that schizophrenia is attributable in part to common genetic variants. However, recent studies have clearly demonstrated that copy number variations (CNVs) also play pivotal roles in schizophrenia susceptibility and explain a proportion of missing heritability. Though numerous CNVs have been identified, many of the regions affected by CNVs show poor overlapping among different studies, and it is not known whether the genes disrupted by CNVs contribute to the risk of schizophrenia. By using cumulative scoring, we systematically prioritized the genes affected by CNVs in schizophrenia. We identified 8 top genes that are frequently disrupted by CNVs, including NRXN1, CHRNA7, BCL9, CYFIP1, GJA8, NDE1, SNAP29, and GJA5. Integration of genes affected by CNVs with known schizophrenia susceptibility genes (from previous genetic linkage and association studies) reveals that many genes disrupted by CNVs are also associated with schizophrenia. Further protein-protein interaction (PPI) analysis indicates that protein products of genes affected by CNVs frequently interact with known schizophrenia-associated proteins. Finally, systematic integration of CNVs prioritization data with genetic association and PPI data identifies key schizophrenia candidate genes. Our results provide a global overview of genes impacted by CNVs in schizophrenia and reveal a densely interconnected molecular network of de novo CNVs in schizophrenia. Though the prioritized top genes represent promising schizophrenia risk genes, further work with different prioritization methods and independent samples is needed to confirm these findings. Nevertheless, the identified key candidate genes may have important roles in the pathogenesis of schizophrenia, and further functional characterization of these genes may provide pivotal targets for future therapeutics and

  5. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  6. Novel key metabolites reveal further branching of the roquefortine/meleagrin biosynthetic pathway.

    Science.gov (United States)

    Ries, Marco I; Ali, Hazrat; Lankhorst, Peter P; Hankemeier, Thomas; Bovenberg, Roel A L; Driessen, Arnold J M; Vreeken, Rob J

    2013-12-27

    Metabolic profiling and structural elucidation of novel secondary metabolites obtained from derived deletion strains of the filamentous fungus Penicillium chrysogenum were used to reassign various previously ascribed synthetase genes of the roquefortine/meleagrin pathway to their corresponding products. Next to the structural characterization of roquefortine F and neoxaline, which are for the first time reported for P. chrysogenum, we identified the novel metabolite roquefortine L, including its degradation products, harboring remarkable chemical structures. Their biosynthesis is discussed, questioning the exclusive role of glandicoline A as key intermediate in the pathway. The results reveal that further enzymes of this pathway are rather unspecific and catalyze more than one reaction, leading to excessive branching in the pathway with meleagrin and neoxaline as end products of two branches.

  7. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  8. Kinds of access: Different methods for report reveal different kinds of metacognitive access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  9. Interrogating Key Positions of Size-Reduced TALE Repeats Reveals a Programmable Sensor of 5-Carboxylcytosine.

    Science.gov (United States)

    Maurer, Sara; Giess, Mario; Koch, Oliver; Summerer, Daniel

    2016-12-16

    Transcription-activator-like effector (TALE) proteins consist of concatenated repeats that recognize consecutive canonical nucleobases of DNA via the major groove in a programmable fashion. Since this groove displays unique chemical information for the four human epigenetic cytosine nucleobases, TALE repeats with epigenetic selectivity can be engineered, with potential to establish receptors for the programmable decoding of all human nucleobases. TALE repeats recognize nucleobases via key amino acids in a structurally conserved loop whose backbone is positioned very close to the cytosine 5-carbon. This complicates the engineering of selectivities for large 5-substituents. To interrogate a more promising structural space, we engineered size-reduced repeat loops, performed saturation mutagenesis of key positions, and screened a total of 200 repeat-nucleobase interactions for new selectivities. This provided insight into the structural requirements of TALE repeats for affinity and selectivity, revealed repeats with improved or relaxed selectivity, and resulted in the first selective sensor of 5-carboxylcytosine.

  10. Meiosis: An Overview of Key Differences from Mitosis

    Science.gov (United States)

    Ohkura, Hiroyuki

    2015-01-01

    Meiosis is the specialized cell division that generates gametes. In contrast to mitosis, molecular mechanisms and regulation of meiosis are much less understood. Meiosis shares mechanisms and regulation with mitosis in many aspects, but also has critical differences from mitosis. This review highlights these differences between meiosis and mitosis. Recent studies using various model systems revealed differences in a surprisingly wide range of aspects, including cell-cycle regulation, recombination, postrecombination events, spindle assembly, chromosome–spindle interaction, and chromosome segregation. Although a great degree of diversity can be found among organisms, meiosis-specific processes, and regulation are generally conserved. PMID:25605710

  11. Metatranscriptomics reveal differences in in situ energy and nitrogen metabolism among hydrothermal vent snail symbionts.

    Science.gov (United States)

    Sanders, J G; Beinart, R A; Stewart, F J; Delong, E F; Girguis, P R

    2013-08-01

    Despite the ubiquity of chemoautotrophic symbioses at hydrothermal vents, our understanding of the influence of environmental chemistry on symbiont metabolism is limited. Transcriptomic analyses are useful for linking physiological poise to environmental conditions, but recovering samples from the deep sea is challenging, as the long recovery times can change expression profiles before preservation. Here, we present a novel, in situ RNA sampling and preservation device, which we used to compare the symbiont metatranscriptomes associated with Alviniconcha, a genus of vent snail, in which specific host-symbiont combinations are predictably distributed across a regional geochemical gradient. Metatranscriptomes of these symbionts reveal key differences in energy and nitrogen metabolism relating to both environmental chemistry (that is, the relative expression of genes) and symbiont phylogeny (that is, the specific pathways employed). Unexpectedly, dramatic differences in expression of transposases and flagellar genes suggest that different symbiont types may also have distinct life histories. These data further our understanding of these symbionts' metabolic capabilities and their expression in situ, and suggest an important role for symbionts in mediating their hosts' interaction with regional-scale differences in geochemistry.

  12. Metabolomic Analyses of Leishmania Reveal Multiple Species Differences and Large Differences in Amino Acid Metabolism.

    Directory of Open Access Journals (Sweden)

    Gareth D Westrop

    Full Text Available Comparative genomic analyses of Leishmania species have revealed relatively minor heterogeneity amongst recognised housekeeping genes and yet the species cause distinct infections and pathogenesis in their mammalian hosts. To gain greater information on the biochemical variation between species, and insights into possible metabolic mechanisms underpinning visceral and cutaneous leishmaniasis, we have undertaken in this study a comparative analysis of the metabolomes of promastigotes of L. donovani, L. major and L. mexicana. The analysis revealed 64 metabolites with confirmed identity differing 3-fold or more between the cell extracts of species, with 161 putatively identified metabolites differing similarly. Analysis of the media from cultures revealed an at least 3-fold difference in use or excretion of 43 metabolites of confirmed identity and 87 putatively identified metabolites that differed to a similar extent. Strikingly large differences were detected in their extent of amino acid use and metabolism, especially for tryptophan, aspartate, arginine and proline. Major pathways of tryptophan and arginine catabolism were shown to be to indole-3-lactate and arginic acid, respectively, which were excreted. The data presented provide clear evidence on the value of global metabolomic analyses in detecting species-specific metabolic features, thus application of this technology should be a major contributor to gaining greater understanding of how pathogens are adapted to infecting their hosts.

  13. Kinds of access: different methods for report reveal different kinds of metacognitive access

    Science.gov (United States)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the reports typically consist of some variety of ratings of confidence or direct descriptions of one's own experiences. Whereas different methods of reporting are typically used interchangeably, recent experiments indicate that different results are obtained with different kinds of reporting. We argue that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about the classification process. PMID:22492747

  14. Quantitative proteomics reveals that peroxidases play key roles in post-flooding recovery in soybean roots.

    Science.gov (United States)

    Khan, Mudassar Nawaz; Sakata, Katsumi; Hiraga, Susumu; Komatsu, Setsuko

    2014-12-05

    Soybean is an important legume crop that exhibits markedly reduced growth and yields under flooding conditions. To unravel the mechanisms involved in recovery after flooding in soybean root, gel-free proteomic analysis was performed. Morphological analysis revealed that growth suppression was more severe with increased flooding duration. Out of a total of 1645 and 1707 identified proteins, 73 and 21 proteins were changed significantly during the recovery stage following 2 and 4 days flooding, respectively. Based on the proteomic, clustering, and in silico protein-protein interaction analyses, six key enzymes were analyzed at the mRNA level. Lipoxygenase 1, which was increased at the protein level during the recovery period, was steadily down-regulated at the mRNA level. The peroxidase superfamily protein continuously increased in abundance during the course of recovery and was up-regulated at the mRNA level. HAD acid phosphatase was decreased at the protein level and down-regulated at the transcript level, while isoflavone reductase and an unknown protein were increased at both the protein and mRNA levels. Consistent with these findings, the enzymatic activity of peroxidase was decreased under flooding stress but increased significantly during the recovery sage. These results suggest that peroxidases might play key roles in post-flooding recovery in soybean roots through the scavenging of toxic radicals.

  15. Keys to the success of the CB Conquero

    Directory of Open Access Journals (Sweden)

    C. Fernández-Espínola

    2016-12-01

    Full Text Available When a team gets sport successes to level profesional, generates the topics that will be investigated such as the key factors of the succes. The main aim of this study is to analyze the influencie of different factors like the sports context, the social context and training aspects in the success of the Club Baloncesto Conquero through direct perception of thirteen informants associated with the team and the basketball in Huelva. An interview was carried out, related with those factors and the keys to success. The results revealed that workforce planning along the great work of coaching staff, medical staff and physical trainer have been key to the team gets sport successes.

  16. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    International Nuclear Information System (INIS)

    Gaidash, A A; Egorov, V I; Gleim, A V

    2016-01-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols. (paper)

  17. Revealing the Differences Between Free and Complexed Enzyme Mechanisms and Factors Contributing to Cell Wall Recalcitrance

    Energy Technology Data Exchange (ETDEWEB)

    Resch, Michael G.; Donohoe, Byron; Ciesielski, Peter; Nill, Jennifer; McKinney, Kellene; Mittal, Ashutosh; Katahira, Rui; Himmel, Michael; Biddy, Mary; Beckham, Gregg; Decker, Steve

    2014-09-08

    Enzymatic depolymerization of polysaccharides is a key step in the production of fuels and chemicals from lignocellulosic biomass, and discovery of synergistic biomass-degrading enzyme paradigms will enable improved conversion processes. Historically, revealing insights into enzymatic saccharification mechanisms on plant cell walls has been hindered by uncharacterized substrates and low resolution.

  18. Striking Plasticity of CRISPR-Cas9 and Key Role of Non-target DNA, as Revealed by Molecular Simulations.

    Science.gov (United States)

    Palermo, Giulia; Miao, Yinglong; Walker, Ross C; Jinek, Martin; McCammon, J Andrew

    2016-10-26

    The CRISPR (clustered regularly interspaced short palindromic repeats)-Cas9 system recently emerged as a transformative genome-editing technology that is innovating basic bioscience and applied medicine and biotechnology. The endonuclease Cas9 associates with a guide RNA to match and cleave complementary sequences in double stranded DNA, forming an RNA:DNA hybrid and a displaced non-target DNA strand. Although extensive structural studies are ongoing, the conformational dynamics of Cas9 and its interplay with the nucleic acids during association and DNA cleavage are largely unclear. Here, by employing multi-microsecond time scale molecular dynamics, we reveal the conformational plasticity of Cas9 and identify key determinants that allow its large-scale conformational changes during nucleic acid binding and processing. We show how the "closure" of the protein, which accompanies nucleic acid binding, fundamentally relies on highly coupled and specific motions of the protein domains, collectively initiating the prominent conformational changes needed for nucleic acid association. We further reveal a key role of the non-target DNA during the process of activation of the nuclease HNH domain, showing how the nontarget DNA positioning triggers local conformational changes that favor the formation of a catalytically competent Cas9. Finally, a remarkable conformational plasticity is identified as an intrinsic property of the HNH domain, constituting a necessary element that allows for the HNH repositioning. These novel findings constitute a reference for future experimental studies aimed at a full characterization of the dynamic features of the CRISPR-Cas9 system, and-more importantly-call for novel structure engineering efforts that are of fundamental importance for the rational design of new genome-engineering applications.

  19. Bilingualism at the core of the brain. Structural differences between bilinguals and monolinguals revealed by subcortical shape analysis.

    Science.gov (United States)

    Burgaleta, Miguel; Sanjuán, Ana; Ventura-Campos, Noelia; Sebastian-Galles, Núria; Ávila, César

    2016-01-15

    Naturally acquiring a language shapes the human brain through a long-lasting learning and practice process. This is supported by previous studies showing that managing more than one language from early childhood has an impact on brain structure and function. However, to what extent bilingual individuals present neuroanatomical peculiarities at the subcortical level with respect to monolinguals is yet not well understood, despite the key role of subcortical gray matter for a number of language functions, including monitoring of speech production and language control - two processes especially solicited by bilinguals. Here we addressed this issue by performing a subcortical surface-based analysis in a sample of monolinguals and simultaneous bilinguals (N=88) that only differed in their language experience from birth. This analysis allowed us to study with great anatomical precision the potential differences in morphology of key subcortical structures, namely, the caudate, accumbens, putamen, globus pallidus and thalamus. Vertexwise analyses revealed significantly expanded subcortical structures for bilinguals compared to monolinguals, localized in bilateral putamen and thalamus, as well as in the left globus pallidus and right caudate nucleus. A topographical interpretation of our results suggests that a more complex phonological system in bilinguals may lead to a greater development of a subcortical brain network involved in monitoring articulatory processes. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  1. The key microorganisms for anaerobic degradation of pentachlorophenol in paddy soil as revealed by stable isotope probing

    Energy Technology Data Exchange (ETDEWEB)

    Tong, Hui [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China); Guangzhou Institute of Geochemistry, Chinese Academy of Sciences, Guangzhou 510640 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Liu, Chengshuai [State Key Laboratory of Environmental Geochemistry, Institute of Geochemistry, Chinese Academy of Sciences, Guiyang 550009 (China); Li, Fangbai, E-mail: cefbli@soil.gd.cn [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China); Luo, Chunling [Guangzhou Institute of Geochemistry, Chinese Academy of Sciences, Guangzhou 510640 (China); Chen, Manjia; Hu, Min [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China)

    2015-11-15

    Highlights: • SIP suggested that Dechloromonas can mineralize PCP in soil. • Methanosaeta and Methanocella acquired PCP-derived carbon. • Lactate enhanced microbial degradation of PCP in soil. - Abstract: Pentachlorophenol (PCP) is a common residual persistent pesticide in paddy soil and has resulted in harmful effect on soil ecosystem. The anaerobic microbial transformation of PCP, therefore, has been received much attentions, especially the functional microbial communities for the reductive transformation. However, the key functional microorganisms for PCP mineralization in the paddy soil still remain unknown. In this work, DNA-based stable isotope probing (SIP) was applied to explore the key microorganisms responsible for PCP mineralization in paddy soil. The SIP results indicated that the dominant bacteria responsible for PCP biodegradation belonged to the genus Dechloromonas of the class β-Proteobacteria. In addition, the increased production of {sup 13}CH{sub 4} and {sup 13}CO{sub 2} indicated that the addition of lactate enhanced the rate of biodegradation and mineralization of PCP. Two archaea classified as the genera of Methanosaeta and Methanocella of class Methanobacteria were enriched in the heavy fraction when with lactate, whereas no archaea was detected in the absence of lactate. These findings provide direct evidence for the species of bacteria and archaea responsible for anaerobic PCP or its breakdown products mineralization and reveal a new insight into the microorganisms linked with PCP degradation in paddy soil.

  2. The key microorganisms for anaerobic degradation of pentachlorophenol in paddy soil as revealed by stable isotope probing

    International Nuclear Information System (INIS)

    Tong, Hui; Liu, Chengshuai; Li, Fangbai; Luo, Chunling; Chen, Manjia; Hu, Min

    2015-01-01

    Highlights: • SIP suggested that Dechloromonas can mineralize PCP in soil. • Methanosaeta and Methanocella acquired PCP-derived carbon. • Lactate enhanced microbial degradation of PCP in soil. - Abstract: Pentachlorophenol (PCP) is a common residual persistent pesticide in paddy soil and has resulted in harmful effect on soil ecosystem. The anaerobic microbial transformation of PCP, therefore, has been received much attentions, especially the functional microbial communities for the reductive transformation. However, the key functional microorganisms for PCP mineralization in the paddy soil still remain unknown. In this work, DNA-based stable isotope probing (SIP) was applied to explore the key microorganisms responsible for PCP mineralization in paddy soil. The SIP results indicated that the dominant bacteria responsible for PCP biodegradation belonged to the genus Dechloromonas of the class β-Proteobacteria. In addition, the increased production of 13 CH 4 and 13 CO 2 indicated that the addition of lactate enhanced the rate of biodegradation and mineralization of PCP. Two archaea classified as the genera of Methanosaeta and Methanocella of class Methanobacteria were enriched in the heavy fraction when with lactate, whereas no archaea was detected in the absence of lactate. These findings provide direct evidence for the species of bacteria and archaea responsible for anaerobic PCP or its breakdown products mineralization and reveal a new insight into the microorganisms linked with PCP degradation in paddy soil

  3. Study on the Key Indexes of Carambola Quality Safety under Logistics Environment of Different Temperature

    OpenAIRE

    Lei Wang; Ruhe Xie; Yifeng Zou

    2015-01-01

    By using layered factor analysis method, the key indexes of quality safety of Carambola are determined. The whole logistics process from picking, storing, transportation to selling is simulated in the experiment. At the same time, the key indexes are detected and analyzed under different temperature in logistics environment. The results indicate that both temperature and package have certain effect on the quality of Carambola. As shown in the study, the following conclusions are made. The tem...

  4. Data integration reveals key homeostatic mechanisms following low dose radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    Tilton, Susan C.; Matzke, Melissa M. [Computational Biology and Bioinformatics, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Sowa, Marianne B.; Stenoien, David L.; Weber, Thomas J. [Health Impacts and Exposure Science, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Morgan, William F. [Biological Sciences Division, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Waters, Katrina M., E-mail: katrina.waters@pnnl.gov [Biological Sciences Division, Pacific Northwest National Laboratory, Richland, WA 99338 (United States)

    2015-05-15

    The goal of this study was to define pathways regulated by low dose radiation to understand how biological systems respond to subtle perturbations in their environment and prioritize pathways for human health assessment. Using an in vitro 3-D human full thickness skin model, we have examined the temporal response of dermal and epidermal layers to 10 cGy X-ray using transcriptomic, proteomic, phosphoproteomic and metabolomic platforms. Bioinformatics analysis of each dataset independently revealed potential signaling mechanisms affected by low dose radiation, and integrating data shed additional insight into the mechanisms regulating low dose responses in human tissue. We examined direct interactions among datasets (top down approach) and defined several hubs as significant regulators, including transcription factors (YY1, MYC and CREB1), kinases (CDK2, PLK1) and a protease (MMP2). These data indicate a shift in response across time — with an increase in DNA repair, tissue remodeling and repression of cell proliferation acutely (24–72 h). Pathway-based integration (bottom up approach) identified common molecular and pathway responses to low dose radiation, including oxidative stress, nitric oxide signaling and transcriptional regulation through the SP1 factor that would not have been identified by the individual data sets. Significant regulation of key downstream metabolites of nitrative stress was measured within these pathways. Among the features identified in our study, the regulation of MMP2 and SP1 was experimentally validated. Our results demonstrate the advantage of data integration to broadly define the pathways and networks that represent the mechanisms by which complex biological systems respond to perturbation. - Highlights: • Low dose ionizing radiation altered homeostasis in 3D skin tissue model. • Global gene/protein/metabolite data integrated using complementary statistical approaches • Time and location-specific change in matrix regulation

  5. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  6. Integrated bioinformatics analysis reveals key candidate genes and pathways in breast cancer.

    Science.gov (United States)

    Wang, Yuzhi; Zhang, Yi; Huang, Qian; Li, Chengwen

    2018-04-19

    Breast cancer (BC) is the leading malignancy in women worldwide, yet relatively little is known about the genes and signaling pathways involved in BC tumorigenesis and progression. The present study aimed to elucidate potential key candidate genes and pathways in BC. Five gene expression profile data sets (GSE22035, GSE3744, GSE5764, GSE21422 and GSE26910) were downloaded from the Gene Expression Omnibus (GEO) database, which included data from 113 tumorous and 38 adjacent non‑tumorous tissue samples. Differentially expressed genes (DEGs) were identified using t‑tests in the limma R package. These DEGs were subsequently investigated by pathway enrichment analysis and a protein‑protein interaction (PPI) network was constructed. The most significant module from the PPI network was selected for pathway enrichment analysis. In total, 227 DEGs were identified, of which 82 were upregulated and 145 were downregulated. Pathway enrichment analysis results revealed that the upregulated DEGs were mainly enriched in 'cell division', the 'proteinaceous extracellular matrix (ECM)', 'ECM structural constituents' and 'ECM‑receptor interaction', whereas downregulated genes were mainly enriched in 'response to drugs', 'extracellular space', 'transcriptional activator activity' and the 'peroxisome proliferator‑activated receptor signaling pathway'. The PPI network contained 174 nodes and 1,257 edges. DNA topoisomerase 2‑a, baculoviral inhibitor of apoptosis repeat‑containing protein 5, cyclin‑dependent kinase 1, G2/mitotic‑specific cyclin‑B1 and kinetochore protein NDC80 homolog were identified as the top 5 hub genes. Furthermore, the genes in the most significant module were predominantly involved in 'mitotic nuclear division', 'mid‑body', 'protein binding' and 'cell cycle'. In conclusion, the DEGs, relative pathways and hub genes identified in the present study may aid in understanding of the molecular mechanisms underlying BC progression and provide

  7. Identification of the key factors for success in the hotel sector

    Directory of Open Access Journals (Sweden)

    Fernando Campa-Planas

    2018-02-01

    Design/methodology: A review of the literature has been carried out, which has provided references related to the hotel sector and different factors that impact it. The knowledge provided by the scientific community through the articles and texts consulted are reflected in this document and allow us to determine the existence of the key factors for success.  Contributions/results: Considering the importance of the hotel sector in the Spanish economy, this study identifies the key factors in the different hotel establishments. However, the materialization of these factors provides and shows us which financial aspects, management systems and other more global aspects, such as longevity or location, enable the company to be successful in the hotel sector.  Originality/value: Based on the literature reviewed, a list of key factors for success in the hotel sector was composed. This also revealed a lack of similar studies on this topic.

  8. An application of different dioids in public key cryptography

    International Nuclear Information System (INIS)

    Durcheva, Mariana I.

    2014-01-01

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented

  9. An application of different dioids in public key cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com [Technical University of Sofia, Faculty of Applied Mathematics and Informatics, 8 Kliment Ohridski St., Sofia 1000 (Bulgaria)

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented.

  10. Many-objective optimization and visual analytics reveal key trade-offs for London's water supply

    Science.gov (United States)

    Matrosov, Evgenii S.; Huskova, Ivana; Kasprzyk, Joseph R.; Harou, Julien J.; Lambert, Chris; Reed, Patrick M.

    2015-12-01

    In this study, we link a water resource management simulator to multi-objective search to reveal the key trade-offs inherent in planning a real-world water resource system. We consider new supplies and demand management (conservation) options while seeking to elucidate the trade-offs between the best portfolios of schemes to satisfy projected water demands. Alternative system designs are evaluated using performance measures that minimize capital and operating costs and energy use while maximizing resilience, engineering and environmental metrics, subject to supply reliability constraints. Our analysis shows many-objective evolutionary optimization coupled with state-of-the art visual analytics can help planners discover more diverse water supply system designs and better understand their inherent trade-offs. The approach is used to explore future water supply options for the Thames water resource system (including London's water supply). New supply options include a new reservoir, water transfers, artificial recharge, wastewater reuse and brackish groundwater desalination. Demand management options include leakage reduction, compulsory metering and seasonal tariffs. The Thames system's Pareto approximate portfolios cluster into distinct groups of water supply options; for example implementing a pipe refurbishment program leads to higher capital costs but greater reliability. This study highlights that traditional least-cost reliability constrained design of water supply systems masks asset combinations whose benefits only become apparent when more planning objectives are considered.

  11. Sexuality in old age: key issues, gender differences and future proposals

    Directory of Open Access Journals (Sweden)

    Noelia Fernández-Rouco

    2013-12-01

    Full Text Available This work presents a brief overview of some of the most important issues related to sexuality during old age. First, it presents the state of the current situation, in order to later explore some of the elements that have been considered key factors in experiencing sexuality, specifically in this stage of life, while exploring certain needs and difficulties. Similarly, some of the differences between men and women, within this context, are presented. Finally, future proposals aimed at better understanding this topic in old age are presented, with suggestions on how to improve wellbeing and care in regard to sexuality among the aging population.

  12. Perturbation of whole-brain dynamics in silico reveals mechanistic differences between brain states

    NARCIS (Netherlands)

    Deco, Gustavo; Cabral, Joana; Saenger, Victor M; Boly, Melanie; Tagliazucchi, Enzo; Laufs, Helmut; Van Someren, Eus; Jobst, Beatrice; Stevner, Angus; Kringelbach, Morten L

    2017-01-01

    Human neuroimaging research has revealed that wakefulness and sleep involve very different activity patterns. Yet, it is not clear why brain states differ in their dynamical complexity, e.g. in the level of integration and segregation across brain networks over time. Here, we investigate the

  13. Perturbation of whole-brain dynamics in silico reveals mechanistic differences between brain states

    NARCIS (Netherlands)

    Deco, Gustavo; Cabral, Joana; Saenger, Victor M; Boly, Melanie; Tagliazucchi, Enzo; Laufs, Helmut; Van Someren, Eus; Jobst, Beatrice M; Stevner, Angus B A; Kringelbach, Morten L

    2018-01-01

    Human neuroimaging research has revealed that wakefulness and sleep involve very different activity patterns. Yet, it is not clear why brain states differ in their dynamical complexity, e.g. in the level of integration and segregation across brain networks over time. Here, we investigate the

  14. Single-Cell Gene Expression Analysis of a Human ESC Model of Pancreatic Endocrine Development Reveals Different Paths to β-Cell Differentiation.

    Science.gov (United States)

    Petersen, Maja Borup Kjær; Azad, Ajuna; Ingvorsen, Camilla; Hess, Katja; Hansson, Mattias; Grapin-Botton, Anne; Honoré, Christian

    2017-10-10

    The production of insulin-producing β cells from human embryonic stem cells (hESCs) in vitro represents a promising strategy for a cell-based therapy for type 1 diabetes mellitus. To explore the cellular heterogeneity and temporal progression of endocrine progenitors and their progeny, we performed single-cell qPCR on more than 500 cells across several stages of in vitro differentiation of hESCs and compared them with human islets. We reveal distinct subpopulations along the endocrine differentiation path and an early lineage bifurcation toward either polyhormonal cells or β-like cells. We uncover several similarities and differences with mouse development and reveal that cells can take multiple paths to the same differentiation state, a principle that could be relevant to other systems. Notably, activation of the key β-cell transcription factor NKX6.1 can be initiated before or after endocrine commitment. The single-cell temporal resolution we provide can be used to improve the production of functional β cells. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  15. Epigenomic Co-localization and Co-evolution Reveal a Key Role for 5hmC as a Communication Hub in the Chromatin Network of ESCs

    Directory of Open Access Journals (Sweden)

    David Juan

    2016-02-01

    Full Text Available Summary: Epigenetic communication through histone and cytosine modifications is essential for gene regulation and cell identity. Here, we propose a framework that is based on a chromatin communication model to get insight on the function of epigenetic modifications in ESCs. The epigenetic communication network was inferred from genome-wide location data plus extensive manual annotation. Notably, we found that 5-hydroxymethylcytosine (5hmC is the most-influential hub of this network, connecting DNA demethylation to nucleosome remodeling complexes and to key transcription factors of pluripotency. Moreover, an evolutionary analysis revealed a central role of 5hmC in the co-evolution of chromatin-related proteins. Further analysis of regions where 5hmC co-localizes with specific interactors shows that each interaction points to chromatin remodeling, stemness, differentiation, or metabolism. Our results highlight the importance of cytosine modifications in the epigenetic communication of ESCs. : 5-hydroxymethylcytosine (5hmC plays a key role in the epigenomic communication network of embryonic stem cells. Juan et al. build a communication network based in co-localization of epigenomic data and literature. The analysis of the network and its components reveals that proteins reading and editing 5hmC co-evolve and serve as links between diverse molecular processes.

  16. ‘Candidatus Competibacter’-lineage genomes retrieved from metagenomes reveal functional metabolic diversity

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Andresen, Eva Kammer

    2014-01-01

    as for denitrification, nitrogen fixation, fermentation, trehalose synthesis and utilisation of glucose and lactate. Genetic comparison of P metabolism pathways with sequenced PAOs revealed the absence of the Pit phosphate transporter in the Competibacter-lineage genomes—identifying a key metabolic difference...

  17. Same but different? Measurement invariance of the PIAAC motivation-to-learn scale across key socio-demographic groups

    Directory of Open Access Journals (Sweden)

    Julia Gorges

    2017-07-01

    Full Text Available Abstract Background Data from the Programme for the International Assessment of Adult Competencies (PIAAC revealed that countries systematically differ in their respondents’ literacy, numeracy, and problem solving in technology-rich environments skills; skill levels also vary by gender, age, level of education or migration background. Similarly, systematic differences have been documented with respect to adults’ participation in education, which can be considered as a means to develop and maintain skills. From a psychological perspective, motivation to learn is considered a key factor associated with both skill development and participation in (further education. In order to account for motivation when analyzing PIAAC data, four items from the PIAAC background questionnaire were recently compiled into a motivation-to-learn scale. This scale has been found to be invariant (i.e., showing full weak and partial strong measurement invariance across 21 countries. Methods This paper presents further analyses using multiple-group graded response models to scrutinize the validity of the motivation-to-learn scale for group comparisons. Results Results indicate at least partial strong measurement invariance across gender, age groups, level of education, and migration background in most countries under study (all CFI > .95, all RMSEA < .08. Thus, the scale is suitable for comparing both means and associations across these groups. Conclusions Results are discussed in light of country characteristics, challenges of measurement invariance testing, and potential future research using PIAAC data.

  18. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  19. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  20. Differential co-expression and regulation analyses reveal different mechanisms underlying major depressive disorder and subsyndromal symptomatic depression.

    Science.gov (United States)

    Xu, Fan; Yang, Jing; Chen, Jin; Wu, Qingyuan; Gong, Wei; Zhang, Jianguo; Shao, Weihua; Mu, Jun; Yang, Deyu; Yang, Yongtao; Li, Zhiwei; Xie, Peng

    2015-04-03

    Recent depression research has revealed a growing awareness of how to best classify depression into depressive subtypes. Appropriately subtyping depression can lead to identification of subtypes that are more responsive to current pharmacological treatment and aid in separating out depressed patients in which current antidepressants are not particularly effective. Differential co-expression analysis (DCEA) and differential regulation analysis (DRA) were applied to compare the transcriptomic profiles of peripheral blood lymphocytes from patients with two depressive subtypes: major depressive disorder (MDD) and subsyndromal symptomatic depression (SSD). Six differentially regulated genes (DRGs) (FOSL1, SRF, JUN, TFAP4, SOX9, and HLF) and 16 transcription factor-to-target differentially co-expressed gene links or pairs (TF2target DCLs) appear to be the key differential factors in MDD; in contrast, one DRG (PATZ1) and eight TF2target DCLs appear to be the key differential factors in SSD. There was no overlap between the MDD target genes and SSD target genes. Venlafaxine (Efexor™, Effexor™) appears to have a significant effect on the gene expression profile of MDD patients but no significant effect on the gene expression profile of SSD patients. DCEA and DRA revealed no apparent similarities between the differential regulatory processes underlying MDD and SSD. This bioinformatic analysis may provide novel insights that can support future antidepressant R&D efforts.

  1. Metabolomics reveals variation and correlation among different tissues of olive (Olea europaea L.

    Directory of Open Access Journals (Sweden)

    Rao Guodong

    2017-09-01

    Full Text Available Metabolites in olives are associated with nutritional value and physiological properties. However, comprehensive information regarding the olive metabolome is limited. In this study, we identified 226 metabolites from three different tissues of olive using a non-targeted metabolomic profiling approach, of which 76 named metabolites were confirmed. Further statistical analysis revealed that these 76 metabolites covered different types of primary metabolism and some of the secondary metabolism pathways. One-way analysis of variance (ANOVA statistical assay was performed to calculate the variations within the detected metabolites, and levels of 65 metabolites were differentially expressed in different samples. Hierarchical cluster analysis (HCA dendrograms showed variations among different tissues that were similar to the metabolite profiles observed in new leaves and fruit. Additionally, 5776 metabolite-metabolite correlations were detected by a Pearson correlation coefficient approach. Screening of the calculated correlations revealed 3136, 3025, and 5184 were determined to metabolites and had significant correlations in three different combinations, respectively. This work provides the first comprehensive metabolomic of olive, which will provide new insights into understanding the olive metabolism, and potentially help advance studies in olive metabolic engineering.

  2. Structural characterization of Helicobacter pylori dethiobiotin synthetase reveals differences between family members

    Energy Technology Data Exchange (ETDEWEB)

    Porebski, Przemyslaw J.; Klimecka, Maria; Chruszcz, Maksymilian; Nicholls, Robert A.; Murzyn, Krzysztof; Cuff, Marianne E.; Xu, Xiaohui; Cymborowski, Marcin; Murshudov, Garib N.; Savchenko, Alexei; Edwards, Aled; Minor, Wladek (MCSG); (UV); (MRC)

    2012-07-11

    Dethiobiotin synthetase (DTBS) is involved in the biosynthesis of biotin in bacteria, fungi, and plants. As humans lack this pathway, DTBS is a promising antimicrobial drug target. We determined structures of DTBS from Helicobacter pylori (hpDTBS) bound with cofactors and a substrate analog, and described its unique characteristics relative to other DTBS proteins. Comparison with bacterial DTBS orthologs revealed considerable structural differences in nucleotide recognition. The C-terminal region of DTBS proteins, which contains two nucleotide-recognition motifs, differs greatly among DTBS proteins from different species. The structure of hpDTBS revealed that this protein is unique and does not contain a C-terminal region containing one of the motifs. The single nucleotide-binding motif in hpDTBS is similar to its counterpart in GTPases; however, isothermal titration calorimetry binding studies showed that hpDTBS has a strong preference for ATP. The structural determinants of ATP specificity were assessed with X-ray crystallographic studies of hpDTBS-ATP and hpDTBS-GTP complexes. The unique mode of nucleotide recognition in hpDTBS makes this protein a good target for H. pylori-specific inhibitors of the biotin synthesis pathway.

  3. Representing Microbial Dormancy in Soil Decomposition Models Improves Model Performance and Reveals Key Ecosystem Controls on Microbial Activity

    Science.gov (United States)

    He, Y.; Yang, J.; Zhuang, Q.; Wang, G.; Liu, Y.

    2014-12-01

    Climate feedbacks from soils can result from environmental change and subsequent responses of plant and microbial communities and nutrient cycling. Explicit consideration of microbial life history traits and strategy may be necessary to predict climate feedbacks due to microbial physiology and community changes and their associated effect on carbon cycling. In this study, we developed an explicit microbial-enzyme decomposition model and examined model performance with and without representation of dormancy at six temperate forest sites with observed soil efflux ranged from 4 to 10 years across different forest types. We then extrapolated the model to all temperate forests in the Northern Hemisphere (25-50°N) to investigate spatial controls on microbial and soil C dynamics. Both models captured the observed soil heterotrophic respiration (RH), yet no-dormancy model consistently exhibited large seasonal amplitude and overestimation in microbial biomass. Spatially, the total RH from temperate forests based on dormancy model amounts to 6.88PgC/yr, and 7.99PgC/yr based on no-dormancy model. However, no-dormancy model notably overestimated the ratio of microbial biomass to SOC. Spatial correlation analysis revealed key controls of soil C:N ratio on the active proportion of microbial biomass, whereas local dormancy is primarily controlled by soil moisture and temperature, indicating scale-dependent environmental and biotic controls on microbial and SOC dynamics. These developments should provide essential support to modeling future soil carbon dynamics and enhance the avenue for collaboration between empirical soil experiment and modeling in the sense that more microbial physiological measurements are needed to better constrain and evaluate the models.

  4. Autoshaping of key pecking in pigeons with negative reinforcement.

    Science.gov (United States)

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  5. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  6. Key electronic states in lithium battery materials probed by soft X-ray spectroscopy

    International Nuclear Information System (INIS)

    Yang, Wanli; Liu, Xiaosong; Qiao, Ruimin; Olalde-Velasco, Paul; Spear, Jonathan D.; Roseguo, Louis; Pepper, John X.; Chuang, Yi-de; Denlinger, Jonathan D.; Hussain, Zahid

    2013-01-01

    Highlights: •Key electronic states in battery materials revealed by soft X-ray spectroscopy. •Soft X-ray absorption consistently probes Mn oxidation states in different systems. •Soft X-ray absorption and emission fingerprint battery operations in LiFePO 4 . •Spectroscopic guidelines for selecting/optimizing polymer materials for batteries. •Distinct SEI formation on same electrode material with different crystal orientations. -- Abstract: The formidable challenges for developing a safe, low-cost, high-capacity, and high-power battery necessitate employing advanced tools that are capable of directly probing the key electronic states relevant to battery performance. Synchrotron based soft X-ray spectroscopy directly measures both the occupied and unoccupied states in the vicinity of the Fermi level, including transition-metal-3d and anion-p states. This article presents the basic concepts on how fundamental physics in electronic structure could provide valuable information for lithium-ion battery applications. We then discuss some of our recent studies on transition-metal oxide based cathodes, silicon based anode, and solid-electrolyte-interphase through soft X-ray absorption and emission spectroscopy. We argue that spectroscopic results reveal the evolution of electronic states for fingerprinting, understanding, and optimizing lithium-ion battery operations

  7. Key Concept Identification: A Comprehensive Analysis of Frequency and Topical Graph-Based Approaches

    Directory of Open Access Journals (Sweden)

    Muhammad Aman

    2018-05-01

    Full Text Available Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. The statistical frequency and topical graph-based ranking are the two kinds of potentially powerful and leading unsupervised approaches in this area, devised to address the problem. To utilize the potential of these approaches and improve key concept identification, a comprehensive performance analysis of these approaches on datasets from different domains is needed. The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. For experimental analysis, we have selected TF-IDF, KP-Miner and TopicRank. Three major sources of error, i.e., frequency errors, syntactical errors and semantical errors, and the factors that contribute to these errors are identified. Analysis of the results reveals that performance of the selected approaches is significantly degraded by these errors. These findings can help us develop an intelligent solution for key concept extraction in the future.

  8. DNA microarray revealed and RNAi plants confirmed key genes conferring low Cd accumulation in barley grains

    DEFF Research Database (Denmark)

    Sun, Hongyan; Chen, Zhong-Hua; Chen, Fei

    2015-01-01

    Background Understanding the mechanism of low Cd accumulation in crops is crucial for sustainable safe food production in Cd-contaminated soils. Results Confocal microscopy, atomic absorption spectrometry, gas exchange and chlorophyll fluorescence analyses revealed a distinct difference in Cd...... with a substantial difference between the two genotypes. Cd stress led to higher expression of genes involved in transport, carbohydrate metabolism and signal transduction in the low-grain-Cd-accumulating genotype. Novel transporter genes such as zinc transporter genes were identified as being associated with low Cd...... accumulation. Quantitative RT-PCR confirmed our microarray data. Furthermore, suppression of the zinc transporter genes HvZIP3 and HvZIP8 by RNAi silencing showed increased Cd accumulation and reduced Zn and Mn concentrations in barley grains. Thus, HvZIP3 and HvZIP8 could be candidate genes related to low...

  9. Strategy revealing phenotypic differences among synthetic oscillator designs.

    Science.gov (United States)

    Lomnitz, Jason G; Savageau, Michael A

    2014-09-19

    Considerable progress has been made in identifying and characterizing the component parts of genetic oscillators, which play central roles in all organisms. Nonlinear interaction among components is sufficiently complex that mathematical models are required to elucidate their elusive integrated behavior. Although natural and synthetic oscillators exhibit common architectures, there are numerous differences that are poorly understood. Utilizing synthetic biology to uncover basic principles of simpler circuits is a way to advance understanding of natural circadian clocks and rhythms. Following this strategy, we address the following questions: What are the implications of different architectures and molecular modes of transcriptional control for the phenotypic repertoire of genetic oscillators? Are there designs that are more realizable or robust? We compare synthetic oscillators involving one of three architectures and various combinations of the two modes of transcriptional control using a methodology that provides three innovations: a rigorous definition of phenotype, a procedure for deconstructing complex systems into qualitatively distinct phenotypes, and a graphical representation for illuminating the relationship between genotype, environment, and the qualitatively distinct phenotypes of a system. These methods provide a global perspective on the behavioral repertoire, facilitate comparisons of alternatives, and assist the rational design of synthetic gene circuitry. In particular, the results of their application here reveal distinctive phenotypes for several designs that have been studied experimentally as well as a best design among the alternatives that has yet to be constructed and tested.

  10. Valuing snorkeling visits to the Florida Keys with stated and revealed preference models

    Science.gov (United States)

    Timothy Park; J. Michael Bowker; Vernon R. Leeworthy

    2002-01-01

    Coastal coral reefs, especially in the Florida Keys, are declining at a disturbing rate. Marine ecologists and reef scientists have emphasized the importance of establishing nonmarket values of coral reefs to assess the cost effectiveness of coral reef management and remediation programs. The purpose of this paper is to develop a travel cost--contingent valuation model...

  11. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  12. Limitations and Extensions of the Lock-and-Key Principle: Differences between Gas State, Solution and Solid State Structures

    Directory of Open Access Journals (Sweden)

    Hans-Jörg Schneider

    2015-03-01

    Full Text Available The lock-and-key concept is discussed with respect to necessary extensions. Formation of supramolecular complexes depends not only, and often not even primarily on an optimal geometric fit between host and guest. Induced fit and allosteric interactions have long been known as important modifications. Different binding mechanisms, the medium used and pH effects can exert a major influence on the affinity. Stereoelectronic effects due to lone pair orientation can lead to variation of binding constants by orders of magnitude. Hydrophobic interactions due to high-energy water inside cavities modify the mechanical lock-and-key picture. That optimal affinities are observed if the cavity is only partially filled by the ligand can be in conflict with the lock-and-key principle. In crystals other forces than those between host and guest often dominate, leading to differences between solid state and solution structures. This is exemplified in particular with calixarene complexes, which by X-ray analysis more often than other hosts show guest molecules outside their cavity. In view of this the particular problems with the identification of weak interactions in crystals is discussed.

  13. Key Features of Electric Vehicle Diffusion and Its Impact on the Korean Power Market

    Directory of Open Access Journals (Sweden)

    Dongnyok Shim

    2018-06-01

    Full Text Available The market share of electric vehicles is growing and the interest in these vehicles is rapidly increasing in industrialized countries. In the light of these circumstances, this study provides an integrated policy-making package, which includes key features for electric vehicle diffusion and its impact on the Korean power market. This research is based on a quantitative analysis with the following steps: (1 it analyzes drivers’ preferences for electric or traditional internal combustion engine (ICE vehicles with respect to key automobile attributes and these key attributes indicate what policy makers should focus on; (2 it forecasts the achievable level of market share of electric vehicles in relation to improvements in their key attributes; and (3 it evaluates the impact of electric vehicle diffusion on the Korean power market based on an achievable level of market share with different charging demand profiles. Our results reveal the market share of electric vehicles can increase to around 40% of the total market share if the key features of electric vehicles reach a similar level to those of traditional vehicles. In this estimation, an increase in the power market’s system generation costs will reach around 10% of the cost in the baseline scenario, which differs slightly depending on charging demand profiles.

  14. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  15. Key volatile aroma compounds of lactic acid fermented malt based beverages - impact of lactic acid bacteria strains.

    Science.gov (United States)

    Nsogning Dongmo, Sorelle; Sacher, Bertram; Kollmannsberger, Hubert; Becker, Thomas

    2017-08-15

    This study aims to define the aroma composition and key aroma compounds of barley malt wort beverages produced from fermentation using six lactic acid bacteria (LAB) strains. Gas chromatography mass spectrometry-olfactometry and flame ionization detection was employed; key aroma compounds were determined by means of aroma extract dilution analysis. Fifty-six detected volatile compounds were similar among beverages. However, significant differences were observed in the concentration of individual compounds. Key aroma compounds (flavor dilution (FD) factors ≥16) were β-damascenone, furaneol, phenylacetic acid, 2-phenylethanol, 4-vinylguaiacol, sotolon, methional, vanillin, acetic acid, nor-furaneol, guaiacol and ethyl 2-methylbutanoate. Furthermore, acetaldehyde had the greatest odor activity value of up to 4266. Sensory analyses revealed large differences in the flavor profile. Beverage from L. plantarum Lp. 758 showed the highest FD factors in key aroma compounds and was correlated to fruity flavors. Therefore, we suggest that suitable LAB strain selection may improve the flavor of malt based beverages. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Autoshaping of key pecking in pigeons with negative reinforcement1

    Science.gov (United States)

    Rachlin, Howard

    1969-01-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key. ImagesFig. 3.Fig. 4. PMID:16811371

  17. MALDI Mass Spectrometry Imaging of Lipids and Gene Expression Reveals Differences in Fatty Acid Metabolism between Follicular Compartments in Porcine Ovaries

    Directory of Open Access Journals (Sweden)

    Svetlana Uzbekova

    2015-03-01

    Full Text Available In mammals, oocytes develop inside the ovarian follicles; this process is strongly supported by the surrounding follicular environment consisting of cumulus, granulosa and theca cells, and follicular fluid. In the antral follicle, the final stages of oogenesis require large amounts of energy that is produced by follicular cells from substrates including glucose, amino acids and fatty acids (FAs. Since lipid metabolism plays an important role in acquiring oocyte developmental competence, the aim of this study was to investigate site-specificity of lipid metabolism in ovaries by comparing lipid profiles and expression of FA metabolism-related genes in different ovarian compartments. Using MALDI Mass Spectrometry Imaging, images of porcine ovary sections were reconstructed from lipid ion signals for the first time. Cluster analysis of ion spectra revealed differences in spatial distribution of lipid species among ovarian compartments, notably between the follicles and interstitial tissue. Inside the follicles analysis differentiated follicular fluid, granulosa, theca and the oocyte-cumulus complex. Moreover, by transcript quantification using real time PCR, we showed that expression of five key genes in FA metabolism significantly varied between somatic follicular cells (theca, granulosa and cumulus and the oocyte. In conclusion, lipid metabolism differs between ovarian and follicular compartments.

  18. High-capacity quantum key distribution via hyperentangled degrees of freedom

    International Nuclear Information System (INIS)

    Simon, David S; Sergienko, Alexander V

    2014-01-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical. (paper)

  19. Comparing expressed and revealed preferences for risk reduction: different hazards and question frames

    International Nuclear Information System (INIS)

    McDaniels, T.L.

    1988-01-01

    Studies often note the wide differences that exist in costs per death avoided across US federal programs and regulatory contexts. This paper explores two new, related explanations for these differences. First, it argues that the patterns of revealed preferences (public allocations) may be related to public values, which are measured here through subjects' expressed preference responses to a contingent valuation survey regarding risk reduction. Subjects' expressed values are compared to actual (and proposed) costs of safety regulations for a similar set of hazards. The authors discover strong congruence in the ranking of expressed values and actual values. Second, the paper presents the results of a subsequent survey that investigates why the patterns observed in the first survey might occur. It suggests that one reason for the observed similarities between revealed and expressed preferences may be in how choices are framed. The paper hypothesizes that both subjects and decision makers may frame valuation decisions in the same way: as percentage changes from the reference point provided by the base rate of deaths for that hazard

  20. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  1. Aquatic insect ecophysiological traits reveal phylogenetically based differences in dissolved cadmium susceptibility.

    Science.gov (United States)

    Buchwalter, David B; Cain, Daniel J; Martin, Caitrin A; Xie, Lingtian; Luoma, Samuel N; Garland, Theodore

    2008-06-17

    We used a phylogenetically based comparative approach to evaluate the potential for physiological studies to reveal patterns of diversity in traits related to susceptibility to an environmental stressor, the trace metal cadmium (Cd). Physiological traits related to Cd bioaccumulation, compartmentalization, and ultimately susceptibility were measured in 21 aquatic insect species representing the orders Ephemeroptera, Plecoptera, and Trichoptera. We mapped these experimentally derived physiological traits onto a phylogeny and quantified the tendency for related species to be similar (phylogenetic signal). All traits related to Cd bioaccumulation and susceptibility exhibited statistically significant phylogenetic signal, although the signal strength varied among traits. Conventional and phylogenetically based regression models were compared, revealing great variability within orders but consistent, strong differences among insect families. Uptake and elimination rate constants were positively correlated among species, but only when effects of body size and phylogeny were incorporated in the analysis. Together, uptake and elimination rates predicted dramatic Cd bioaccumulation differences among species that agreed with field-based measurements. We discovered a potential tradeoff between the ability to eliminate Cd and the ability to detoxify it across species, particularly mayflies. The best-fit regression models were driven by phylogenetic parameters (especially differences among families) rather than functional traits, suggesting that it may eventually be possible to predict a taxon's physiological performance based on its phylogenetic position, provided adequate physiological information is available for close relatives. There appears to be great potential for evolutionary physiological approaches to augment our understanding of insect responses to environmental stressors in nature.

  2. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    We formally define the primitive of public-key encryption with non-interactive opening (PKENO), where the receiver of a ciphertext C can, convincingly and without interaction, reveal what the result was of decrypting C, without compromising the scheme’s security. This has numerous applications...

  3. Transcriptional profiling of human brain endothelial cells reveals key properties crucial for predictive in vitro blood-brain barrier models.

    Directory of Open Access Journals (Sweden)

    Eduard Urich

    Full Text Available Brain microvascular endothelial cells (BEC constitute the blood-brain barrier (BBB which forms a dynamic interface between the blood and the central nervous system (CNS. This highly specialized interface restricts paracellular diffusion of fluids and solutes including chemicals, toxins and drugs from entering the brain. In this study we compared the transcriptome profiles of the human immortalized brain endothelial cell line hCMEC/D3 and human primary BEC. We identified transcriptional differences in immune response genes which are directly related to the immortalization procedure of the hCMEC/D3 cells. Interestingly, astrocytic co-culturing reduced cell adhesion and migration molecules in both BECs, which possibly could be related to regulation of immune surveillance of the CNS controlled by astrocytic cells within the neurovascular unit. By matching the transcriptome data from these two cell lines with published transcriptional data from freshly isolated mouse BECs, we discovered striking differences that could explain some of the limitations of using cultured BECs to study BBB properties. Key protein classes such as tight junction proteins, transporters and cell surface receptors show differing expression profiles. For example, the claudin-5, occludin and JAM2 expression is dramatically reduced in the two human BEC lines, which likely explains their low transcellular electric resistance and paracellular leakiness. In addition, the human BEC lines express low levels of unique brain endothelial transporters such as Glut1 and Pgp. Cell surface receptors such as LRP1, RAGE and the insulin receptor that are involved in receptor-mediated transport are also expressed at very low levels. Taken together, these data illustrate that BECs lose their unique protein expression pattern outside of their native environment and display a more generic endothelial cell phenotype. A collection of key genes that seems to be highly regulated by the local

  4. Different levels of food restriction reveal genotype-specific differences in learning a visual discrimination task.

    Directory of Open Access Journals (Sweden)

    Kalina Makowiecki

    Full Text Available In behavioural experiments, motivation to learn can be achieved using food rewards as positive reinforcement in food-restricted animals. Previous studies reduce animal weights to 80-90% of free-feeding body weight as the criterion for food restriction. However, effects of different degrees of food restriction on task performance have not been assessed. We compared learning task performance in mice food-restricted to 80 or 90% body weight (BW. We used adult wildtype (WT; C57Bl/6j and knockout (ephrin-A2⁻/⁻ mice, previously shown to have a reverse learning deficit. Mice were trained in a two-choice visual discrimination task with food reward as positive reinforcement. When mice reached criterion for one visual stimulus (80% correct in three consecutive 10 trial sets they began the reverse learning phase, where the rewarded stimulus was switched to the previously incorrect stimulus. For the initial learning and reverse phase of the task, mice at 90%BW took almost twice as many trials to reach criterion as mice at 80%BW. Furthermore, WT 80 and 90%BW groups significantly differed in percentage correct responses and learning strategy in the reverse learning phase, whereas no differences between weight restriction groups were observed in ephrin-A2⁻/⁻ mice. Most importantly, genotype-specific differences in reverse learning strategy were only detected in the 80%BW groups. Our results indicate that increased food restriction not only results in better performance and a shorter training period, but may also be necessary for revealing behavioural differences between experimental groups. This has important ethical and animal welfare implications when deciding extent of diet restriction in behavioural studies.

  5. Kochen-Specker theorem as a precondition for secure quantum key distribution

    International Nuclear Information System (INIS)

    Nagata, Koji

    2005-01-01

    We show that (1) the violation of the Ekert 1991 inequality is a sufficient condition for certification of the Kochen-Specker (KS) theorem, and (2) the violation of the Bennett-Brassard-Mermin 1992 (BBM92) inequality is, also, a sufficient condition for certification of the KS theorem. Therefore the success in each quantum key distribution protocol reveals the nonclassical feature of quantum theory, in the sense that the KS realism is violated. Further, it turned out that the Ekert inequality and the BBM inequality are depictured by distillable entanglement witness inequalities. Here, we connect the success in these two key distribution processes into the no-hidden-variables theorem and into witness on distillable entanglement. We also discuss the explicit difference between the KS realism and Bell's local realism in the Hilbert space formalism of quantum theory

  6. Hydra meiosis reveals unexpected conservation of structural synaptonemal complex proteins across metazoans

    OpenAIRE

    Fraune, Johanna; Alsheimer, Manfred; Volff, Jean-Nicolas; Busch, Karoline; Fraune, Sebastian; Bosch, Thomas C. G.; Benavente, Ricardo

    2012-01-01

    The synaptonemal complex (SC) is a key structure of meiosis, mediating the stable pairing (synapsis) of homologous chromosomes during prophase I. Its remarkable tripartite structure is evolutionarily well conserved and can be found in almost all sexually reproducing organisms. However, comparison of the different SC protein components in the common meiosis model organisms Saccharomyces cerevisiae, Arabidopsis thaliana, Caenorhabditis elegans, Drosophila melanogaster, and Mus musculus revealed...

  7. Handsome wants as handsome does: physical attractiveness and gender differences in revealed sexual preferences.

    Science.gov (United States)

    McClintock, Elizabeth Aura

    2011-01-01

    In this article I evaluate the effect of physical attractiveness on young adults' sexual and romantic outcomes to reveal gender differences in acted preferences. Using data from the National Longitudinal Study of Adolescent Health (Add Health), a probability sample of young adults (n = 14,276), I investigate gender differences in desired sexual partner accumulation, relationship status, and timing of sexual intercourse. I find gender differences in sexual and romantic strategies consistent with those predicted by the double standard of sexuality and evolutionary theory. Specifically, compared to men, women pursue more committed relationships, fewer sexual partners, and delayed sexual intercourse.

  8. Changes in coral reef communities among the Florida Keys, 1996-2003

    Science.gov (United States)

    Somerfield, P. J.; Jaap, W. C.; Clarke, K. R.; Callahan, M.; Hackett, K.; Porter, J.; Lybolt, M.; Tsokos, C.; Yanev, G.

    2008-12-01

    Hard coral (Scleractinia and Milleporina) cover data were examined from 37 sites surveyed annually from 1996 to 2003 in the Florida reef tract, USA. Analyses of species numbers and total cover showed that site-to-site differences were generally very much greater than differences among times within sites. There were no significant differences among different geographical areas within the reef tract (Upper, Middle and Lower Keys). Large-scale changes documented included a reduction in species numbers and total cover on both deep and shallow offshore reefs between 1997 and 1999 followed by no recovery in cover, and only scant evidence of any recovery in species numbers by 2003. These changes coincided with bleaching events in 1997 and 1998, and the passage of Hurricane Georges through the Lower Keys in 1998. The lack of recovery among offshore reefs suggests that they were no longer resilient. Multivariate analyses revealed that some sites showed relatively little temporal variation in community composition, essentially random in direction, while others showed relatively large year-on-year changes. There was little evidence of any major region-wide changes affecting assemblage composition, or of any events that had impacted all of the sampling sites in any single year. Instead, different sites exhibited differing patterns of temporal variation, with certain sites displaying greater variation than others. Changes in community composition at some sites are interpreted in the light of knowledge of events at those sites and the relative sensitivities of species to various stressors, such as changes in cover of Acropora palmata and Millepora complanata at Sand Key following the bleaching events and hurricane in 1998, and declines in Montastraea annularis at Smith Shoal following a harmful algal bloom in 2002. For most sites, however, it is impossible to determine the causes of observed variation.

  9. Transcriptome Analysis of Three Sheep Intestinal Regions reveals Key Pathways and Hub Regulatory Genes of Large Intestinal Lipid Metabolism.

    Science.gov (United States)

    Chao, Tianle; Wang, Guizhi; Ji, Zhibin; Liu, Zhaohua; Hou, Lei; Wang, Jin; Wang, Jianmin

    2017-07-13

    The large intestine, also known as the hindgut, is an important part of the animal digestive system. Recent studies on digestive system development in ruminants have focused on the rumen and the small intestine, but the molecular mechanisms underlying sheep large intestine metabolism remain poorly understood. To identify genes related to intestinal metabolism and to reveal molecular regulation mechanisms, we sequenced and compared the transcriptomes of mucosal epithelial tissues among the cecum, proximal colon and duodenum. A total of 4,221 transcripts from 3,254 genes were identified as differentially expressed transcripts. Between the large intestine and duodenum, differentially expressed transcripts were found to be significantly enriched in 6 metabolism-related pathways, among which PPAR signaling was identified as a key pathway. Three genes, CPT1A, LPL and PCK1, were identified as higher expression hub genes in the large intestine. Between the cecum and colon, differentially expressed transcripts were significantly enriched in 5 lipid metabolism related pathways, and CEPT1 and MBOAT1 were identified as hub genes. This study provides important information regarding the molecular mechanisms of intestinal metabolism in sheep and may provide a basis for further study.

  10. Key Players in I-DmoI Endonuclease Catalysis Revealed from Structure and Dynamics

    DEFF Research Database (Denmark)

    Molina, Rafael; Besker, Neva; Marcaida, Maria Jose

    2016-01-01

    . The cleavage mechanism was related both to key structural effects, such as the position of water molecules and ions participating in the cleavage reaction, and to dynamical effects related to protein behavior. In particular, we found that the protein perturbation pattern significantly changes between cleaved......Homing endonucleases, such as I-DmoI, specifically recognize and cleave long DNA target sequences (∼20 bp) and are potentially powerful tools for genome manipulation. However, inefficient and off-target DNA cleavage seriously limits specific editing in complex genomes. One approach to overcome...

  11. In vivo phosphoproteome characterization reveals key starch granule-binding phosphoproteins involved in wheat water-deficit response.

    Science.gov (United States)

    Chen, Guan-Xing; Zhen, Shou-Min; Liu, Yan-Lin; Yan, Xing; Zhang, Ming; Yan, Yue-Ming

    2017-10-23

    Drought stress during grain development causes significant yield loss in cereal production. The phosphorylated modification of starch granule-binding proteins (SGBPs) is an important mechanism regulating wheat starch biosynthesis. In this study, we performed the first proteomics and phosphoproteomics analyses of SGBPs in elite Chinese bread wheat (Triticum aestivum L.) cultivar Jingdong 17 under well-watered and water-stress conditions. Water stress treatment caused significant reductions in spike grain numbers and weight, total starch and amylopectin content, and grain yield. Two-dimensional gel electrophoresis revealed that the quantity of SGBPs was reduced significantly by water-deficit treatment. Phosphoproteome characterization of SGBPs under water-deficit treatment demonstrated a reduced level of phosphorylation of main starch synthesis enzymes, particularly for granule-bound starch synthase (GBSS I), starch synthase II-a (SS II-a), and starch synthase III (SS III). Specifically, the Ser34 site of the GBSSI protein, the Tyr358 site of SS II-a, and the Ser837 site of SS III-a exhibited significant less phosphorylation under water-deficit treatment than well-watered treatment. Furthermore, the expression levels of several key genes related with starch biosynthesis detected by qRT-PCR were decreased significantly at 15 days post-anthesis under water-deficit treatment. Immunolocalization showed a clear movement of GBSS I from the periphery to the interior of starch granules during grain development, under both water-deficit and well-watered conditions. Our results demonstrated that the reduction in gene expression or transcription level, protein expression and phosphorylation levels of starch biosynthesis related enzymes under water-deficit conditions is responsible for the significant decrease in total starch content and grain yield.

  12. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  13. An Analysis of Key Factors in Developing a Smart City

    Directory of Open Access Journals (Sweden)

    Aidana Šiurytė

    2016-06-01

    Full Text Available The concept Smart City is used widely but it is perceived differently as well. Literature review reveals key elements of the Smart City – Information and Communication Technologies and Smart Citizens. Nevertheless, raising public awareness is not a priority of local municipalities which are trying to develop cities. Focus group discussion aims to analyse citizens’ insights in regards to the Smart City and their contribution to creation of it. Case study of Vilnius examines a position of mu-nicipality in developing city as smart. Study contains suggestions for the improvement of communication in the city. Methods employed: comparative literature analysis, focus group investigation, case study.

  14. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  15. Diffuse correlation tomography reveals spatial and temporal difference in blood flow changes among murine femoral grafts

    Science.gov (United States)

    Han, Songfeng; Proctor, Ashley R.; Benoit, Danielle S. W.; Choe, Regine

    2017-07-01

    Diffuse correlation tomography was utilized to noninvasively monitor 3D blood flow changes in three types of healing mouse femoral grafts. Results reveal the spatial and temporal difference among the groups.

  16. Structure of Rhodococcus equi virulence-associated protein B (VapB) reveals an eight-stranded antiparallel β-barrel consisting of two Greek-key motifs

    International Nuclear Information System (INIS)

    Geerds, Christina; Wohlmann, Jens; Haas, Albert; Niemann, Hartmut H.

    2014-01-01

    The structure of VapB, a member of the Vap protein family that is involved in virulence of the bacterial pathogen R. equi, was determined by SAD phasing and reveals an eight-stranded antiparallel β-barrel similar to avidin, suggestive of a binding function. Made up of two Greek-key motifs, the topology of VapB is unusual or even unique. Members of the virulence-associated protein (Vap) family from the pathogen Rhodococcus equi regulate virulence in an unknown manner. They do not share recognizable sequence homology with any protein of known structure. VapB and VapA are normally associated with isolates from pigs and horses, respectively. To contribute to a molecular understanding of Vap function, the crystal structure of a protease-resistant VapB fragment was determined at 1.4 Å resolution. The structure was solved by SAD phasing employing the anomalous signal of one endogenous S atom and two bound Co ions with low occupancy. VapB is an eight-stranded antiparallel β-barrel with a single helix. Structural similarity to avidins suggests a potential binding function. Unlike other eight- or ten-stranded β-barrels found in avidins, bacterial outer membrane proteins, fatty-acid-binding proteins and lysozyme inhibitors, Vaps do not have a next-neighbour arrangement but consist of two Greek-key motifs with strand order 41238567, suggesting an unusual or even unique topology

  17. Structure of Rhodococcus equi virulence-associated protein B (VapB) reveals an eight-stranded antiparallel β-barrel consisting of two Greek-key motifs

    Energy Technology Data Exchange (ETDEWEB)

    Geerds, Christina [Bielefeld University, Universitaetsstrasse 25, 33615 Bielefeld (Germany); Wohlmann, Jens; Haas, Albert [University of Bonn, Ulrich-Haberland Strasse 61a, 53121 Bonn (Germany); Niemann, Hartmut H., E-mail: hartmut.niemann@uni-bielefeld.de [Bielefeld University, Universitaetsstrasse 25, 33615 Bielefeld (Germany)

    2014-06-18

    The structure of VapB, a member of the Vap protein family that is involved in virulence of the bacterial pathogen R. equi, was determined by SAD phasing and reveals an eight-stranded antiparallel β-barrel similar to avidin, suggestive of a binding function. Made up of two Greek-key motifs, the topology of VapB is unusual or even unique. Members of the virulence-associated protein (Vap) family from the pathogen Rhodococcus equi regulate virulence in an unknown manner. They do not share recognizable sequence homology with any protein of known structure. VapB and VapA are normally associated with isolates from pigs and horses, respectively. To contribute to a molecular understanding of Vap function, the crystal structure of a protease-resistant VapB fragment was determined at 1.4 Å resolution. The structure was solved by SAD phasing employing the anomalous signal of one endogenous S atom and two bound Co ions with low occupancy. VapB is an eight-stranded antiparallel β-barrel with a single helix. Structural similarity to avidins suggests a potential binding function. Unlike other eight- or ten-stranded β-barrels found in avidins, bacterial outer membrane proteins, fatty-acid-binding proteins and lysozyme inhibitors, Vaps do not have a next-neighbour arrangement but consist of two Greek-key motifs with strand order 41238567, suggesting an unusual or even unique topology.

  18. Proteomic analyses reveal the key roles of BrlA and AbaA in biogenesis of gliotoxin in Aspergillus fumigatus

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Kwang-Soo, E-mail: shinks@dju.kr [Division of Life Science, Daejeon University, Daejeon, 300-716 (Korea, Republic of); Kim, Young Hwan [Biomedical Omics Team, Korea Basic Science Institute (KBSI), Ohcang, 368-883 (Korea, Republic of); Graduate School of Analytical Science and Technology, Chungnam National University, Daejeon, 305-764 (Korea, Republic of); Department of Bio-Analytical Science, University of Science and Technology, Daejeon, 305-333 (Korea, Republic of); Yu, Jae-Hyuk, E-mail: jyu1@wisc.edu [Departments of Bacteriology and Genetics, The University of Wisconsin–Madison, Madison, WI, 53706 (United States)

    2015-07-31

    The opportunistic human pathogenic fungus Aspergillus fumigatus primarily reproduces by forming a large number of asexual spores (conidia). Sequential activation of the central regulators BrlA, AbaA and WetA is necessary for the fungus to undergo asexual development. In this study, to address the presumed roles of these key developmental regulators during proliferation of the fungus, we analyzed and compared the proteomes of vegetative cells of wild type (WT) and individual mutant strains. Approximately 1300 protein spots were detectable from 2-D electrophoresis gels. Among these, 13 proteins exhibiting significantly altered accumulation levels were further identified by ESI-MS/MS. Markedly, we found that the GliM and GliT proteins associated with gliotoxin (GT) biosynthesis and self-protection of the fungus from GT were significantly down-regulated in the ΔabaA and ΔbrlA mutants. Moreover, mRNA levels of other GT biosynthetic genes including gliM, gliP, gliT, and gliZ were significantly reduced in both mutant strains, and no and low levels of GT were detectable in the ΔbrlA and ΔabaA mutant strains, respectively. As GliT is required for the protection of the fungus from GT, growth of the ΔbrlA mutant with reduced levels of GliT was severely impaired by exogenous GT. Our studies demonstrate that AbaA and BrlA positively regulate expression of the GT biosynthetic gene cluster in actively growing vegetative cells, and likely bridge morphological and chemical development during the life-cycle of A. fumigatus. - Highlights: • Proteome analyses of WT and mutants reveal 13 differentially expressed proteins. • The GliT and GliM proteins are significantly down-regulated by ΔabaA and ΔbrlA. • Expression of other gliotoxin biosynthetic genes is lowered by ΔabaA and ΔbrlA. • Growth of ΔbrlA strain lacking GliT is completely inhibited by exogenous gliotoxin. • BrlA and AbaA play key roles in biogenesis of gliotoxin in Aspergillus fumigatus.

  19. Proteomic analyses reveal the key roles of BrlA and AbaA in biogenesis of gliotoxin in Aspergillus fumigatus

    International Nuclear Information System (INIS)

    Shin, Kwang-Soo; Kim, Young Hwan; Yu, Jae-Hyuk

    2015-01-01

    The opportunistic human pathogenic fungus Aspergillus fumigatus primarily reproduces by forming a large number of asexual spores (conidia). Sequential activation of the central regulators BrlA, AbaA and WetA is necessary for the fungus to undergo asexual development. In this study, to address the presumed roles of these key developmental regulators during proliferation of the fungus, we analyzed and compared the proteomes of vegetative cells of wild type (WT) and individual mutant strains. Approximately 1300 protein spots were detectable from 2-D electrophoresis gels. Among these, 13 proteins exhibiting significantly altered accumulation levels were further identified by ESI-MS/MS. Markedly, we found that the GliM and GliT proteins associated with gliotoxin (GT) biosynthesis and self-protection of the fungus from GT were significantly down-regulated in the ΔabaA and ΔbrlA mutants. Moreover, mRNA levels of other GT biosynthetic genes including gliM, gliP, gliT, and gliZ were significantly reduced in both mutant strains, and no and low levels of GT were detectable in the ΔbrlA and ΔabaA mutant strains, respectively. As GliT is required for the protection of the fungus from GT, growth of the ΔbrlA mutant with reduced levels of GliT was severely impaired by exogenous GT. Our studies demonstrate that AbaA and BrlA positively regulate expression of the GT biosynthetic gene cluster in actively growing vegetative cells, and likely bridge morphological and chemical development during the life-cycle of A. fumigatus. - Highlights: • Proteome analyses of WT and mutants reveal 13 differentially expressed proteins. • The GliT and GliM proteins are significantly down-regulated by ΔabaA and ΔbrlA. • Expression of other gliotoxin biosynthetic genes is lowered by ΔabaA and ΔbrlA. • Growth of ΔbrlA strain lacking GliT is completely inhibited by exogenous gliotoxin. • BrlA and AbaA play key roles in biogenesis of gliotoxin in Aspergillus fumigatus

  20. The Qualitative Study of Key Performance Indicator on PT. Jiwasraya Manado

    OpenAIRE

    Rangian, Geby Melisa; Tumewu, Ferdinand

    2014-01-01

    Key Performance Indicator (KPI) is one of the most common tools used by the employees of companies to help manage more effectively and guide their progress. To perceive how far the achievement and the performance of the company, PT. Jiwasraya Manado use the Key Performance Indicator (KPI) to reveal the performance of the company. The objective of this study is to analyze the importance from the implementation of the key performance indicator for the insurance employee. There are several facts...

  1. Transcriptomic analysis reveals key genes related to betalain biosynthesis in pulp coloration of Hylocereus polyrhizus

    Directory of Open Access Journals (Sweden)

    Hua eQingzhu

    2016-01-01

    Full Text Available Betalains have high nutritional value and bioactivities. Red pulp pitaya (Hylocereus polyrhizus is the only fruit containing abundant betalains for consumer. However, no information is available about genes involved in betalain biosynthesis in H. polyrhizus. Herein, two cDNA libraries of pitaya pulps with two different coloration stages (white and red pulp stages of Guanhuahong (H. polyrhizus were constructed. A total of about 12 Gb raw RNA-Seq data was generated and was de novo assembled into 122,677 transcripts with an average length of 1,183 bp and an N50 value of 2008. Approximately 99.99% of all transcripts were annotated based on seven public databases. A total of 8,871 transcripts were significantly regulated. Thirty-three candidate transcripts related to betalain biosynthesis were obtained from the transcriptome data. Transcripts encoding enzymes involved in betalain biosynthesis were analyzed using RT-qPCR at the whole pulp coloration stages of H. Polyrhizus (7-1 and H. Undatus (132-4. Nine key transcripts of betalain biosynthesis were identified. They were assigned to four kinds of genes in betalain biosynthetic pathway, including tyrosinase, 4, 5-DOPA dioxygenase extradiol, cytochrome P450 and glucosyltransferase. Ultimately, a preliminary betalain biosynthetic pathway for pitaya was proposed based on betalain analyses and gene expression profiles.

  2. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  3. Logic programming reveals alteration of key transcription factors in multiple myeloma.

    Science.gov (United States)

    Miannay, Bertrand; Minvielle, Stéphane; Roux, Olivier; Drouin, Pierre; Avet-Loiseau, Hervé; Guérin-Charbonnel, Catherine; Gouraud, Wilfried; Attal, Michel; Facon, Thierry; Munshi, Nikhil C; Moreau, Philippe; Campion, Loïc; Magrangeas, Florence; Guziolowski, Carito

    2017-08-23

    Innovative approaches combining regulatory networks (RN) and genomic data are needed to extract biological information for a better understanding of diseases, such as cancer, by improving the identification of entities and thereby leading to potential new therapeutic avenues. In this study, we confronted an automatically generated RN with gene expression profiles (GEP) from a cohort of multiple myeloma (MM) patients and normal individuals using global reasoning on the RN causality to identify key-nodes. We modeled each patient by his or her GEP, the RN and the possible automatically detected repairs needed to establish a coherent flow of the information that explains the logic of the GEP. These repairs could represent cancer mutations leading to GEP variability. With this reasoning, unmeasured protein states can be inferred, and we can simulate the impact of a protein perturbation on the RN behavior to identify therapeutic targets. We showed that JUN/FOS and FOXM1 activities are altered in almost all MM patients and identified two survival markers for MM patients. Our results suggest that JUN/FOS-activation has a strong impact on the RN in view of the whole GEP, whereas FOXM1-activation could be an interesting way to perturb an MM subgroup identified by our method.

  4. New hematological key for bovine leukemia virus-infected Japanese Black cattle.

    Science.gov (United States)

    Mekata, Hirohisa; Yamamoto, Mari; Kirino, Yumi; Sekiguchi, Satoshi; Konnai, Satoru; Horii, Yoichiro; Norimine, Junzo

    2018-02-20

    The European Community's (EC) Key, which is also called Bendixen's Key, is a well-established bovine leukemia virus (BLV) diagnostic method that classifies cattle according to the absolute lymphocyte count and age. The EC Key was originally designed for dairy cattle and is not necessarily suitable for Japanese Black (JB) beef cattle. This study revealed the lymphocyte counts in the BLV-free and -infected JB cattle were significantly lower than those in the Holstein cattle. Therefore, applying the EC Key to JB cattle could result in a large number of undetected BLV-infected cattle. Our proposed hematological key, which was designed for JB cattle, improves the detection of BLV-infected cattle by approximately 20%. We believe that this study could help promote BLV control.

  5. The γ Dor stars as revealed by Kepler: A key to reveal deep-layer rotation in A and F stars

    Directory of Open Access Journals (Sweden)

    Salmon S. J. A. J.

    2017-01-01

    Full Text Available The γ Dor pulsating stars present high-order gravity modes, which make them important targets in the intermediate-and low-mass main-sequence region of the Hertzsprung-Russell diagram. Whilst we have only access to rotation in the envelope of the Sun, the g modes of γ Dor stars can in principle deliver us constraints on the inner layers. With the puzzling discovery of unexpectedly low rotation rates in the core of red giants, the γ Dor stars appear now as unique targets to explore internal angular momentum transport in the progenitors of red giants. Yet, the γ Dor pulsations remain hard to detect from the ground for their periods are close to 1 day. While the CoRoT space mission first revealed intriguing frequency spectra, the almost uninterrupted 4-year photometry from the Kepler mission eventually shed a new light on them. It revealed regularities in the spectra, expected to bear signature of physical processes, including rotation, in the shear layers close to the convective core. We present here the first results of our effort to derive exploitable seismic diagnosis for mid- to fast rotators among γ Dor stars. We confirm their potential to explore the rotation history of this early phase of stellar evolution.

  6. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  7. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  8. Comparative genome analysis of three eukaryotic parasites with differing abilities to transform leukocytes reveals key mediators of theileria-induced leukocyte transformation

    KAUST Repository

    Hayashida, Kyoko

    2012-09-04

    We sequenced the genome of Theileria orientalis, a tick-borne apicomplexan protozoan parasite of cattle. The focus of this study was a comparative genome analysis of T. orientalis relative to other highly pathogenic Theileria species, T. parva and T. annulata. T. parva and T. annulata induce transformation of infected cells of lymphocyte or macrophage/monocyte lineages; in contrast, T. orientalis does not induce uncontrolled proliferation of infected leukocytes and multiplies predominantly within infected erythrocytes. While synteny across homologous chromosomes of the three Theileria species was found to be well conserved overall, subtelomeric structures were found to differ substantially, as T. orientalis lacks the large tandemly arrayed subtelomere-encoded variable secreted protein-encoding gene family. Moreover, expansion of particular gene families by gene duplication was found in the genomes of the two transforming Theileria species, most notably, the TashAT/TpHN and Tar/Tpr gene families. Gene families that are present only in T. parva and T. annulata and not in T. orientalis, Babesia bovis, or Plasmo-dium were also identified. Identification of differences between the genome sequences of Theileria species with different abilities to transform and immortalize bovine leukocytes will provide insight into proteins and mechanisms that have evolved to induce and regulate this process. The T. orientalis genome database is available at http://totdb.czc.hokudai.ac.jp/. 2012 Hayashida et al. T.

  9. In vitro study revealed different size behavior of different nanoparticles

    International Nuclear Information System (INIS)

    Schaudien, Dirk; Knebel, Jan; Creutzenberg, Otto

    2012-01-01

    Toxicity of nanoparticles is depending not only on the size of the primary particles but on the size of their agglomerates. Therefore, further studies are needed to examine the behavior of nanoparticles after they have gotten in contact with cells. The presented study investigated the change of size of different commercially available nanoparticles after applying them to different cell lines such as A549, Calu-3, 16HBE14o and LK004 representative for the different parts of the human lung. The different nanoparticles exhibited differences in behavior of size. TiO 2 P25 showed a tendency to increase, whereas TiO 2 T805 and Printex ® 90 remained more or less at the same size. In contrast, ZnO < 50 nm particles showed a significant decrease of size.

  10. Feature-Based Change Detection Reveals Inconsistent Individual Differences in Visual Working Memory Capacity.

    Science.gov (United States)

    Ambrose, Joseph P; Wijeakumar, Sobanawartiny; Buss, Aaron T; Spencer, John P

    2016-01-01

    Visual working memory (VWM) is a key cognitive system that enables people to hold visual information in mind after a stimulus has been removed and compare past and present to detect changes that have occurred. VWM is severely capacity limited to around 3-4 items, although there are robust individual differences in this limit. Importantly, these individual differences are evident in neural measures of VWM capacity. Here, we capitalized on recent work showing that capacity is lower for more complex stimulus dimension. In particular, we asked whether individual differences in capacity remain consistent if capacity is shifted by a more demanding task, and, further, whether the correspondence between behavioral and neural measures holds across a shift in VWM capacity. Participants completed a change detection (CD) task with simple colors and complex shapes in an fMRI experiment. As expected, capacity was significantly lower for the shape dimension. Moreover, there were robust individual differences in behavioral estimates of VWM capacity across dimensions. Similarly, participants with a stronger BOLD response for color also showed a strong neural response for shape within the lateral occipital cortex, intraparietal sulcus (IPS), and superior IPS. Although there were robust individual differences in the behavioral and neural measures, we found little evidence of systematic brain-behavior correlations across feature dimensions. This suggests that behavioral and neural measures of capacity provide different views onto the processes that underlie VWM and CD. Recent theoretical approaches that attempt to bridge between behavioral and neural measures are well positioned to address these findings in future work.

  11. Quantum key distribution with an entangled light emitting diode

    Energy Technology Data Exchange (ETDEWEB)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Shields, A. J. [Toshiba Research Europe Limited, 208 Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Farrer, I.; Ritchie, D. A. [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom)

    2015-12-28

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  12. Bimodal voltage dependence of TRPA1: mutations of a key pore helix residue reveal strong intrinsic voltage-dependent inactivation.

    Science.gov (United States)

    Wan, Xia; Lu, Yungang; Chen, Xueqin; Xiong, Jian; Zhou, Yuanda; Li, Ping; Xia, Bingqing; Li, Min; Zhu, Michael X; Gao, Zhaobing

    2014-07-01

    Transient receptor potential A1 (TRPA1) is implicated in somatosensory processing and pathological pain sensation. Although not strictly voltage-gated, ionic currents of TRPA1 typically rectify outwardly, indicating channel activation at depolarized membrane potentials. However, some reports also showed TRPA1 inactivation at high positive potentials, implicating voltage-dependent inactivation. Here we report a conserved leucine residue, L906, in the putative pore helix, which strongly impacts the voltage dependency of TRPA1. Mutation of the leucine to cysteine (L906C) converted the channel from outward to inward rectification independent of divalent cations and irrespective to stimulation by allyl isothiocyanate. The mutant, but not the wild-type channel, displayed exclusively voltage-dependent inactivation at positive potentials. The L906C mutation also exhibited reduced sensitivity to inhibition by TRPA1 blockers, HC030031 and ruthenium red. Further mutagenesis of the leucine to all natural amino acids individually revealed that most substitutions at L906 (15/19) resulted in inward rectification, with exceptions of three amino acids that dramatically reduced channel activity and one, methionine, which mimicked the wild-type channel. Our data are plausibly explained by a bimodal gating model involving both voltage-dependent activation and inactivation of TRPA1. We propose that the key pore helix residue, L906, plays an essential role in responding to the voltage-dependent gating.

  13. Sarcopenia and sarcopenic obesity in comparison: prevalence, metabolic profile, and key differences. A cross-sectional study in Italian hospitalized elderly.

    Science.gov (United States)

    Perna, Simone; Peroni, Gabriella; Faliva, Milena Anna; Bartolo, Arianna; Naso, Maurizio; Miccono, Alessandra; Rondanelli, Mariangela

    2017-12-01

    The aim of this study is to identify the prevalence, assess the metabolic profile, and key differences (versus healthy) in a cohort of subjects with sarcopenia (S) and in sarcopenic obesity (SO) hospitalized elderly. A standardized comprehensive geriatric assessment was performed. We enrolled 639 elderly subjects (196 men, 443 women) with a mean age of 80.90 ± 7.77 years. Analysis of variance and a multinomial logistic regression analysis adjusting for covariates were used to assess the differences between groups. The prevalence of (S) was 12.42% in women and 23.47% in men. (SO) was 8.13% in women and 22.45% in men. Data showed that either groups had a functional impairment (Barthel index 15 mm/h), CPR (>0.50 mg/dl) homocysteine (>12 micromol/l), and hemoglobin (145 mcg/dl) was detected in either cohort (due to inflammation). (SO) had glycemia (>110 mg/dl). Key differences in (S) cohort (versus healthy) were a reduction in functional impairment (p Sarcopenia is closely linked to an increase in the risk of hip-femur fractures, inflammation, edema, and malnutrition. The (SO) subjects seem to benefit from the "obesity paradox."

  14. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  15. Dynamic Proteomic Characteristics and Network Integration Revealing Key Proteins for Two Kernel Tissue Developments in Popcorn.

    Directory of Open Access Journals (Sweden)

    Yongbin Dong

    Full Text Available The formation and development of maize kernel is a complex dynamic physiological and biochemical process that involves the temporal and spatial expression of many proteins and the regulation of metabolic pathways. In this study, the protein profiles of the endosperm and pericarp at three important developmental stages were analyzed by isobaric tags for relative and absolute quantification (iTRAQ labeling coupled with LC-MS/MS in popcorn inbred N04. Comparative quantitative proteomic analyses among developmental stages and between tissues were performed, and the protein networks were integrated. A total of 6,876 proteins were identified, of which 1,396 were nonredundant. Specific proteins and different expression patterns were observed across developmental stages and tissues. The functional annotation of the identified proteins revealed the importance of metabolic and cellular processes, and binding and catalytic activities for the development of the tissues. The whole, endosperm-specific and pericarp-specific protein networks integrated 125, 9 and 77 proteins, respectively, which were involved in 54 KEGG pathways and reflected their complex metabolic interactions. Confirmation for the iTRAQ endosperm proteins by two-dimensional gel electrophoresis showed that 44.44% proteins were commonly found. However, the concordance between mRNA level and the protein abundance varied across different proteins, stages, tissues and inbred lines, according to the gene cloning and expression analyses of four relevant proteins with important functions and different expression levels. But the result by western blot showed their same expression tendency for the four proteins as by iTRAQ. These results could provide new insights into the developmental mechanisms of endosperm and pericarp, and grain formation in maize.

  16. Sex differences in functional activation patterns revealed by increased emotion processing demands.

    Science.gov (United States)

    Hall, Geoffrey B C; Witelson, Sandra F; Szechtman, Henry; Nahmias, Claude

    2004-02-09

    Two [O(15)] PET studies assessed sex differences regional brain activation in the recognition of emotional stimuli. Study I revealed that the recognition of emotion in visual faces resulted in bilateral frontal activation in women, and unilateral right-sided activation in men. In study II, the complexity of the emotional face task was increased through tje addition of associated auditory emotional stimuli. Men again showed unilateral frontal activation, in this case to the left; whereas women did not show bilateral frontal activation, but showed greater limbic activity. These results suggest that when processing broader cross-modal emotional stimuli, men engage more in associative cognitive strategies while women draw more on primary emotional references.

  17. Key differences and similarities in ways of managing and supporting radical pharmaceutical front end innovation

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    2015-01-01

    of the Danish and US based pharmaceutical company, H. Lundbeck A/S, and a comparative study including five European and American pharmaceutical companies. The findings from the study reveal a number of similarities and differences in innovation management and FEI support of radical projects and among...... pharmaceutical companies, which represent a growing market. The value added and the contribution of this paper to the existing FEI literature is therefore in the specificity of the empirical setting in which the issue is investigated. Read More: http://www.worldscientific.com/doi/abs/10.1142/S1363919615500115...

  18. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  19. DNA-methylation profiling of fetal tissues reveals marked epigenetic differences between chorionic and amniotic samples.

    Directory of Open Access Journals (Sweden)

    Christel Eckmann-Scholz

    Full Text Available Epigenetic mechanisms including DNA methylation are supposed to play a key role in fetal development. Here we have investigated fetal DNA-methylation levels of 27,578 CpG loci in 47 chorionic villi (CVS and 16 amniotic cell (AC samples. Methylation levels differed significantly between karyotypically normal AC and CVS for 2,014 genes. AC showed more extreme DNA-methylation levels of these genes than CVS and the differentially methylated genes are significantly enriched for processes characteristic for the different cell types sampled. Furthermore, we identified 404 genes differentially methylated in CVS with trisomy 21. These genes were significantly enriched for high CG dinucleotid (CpG content and developmental processes associated with Down syndrome. Our study points to major tissue-specific differences of fetal DNA-methylation and gives rise to the hypothesis that part of the Down syndrome phenotype is epigenetically programmed in the first trimester of pregnancy.

  20. Transcriptome Analysis of Ullrich Congenital Muscular Dystrophy Fibroblasts Reveals a Disease Extracellular Matrix Signature and Key Molecular Regulators.

    Directory of Open Access Journals (Sweden)

    Sonia Paco

    Full Text Available Collagen VI related myopathies encompass a range of phenotypes with involvement of skeletal muscle, skin and other connective tissues. They represent a severe and relatively common form of congenital disease for which there is no treatment. Collagen VI in skeletal muscle and skin is produced by fibroblasts.In order to gain insight into the consequences of collagen VI mutations and identify key disease pathways we performed global gene expression analysis of dermal fibroblasts from patients with Ullrich Congenital Muscular Dystrophy with and without vitamin C treatment. The expression data were integrated using a range of systems biology tools. Results were validated by real-time PCR, western blotting and functional assays.We found significant changes in the expression levels of almost 600 genes between collagen VI deficient and control fibroblasts. Highly regulated genes included extracellular matrix components and surface receptors, including integrins, indicating a shift in the interaction between the cell and its environment. This was accompanied by a significant increase in fibroblasts adhesion to laminin. The observed changes in gene expression profiling may be under the control of two miRNAs, miR-30c and miR-181a, which we found elevated in tissue and serum from patients and which could represent novel biomarkers for muscular dystrophy. Finally, the response to vitamin C of collagen VI mutated fibroblasts significantly differed from healthy fibroblasts. Vitamin C treatment was able to revert the expression of some key genes to levels found in control cells raising the possibility of a beneficial effect of vitamin C as a modulator of some of the pathological aspects of collagen VI related diseases.

  1. The Chlamydomonas Genome Reveals the Evolution of Key Animal and Plant Functions

    Energy Technology Data Exchange (ETDEWEB)

    Merchant, Sabeeha S

    2007-04-09

    Chlamydomonas reinhardtii is a unicellular green alga whose lineage diverged from land plants over 1 billion years ago. It is a model system for studying chloroplast-based photosynthesis, as well as the structure, assembly, and function of eukaryotic flagella (cilia), which were inherited from the common ancestor of plants and animals, but lost in land plants. We sequenced the 120-megabase nuclear genome of Chlamydomonas and performed comparative phylogenomic analyses, identifying genes encoding uncharacterized proteins that are likely associated with the function and biogenesis of chloroplasts or eukaryotic flagella. Analyses of the Chlamydomonas genome advance our understanding of the ancestral eukaryotic cell, reveal previously unknown genes associated with photosynthetic and flagellar functions, and establish links between ciliopathy and the composition and function of flagella.

  2. Myelin structure is a key difference in the x-ray scattering signature between meningioma, schwannoma and glioblastoma multiforme

    International Nuclear Information System (INIS)

    Falzon, G; Pearson, S; Murison, R; Hall, C; Siu, K; Round, A; Schueltke, E; Kaye, A H; Lewis, R

    2007-01-01

    Small angle x-ray scattering (SAXS) patterns of benign and malignant brain tumour tissue were examined. Independent component analysis was used to find a feature set representing the images collected. A set of coefficients was then used to describe each image, which allowed the use of the statistical technique of flexible discriminant analysis to discover a hidden order in the data set. The key difference was found to be in the intensity and spectral content of the second and fourth order myelin scattering peaks. This has clearly demonstrated that significant differences in the structure of myelin exist in the highly malignant glioblastoma multiforme as opposed to the benign: meningioma and schwannoma

  3. THE EFFECT OF TEACHING WITHIN-TEXT KEY WORDS ON STUDENTS’ PERFORMANCE IN READING COMPREHENSION

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Khodasenas

    2013-07-01

    Full Text Available Abstract: The present study was conducted to investigate the effects of teaching within-text key word synonyms, opposites and related words on students’ performance on reading comprehension of TOEFL among Iranian EFL learners. To carry out the research, 60 Iranian EFL learners, who participated in a TOEFL preparation course, were selected as the participants of the study. Afterward they were randomly assigned into experimental and comparison groups. The experimental group was given a treatment including within-text key word synonyms, opposites and their translations, while the comparison group was given a placebo. To collect the required data, two instruments (a pre-test, and a post-test were administered to both groups during the experimentation. Subsequently, students’ scores were collected through the administration of different tests and the results were statistically analyzed. The results of these analyses revealed that the experimental group outperformed the comparison group and thus, it was concluded that teaching within-text key word synonyms, opposites and related words can improve the reading comprehension ability and general proficiency of EFL language learners.

  4. Comparative Transcriptome Analysis Reveals Different Silk Yields of Two Silkworm Strains.

    Directory of Open Access Journals (Sweden)

    Juan Li

    Full Text Available Cocoon and silk yields are the most important characteristics of sericulture. However, few studies have examined the genes that modulate these features. Further studies of these genes will be useful for improving the products of sericulture. JingSong (JS and Lan10 (L10 are two strains having significantly different cocoon and silk yields. In the current study, RNA-Seq and quantitative polymerase chain reaction (qPCR were performed on both strains in order to determine divergence of the silk gland, which controls silk biosynthesis in silkworms. Compared with L10, JS had 1375 differentially expressed genes (DEGs; 738 up-regulated genes and 673 down-regulated genes. Nine enriched gene ontology (GO terms were identified by GO enrichment analysis based on these DEGs. KEGG enrichment analysis results showed that the DEGs were enriched in three pathways, which were mainly associated with the processing and biosynthesis of proteins. The representative genes in the enrichment pathways and ten significant DEGs were further verified by qPCR, the results of which were consistent with the RNA-Seq data. Our study has revealed differences in silk glands between the two silkworm strains and provides a perspective for understanding the molecular mechanisms determining silk yield.

  5. Development of an SSR-based identification key for Tunisian local almonds

    Directory of Open Access Journals (Sweden)

    Hassouna Gouta

    2012-04-01

    Full Text Available Ten simple sequence repeat (SSR loci were used to study polymorphism in 54 almond genotypes. All genotypes used in this study originated from almond-growing areas in Tunisia with different climatic conditions ranging from the sub-humid to the arid and are preserved in the national collection at Sidi Bouzid. Using ten SSR, 130 alleles and 250 genotypes were revealed. In order to develop an identification key for each accession, the data were analysed separately for each microsatellite marker. The most polymorphic microsatellite (CPDCT042 was used as a first marker. Two microsatellite loci (CPDCT042 and CPDCT025 were sufficient to discriminate among all accessions studied. Neighbour-joining clustering and principal coordinate analysis were performed to arrange the genotypes according to their genetic relationships and origin. The results are discussed in the context of almond collection management, conformity checks, identification of homonyms, and screening of the local almond germplasm. Furthermore, this microsatellite-based key is a first step toward a marker-assisted identification almond database.

  6. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  7. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  8. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  9. High Pressure ZZ-Exchange NMR Reveals Key Features of Protein Folding Transition States.

    Science.gov (United States)

    Zhang, Yi; Kitazawa, Soichiro; Peran, Ivan; Stenzoski, Natalie; McCallum, Scott A; Raleigh, Daniel P; Royer, Catherine A

    2016-11-23

    Understanding protein folding mechanisms and their sequence dependence requires the determination of residue-specific apparent kinetic rate constants for the folding and unfolding reactions. Conventional two-dimensional NMR, such as HSQC experiments, can provide residue-specific information for proteins. However, folding is generally too fast for such experiments. ZZ-exchange NMR spectroscopy allows determination of folding and unfolding rates on much faster time scales, yet even this regime is not fast enough for many protein folding reactions. The application of high hydrostatic pressure slows folding by orders of magnitude due to positive activation volumes for the folding reaction. We combined high pressure perturbation with ZZ-exchange spectroscopy on two autonomously folding protein domains derived from the ribosomal protein, L9. We obtained residue-specific apparent rates at 2500 bar for the N-terminal domain of L9 (NTL9), and rates at atmospheric pressure for a mutant of the C-terminal domain (CTL9) from pressure dependent ZZ-exchange measurements. Our results revealed that NTL9 folding is almost perfectly two-state, while small deviations from two-state behavior were observed for CTL9. Both domains exhibited large positive activation volumes for folding. The volumetric properties of these domains reveal that their transition states contain most of the internal solvent excluded voids that are found in the hydrophobic cores of the respective native states. These results demonstrate that by coupling it with high pressure, ZZ-exchange can be extended to investigate a large number of protein conformational transitions.

  10. NASA's Chandra Reveals Origin of Key Cosmic Explosions

    Science.gov (United States)

    2010-02-01

    WASHINGTON -- New findings from NASA's Chandra X-ray Observatory have provided a major advance in understanding a type of supernova critical for studying the dark energy that astronomers think pervades the universe. The results show mergers of two dense stellar remnants are the likely cause of many of the supernovae that have been used to measure the accelerated expansion of the universe. These supernovae, called Type Ia, serve as cosmic mile markers to measure expansion of the universe because they can be seen at large distances, and they follow a reliable pattern of brightness. However, until now, scientists have been unsure what actually causes the explosions. "These are such critical objects in understanding the universe," said Marat Gilfanov of the Max Planck Institute for Astrophysics in Germany and lead author of the study that appears in the Feb. 18 edition of the journal Nature. "It was a major embarrassment that we did not know how they worked. Now we are beginning to understand what lights the fuse of these explosions." Most scientists agree a Type Ia supernova occurs when a white dwarf star -- a collapsed remnant of an elderly star -- exceeds its weight limit, becomes unstable and explodes. Scientists have identified two main possibilities for pushing the white dwarf over the edge: two white dwarfs merging or accretion, a process in which the white dwarf pulls material from a sun-like companion star until it exceeds its weight limit. "Our results suggest the supernovae in the galaxies we studied almost all come from two white dwarfs merging," said co-author Akos Bogdan, also of Max Planck. "This is probably not what many astronomers would expect." The difference between these two scenarios may have implications for how these supernovae can be used as "standard candles" -- objects of a known brightness -- to track vast cosmic distances. Because white dwarfs can come in a range of masses, the merger of two could result in explosions that vary somewhat in

  11. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Destination image and key drivers of perceived destination attractiveness

    Directory of Open Access Journals (Sweden)

    Josip Mikulić

    2008-12-01

    Full Text Available In this exploratory study authors combine several approaches to explore the images of two highly attractive tourist destinations: Hawai’i and Croatia. Two convenience samples were used: the image of Hawai’i was measured among Croatian undergraduate business students, and the image of Croatia was measured among Hawaiian tourism students. Functional and psychological image components were assessed at both a holistic and the attribute level. In addition, an importance-perception analysis was performed to assess the degree to which the destination image at the attribute level coincides with the students’ perception of an optimal destination. Finally, the authors conduct an importance grid analysis to explore the key drivers of the overall perceived destination attractiveness. The results provide a detailed insight into the images of Croatia and Hawaii, and reveal several interesting differences between the two student samples.

  13. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  14. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  15. Whole genome mRNA transcriptomics analysis reveals different modes of action of the diarrheic shellfish poisons okadaic acid and dinophysis toxin-1 versus azaspiracid-1 in Caco-2 cells.

    Science.gov (United States)

    Bodero, Marcia; Hoogenboom, Ron L A P; Bovee, Toine F H; Portier, Liza; de Haan, Laura; Peijnenburg, Ad; Hendriksen, Peter J M

    2018-02-01

    A study with DNA microarrays was performed to investigate the effects of two diarrhetic and one azaspiracid shellfish poison, okadaic acid (OA), dinophysistoxin-1 (DTX-1) and azaspiracid-1 (AZA-1) respectively, on the whole-genome mRNA expression of undifferentiated intestinal Caco-2 cells. Previously, the most responding genes were used to develop a dedicated array tube test to screen shellfish samples on the presence of these toxins. In the present study the whole genome mRNA expression was analyzed in order to reveal modes of action and obtain hints on potential biomarkers suitable to be used in alternative bioassays. Effects on key genes in the most affected pathways and processes were confirmed by qPCR. OA and DTX-1 induced almost identical effects on mRNA expression, which strongly indicates that OA and DTX-1induce similar toxic effects. Biological interpretation of the microarray data indicates that both compounds induce hypoxia related pathways/processes, the unfolded protein response (UPR) and endoplasmic reticulum (ER) stress. The gene expression profile of AZA-1 is different and shows increased mRNA expression of genes involved in cholesterol synthesis and glycolysis, suggesting a different mode of action for this toxin. Future studies should reveal whether identified pathways provide suitable biomarkers for rapid detection of DSPs in shellfish. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Augmented Input Reveals Word Deafness in a Man with Frontotemporal Dementia

    Directory of Open Access Journals (Sweden)

    Chris Gibbons

    2012-01-01

    Full Text Available We describe a 57 year old, right handed, English speaking man initially diagnosed with progressive aphasia. Language assessment revealed inconsistent performance in key areas. Expressive language was reduced to a few short, perseverative phrases. Speech was severely apraxic. Primary modes of communication included gesture, pointing, gaze, physical touch and leading. Responses were 100% accurate when he was provided with written words, with random or inaccurate responses for strictly auditory/verbal input. When instructions to subsequent neuropsychological tests were written instead of spoken, performance improved markedly. A comprehensive audiology assessment revealed no hearing impairment. Neuroimaging was unremarkable. Neurobehavioral evaluation utilizing written input led to diagnoses of word deafness and frontotemporal dementia, resulting in very different management. We highlight the need for alternative modes of language input for assessment and treatment of patients with language comprehension symptoms.

  17. Integrated genomics of Mucorales reveals novel therapeutic targets

    Science.gov (United States)

    Mucormycosis is a life-threatening infection caused by Mucorales fungi. We sequenced 30 fungal genomes and performed transcriptomics with three representative Rhizopus and Mucor strains with human airway epithelial cells during fungal invasion to reveal key host and fungal determinants contributing ...

  18. Analysis of biostimulated microbial communities from two field experiments reveals temporal and spatial differences in proteome profiles

    Energy Technology Data Exchange (ETDEWEB)

    Callister, S.J.; Wilkins, M.J.; Nicora, C.D.; Williams, K.H.; Banfield, J.F.; VerBerkmoes, N.C.; Hettich, R.L.; NGuessan, A.L.; Mouser, P.J.; Elifantz, H.; Smith, R.D.; Lovley, D.R.; Lipton, M.S.; Long, P.E.

    2010-07-15

    Stimulated by an acetate-amendment field experiment conducted in 2007, anaerobic microbial populations in the aquifer at the Rifle Integrated Field Research Challenge site in Colorado reduced mobile U(VI) to insoluble U(IV). During this experiment, planktonic biomass was sampled at various time points to quantitatively evaluate proteomes. In 2008, an acetate-amended field experiment was again conducted in a similar manner to the 2007 experiment. As there was no comprehensive metagenome sequence available for use in proteomics analysis, we systematically evaluated 12 different organism genome sequences to generate sets of aggregate genomes, or “pseudo-metagenomes”, for supplying relative quantitative peptide and protein identifications. Proteomics results support previous observations of the dominance of Geobacteraceae during biostimulation using acetate as sole electron donor, and revealed a shift from an early stage of iron reduction to a late stage of iron reduction. Additionally, a shift from iron reduction to sulfate reduction was indicated by changes in the contribution of proteome information contributed by different organism genome sequences within the aggregate set. In addition, the comparison of proteome measurements made between the 2007 field experiment and 2008 field experiment revealed differences in proteome profiles. These differences may be the result of alterations in abundance and population structure within the planktonic biomass samples collected for analysis.

  19. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  20. The Choice of Canned Whole Peeled Tomatoes is Driven by Different Key Quality Attributes Perceived by Consumers Having Different Familiarity with the Product.

    Science.gov (United States)

    Frez-Muñoz, Lucía; Steenbekkers, Bea Lpa; Fogliano, Vincenzo

    2016-12-01

    Canned whole peeled tomatoes are a premium tomato product; however, no information is available about the key intrinsic and extrinsic quality attributes perceived by consumers when buying this product. This research considered consumers differing in the level of familiarity with peeled tomatoes, that is, knowledge, frequency of consumption, and availability of this product, on 3 markets: Chile (low), The Netherlands (medium), and Italy (high). The perceptions and preferences of each group were studied using first focus groups and subsequently conjoint analysis in order to identify the key quality attributes leading their preferences for this product. Focus groups identified 7 intrinsic attributes (color, packing medium, tomato consistency, acidity level, sweetness level, extra ingredients, and intensity of product taste), and 5 extrinsic attributes (packaging material, product type, country of origin, brand, and label design). Significant variations according to the familiarity were found. The conjoint analyses showed that color of tomatoes was the most important intrinsic quality attribute for all groups, while packaging material was the most important extrinsic quality attribute for Chileans and Dutch, being a glass container or a can with easy open the preferred packaging for respective groups. In contrast, country of origin was the most important parameter for Italians. We concluded that intrinsic and extrinsic attributes were strongly influenced by the degree of familiarity with canned whole peeled tomatoes. © 2016 Institute of Food Technologists®.

  1. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  2. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  3. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  4. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  5. A Case Study of American and Chinese College Students' Motivation Differences in Online Learning Environment

    Science.gov (United States)

    Zhao, Chunjuan; Mei, Zongxiang

    2016-01-01

    Motivating students has been a key challenge facing instructors in non-face-to-face instructional contexts. Existing researches into motivation in online learning environment have revealed that there are learning motivation differences among students from different cultural backgrounds. The purpose of this study is to identify whether American and…

  6. Microarray analysis reveals key genes and pathways in Tetralogy of Fallot

    Science.gov (United States)

    He, Yue-E; Qiu, Hui-Xian; Jiang, Jian-Bing; Wu, Rong-Zhou; Xiang, Ru-Lian; Zhang, Yuan-Hai

    2017-01-01

    The aim of the present study was to identify key genes that may be involved in the pathogenesis of Tetralogy of Fallot (TOF) using bioinformatics methods. The GSE26125 microarray dataset, which includes cardiovascular tissue samples derived from 16 children with TOF and five healthy age-matched control infants, was downloaded from the Gene Expression Omnibus database. Differential expression analysis was performed between TOF and control samples to identify differentially expressed genes (DEGs) using Student's t-test, and the R/limma package, with a log2 fold-change of >2 and a false discovery rate of <0.01 set as thresholds. The biological functions of DEGs were analyzed using the ToppGene database. The ReactomeFIViz application was used to construct functional interaction (FI) networks, and the genes in each module were subjected to pathway enrichment analysis. The iRegulon plugin was used to identify transcription factors predicted to regulate the DEGs in the FI network, and the gene-transcription factor pairs were then visualized using Cytoscape software. A total of 878 DEGs were identified, including 848 upregulated genes and 30 downregulated genes. The gene FI network contained seven function modules, which were all comprised of upregulated genes. Genes enriched in Module 1 were enriched in the following three neurological disorder-associated signaling pathways: Parkinson's disease, Alzheimer's disease and Huntington's disease. Genes in Modules 0, 3 and 5 were dominantly enriched in pathways associated with ribosomes and protein translation. The Xbox binding protein 1 transcription factor was demonstrated to be involved in the regulation of genes encoding the subunits of cytoplasmic and mitochondrial ribosomes, as well as genes involved in neurodegenerative disorders. Therefore, dysfunction of genes involved in signaling pathways associated with neurodegenerative disorders, ribosome function and protein translation may contribute to the pathogenesis of TOF

  7. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  8. Schizoaffective disorder diagnosed according to different diagnostic criteria--systematic literature search and meta-analysis of key clinical characteristics and heterogeneity.

    Science.gov (United States)

    Pagel, Tobias; Franklin, Jeremy; Baethge, Christopher

    2014-03-01

    Schizoaffective disorder is viewed as a heterogeneous diagnosis among psychotic illnesses. Different diagnostic systems differ in their definition with DSM (-IIIR, -IV, and -V) providing a narrower definition than RDC and ICD-10. It is unclear whether this difference is reflected in patient samples diagnosed according to different diagnostic systems. Exploratory study based on a systematic review of studies of schizoaffective disorder samples diagnosed by either RDC and ICD-10 (group of "broad criteria") or DSM-IIIR and -IV ("narrow criteria"); comparison (by Mann-Whitney-U-tests) of key characteristics, such as age, number of hospitalizations, or scores in psychometric tests, between more broadly and more narrowly defined schizoaffective disorder samples using standard deviations as a measurement of heterogeneity as well as weighted means and percentages. To reduce selection bias only studies including schizoaffective patient samples together with affective disorder and schizophrenia samples were selected. 55 studies were included, 14 employing RDC, 4 ICD-10, 20 DSM-IIIR, and 17 DSM-IV. Thirteen characteristics were compared: patients diagnosed according to broader criteria had fewer previous hospitalizations (2.2 vs. 5.4) and were both less often male (42 vs. 51%) and married (21 vs. 40%). Heterogeneity was similar in both groups but slightly higher in RDC and ICD-10 samples than in DSM-IIIR and -IV-samples: +4% regarding demographic and clinical course data and +13% regarding psychometric tests (pooled SD). Secular trends and different designs may have confounded the results and limit generalizability. Some comparisons were underpowered. Differences in diagnostic criteria are reflected in key characteristics of samples. The association of larger heterogeneity with wider diagnostic criteria supports employing standard deviations as a measurement of heterogeneity. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Present status and environmental implications of the different fuel cycles. Key issue paper no. 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    For decades plutonium has been a key focus of international discussions of both non-proliferation and the future of the nuclear fuel cycle. This paper is intended to address the management of separated plutonium in the civil fuel cycle in the near term - until 2015 - describing both the technologies employed and the policies of key countries. This paper also addresses technology and policy for the management of weapons plutonium being declared excess to defence needs. Refs, figs, tabs.

  10. Comparative analysis of fungal genomes reveals different plant cell wall degrading capacity in fungi

    Science.gov (United States)

    2013-01-01

    Background Fungi produce a variety of carbohydrate activity enzymes (CAZymes) for the degradation of plant polysaccharide materials to facilitate infection and/or gain nutrition. Identifying and comparing CAZymes from fungi with different nutritional modes or infection mechanisms may provide information for better understanding of their life styles and infection models. To date, over hundreds of fungal genomes are publicly available. However, a systematic comparative analysis of fungal CAZymes across the entire fungal kingdom has not been reported. Results In this study, we systemically identified glycoside hydrolases (GHs), polysaccharide lyases (PLs), carbohydrate esterases (CEs), and glycosyltransferases (GTs) as well as carbohydrate-binding modules (CBMs) in the predicted proteomes of 103 representative fungi from Ascomycota, Basidiomycota, Chytridiomycota, and Zygomycota. Comparative analysis of these CAZymes that play major roles in plant polysaccharide degradation revealed that fungi exhibit tremendous diversity in the number and variety of CAZymes. Among them, some families of GHs and CEs are the most prevalent CAZymes that are distributed in all of the fungi analyzed. Importantly, cellulases of some GH families are present in fungi that are not known to have cellulose-degrading ability. In addition, our results also showed that in general, plant pathogenic fungi have the highest number of CAZymes. Biotrophic fungi tend to have fewer CAZymes than necrotrophic and hemibiotrophic fungi. Pathogens of dicots often contain more pectinases than fungi infecting monocots. Interestingly, besides yeasts, many saprophytic fungi that are highly active in degrading plant biomass contain fewer CAZymes than plant pathogenic fungi. Furthermore, analysis of the gene expression profile of the wheat scab fungus Fusarium graminearum revealed that most of the CAZyme genes related to cell wall degradation were up-regulated during plant infection. Phylogenetic analysis also

  11. EFFICACY AND SAFETY OF THE INFLUENZA VACCINE AMONG CHILDREN WITH DIFFERENT HEALTH CONDITIONS

    OpenAIRE

    M.G. Galitskaya

    2007-01-01

    Efficacy and safety of vaccine «Grippol» among children with different health status was analyzed. The most efficacy of the influenza vaccine revealed in the group of children with compromised health status, as well as in the group of allergic children. The safety of influenza vaccination was confirmed in children with different health conditions.Key words: children, vaccination, influenza, efficacy, safety.

  12. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  13. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Science.gov (United States)

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  14. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  15. The ultimate security bounds of quantum key distribution protocols

    International Nuclear Information System (INIS)

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  16. Common brain regions underlying different arithmetic operations as revealed by conjunct fMRI-BOLD activation.

    Science.gov (United States)

    Fehr, Thorsten; Code, Chris; Herrmann, Manfred

    2007-10-03

    The issue of how and where arithmetic operations are represented in the brain has been addressed in numerous studies. Lesion studies suggest that a network of different brain areas are involved in mental calculation. Neuroimaging studies have reported inferior parietal and lateral frontal activations during mental arithmetic using tasks of different complexities and using different operators (addition, subtraction, etc.). Indeed, it has been difficult to compare brain activation across studies because of the variety of different operators and different presentation modalities used. The present experiment examined fMRI-BOLD activity in participants during calculation tasks entailing different arithmetic operations -- addition, subtraction, multiplication and division -- of different complexities. Functional imaging data revealed a common activation pattern comprising right precuneus, left and right middle and superior frontal regions during all arithmetic operations. All other regional activations were operation specific and distributed in prominently frontal, parietal and central regions when contrasting complex and simple calculation tasks. The present results largely confirm former studies suggesting that activation patterns due to mental arithmetic appear to reflect a basic anatomical substrate of working memory, numerical knowledge and processing based on finger counting, and derived from a network originally related to finger movement. We emphasize that in mental arithmetic research different arithmetic operations should always be examined and discussed independently of each other in order to avoid invalid generalizations on arithmetics and involved brain areas.

  17. Analysis of selected methods for the recovery of encrypted WEP key

    Science.gov (United States)

    Wójtowicz, Sebastian; Belka, Radosław

    2014-11-01

    This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  20. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  1. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  2. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  3. Hydra meiosis reveals unexpected conservation of structural synaptonemal complex proteins across metazoans.

    Science.gov (United States)

    Fraune, Johanna; Alsheimer, Manfred; Volff, Jean-Nicolas; Busch, Karoline; Fraune, Sebastian; Bosch, Thomas C G; Benavente, Ricardo

    2012-10-09

    The synaptonemal complex (SC) is a key structure of meiosis, mediating the stable pairing (synapsis) of homologous chromosomes during prophase I. Its remarkable tripartite structure is evolutionarily well conserved and can be found in almost all sexually reproducing organisms. However, comparison of the different SC protein components in the common meiosis model organisms Saccharomyces cerevisiae, Arabidopsis thaliana, Caenorhabditis elegans, Drosophila melanogaster, and Mus musculus revealed no sequence homology. This discrepancy challenged the hypothesis that the SC arose only once in evolution. To pursue this matter we focused on the evolution of SYCP1 and SYCP3, the two major structural SC proteins of mammals. Remarkably, our comparative bioinformatic and expression studies revealed that SYCP1 and SYCP3 are also components of the SC in the basal metazoan Hydra. In contrast to previous assumptions, we therefore conclude that SYCP1 and SYCP3 form monophyletic groups of orthologous proteins across metazoans.

  4. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  5. Revealing metabolomic variations in Cortex Moutan from different root parts using HPLC-MS method.

    Science.gov (United States)

    Xiao, Chaoni; Wu, Man; Chen, Yongyong; Zhang, Yajun; Zhao, Xinfeng; Zheng, Xiaohui

    2015-01-01

    The distribution of metabolites in the different root parts of Cortex Moutan (the root bark of Paeonia suffruticosa Andrews) is not well understood, therefore, scientific evidence is not available for quality assessment of Cortex Moutan. To reveal metabolomic variations in Cortex Moutan in order to gain deeper insights to enable quality control. Metabolomic variations in the different root parts of Cortex Moutan were characterised using high-performance liquid chromatography combined with mass spectrometry (HPLC-MS) and multivariate data analysis. The discriminating metabolites in different root parts were evaluated by the one-way analysis of variance and a fold change parameter. The metabolite profiles of Cortex Moutan were largely dominated by five primary and 41 secondary metabolites . Higher levels of malic acid, gallic acid and mudanoside-B were mainly observed in the second lateral roots, whereas dihydroxyacetophenone, benzoyloxypaeoniflorin, suffruticoside-A, kaempferol dihexoside, mudanpioside E and mudanpioside J accumulated in the first lateral and axial roots. The highest contents of paeonol, galloyloxypaeoniflorin and procyanidin B were detected in the axial roots. Accordingly, metabolite compositions of Cortex Moutan were found to vary among different root parts. The axial roots have higher quality than the lateral roots in Cortex Moutan due to the accumulation of bioactive secondary metabolites associated with plant physiology. These findings provided important scientific evidence for grading Cortex Moutan on the general market. Copyright © 2014 John Wiley & Sons, Ltd.

  6. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  7. Museum specimens reveal loss of pollen host plants as key factor driving wild bee decline in The Netherlands

    NARCIS (Netherlands)

    Scheper, J.A.; Reemer, M.; Kats, van R.J.M.; Ozinga, W.A.; Linden, van der G.T.J.; Schaminee, J.H.J.; Siepel, H.; Kleijn, D.

    2014-01-01

    Evidence for declining populations of both wild and managed bees has raised concern about a potential global pollination crisis. Strategies to mitigate bee loss generally aim to enhance floral resources. However, we do not really know whether loss of preferred floral resources is the key driver of

  8. Gender disparities in high-quality research revealed by Nature Index journals.

    Science.gov (United States)

    Bendels, Michael H K; Müller, Ruth; Brueggmann, Doerthe; Groneberg, David A

    2018-01-01

    The present study aims to elucidate the state of gender equality in high-quality research by analyzing the representation of female authorships in the last decade (from 2008 to 2016). Based on the Gendermetrics platform, 293,557 research articles from 54 journals listed in the Nature Index were considered covering the categories Life Science, Multidisciplinary, Earth & Environmental and Chemistry. The core method was the combined analysis of the proportion of female authorships and the female-to-male odds ratio for first, co- and last authorships. The distribution of prestigious authorships was measured by the Prestige Index. 29.8% of all authorships and 33.1% of the first, 31.8% of the co- and 18.1% of the last authorships were held by women. The corresponding female-to-male odds ratio is 1.19 (CI: 1.18-1.20) for first, 1.35 (CI: 1.34-1.36) for co- and 0.47 (CI: 0.46-0.48) for last authorships. Women are underrepresented at prestigious authorships compared to men (Prestige Index = -0.42). The underrepresentation accentuates in highly competitive articles attracting the highest citation rates, namely, articles with many authors and articles that were published in highest-impact journals. More specifically, a large negative correlation between the 5-Year-Impact-Factor of a journal and the female representation at prestigious authorships was revealed (r(52) = -.63, P authorships) and are underrepresented at productivity levels of more than 2 articles per author. Articles with female key authors are less frequently cited than articles with male key authors. The gender-specific differences in citation rates increase the more authors contribute to an article. Distinct differences at the journal, journal category, continent and country level were revealed. The prognosis for the next decades forecast a very slow harmonization of authorships odds between the two genders.

  9. KEY COMPARISONS: Final report: SIM regional comparison of ac-dc voltage transfer difference (SIM.EM.K6a, SIM.EM-K9 and SIM.EM-K11)

    Science.gov (United States)

    Campos, Sara; Filipski, Piotr; Izquierdo, Daniel; Afonso, Edson; Landim, Régis P.; Di Lillo, Lucas; Lipe, Thomas

    2009-01-01

    Three comparisons of ac-dc voltage transfer difference held from January to December 2004 are reported. Six NMIs in the SIM region took part: NRC (Canada), NIST (United States of America), CENAM (Mexico), INTI (Argentina), UTE (Uruguay) and INMETRO (Brazil). The comparisons were proposed to assess the measurement capabilities in ac-dc voltage transfer difference of the NMIs in the SIM region. The test points were selected to link the results with the equivalent CCEM Key Comparisons, through three NMIs participating in both SIM and CCEM key comparisons. Additionally, a SIM.EM-Supplementary comparison was proposed, in support of the SIM NMIs' power/energy meter calibration capabilities. One technical protocol and one travelling standard were used, to economize on time and resources. The report shows the degree of equivalence in the SIM region and also the degree of equivalence with the corresponding CCEM reference value. The results of all participants support the values and uncertainties of the applicable CMC entries for ac-dc voltage transfer difference in the Key Comparison Database held at the BIPM. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  10. Secretomes of Mycoplasma hyopneumoniae and Mycoplasma flocculare reveal differences associated to pathogenesis.

    Science.gov (United States)

    Paes, Jéssica A; Lorenzatto, Karina R; de Moraes, Sofia N; Moura, Hercules; Barr, John R; Ferreira, Henrique B

    2017-02-10

    Mycoplasma hyopneumoniae and Mycoplasma flocculare cohabit the porcine respiratory tract. However, M. hyopneumoniae causes the porcine enzootic pneumonia, while M. flocculare is a commensal bacterium. Comparative analyses demonstrated high similarity between these species, which includes the sharing of all predicted virulence factors. Nevertheless, studies related to soluble secretomes of mycoplasmas were little known, although they are important for bacterial-host interactions. The aim of this study was to perform a comparative analysis between the soluble secreted proteins repertoires of the pathogenic Mycoplasma hyopneumoniae and its closely related commensal Mycoplasma flocculare. For that, bacteria were cultured in medium with reduced serum concentration and secreted proteins were identified by a LC-MS/MS proteomics approach. Altogether, 62 and 26 proteins were identified as secreted by M. hyopneumoniae and M. flocculare, respectively, being just seven proteins shared between these bacteria. In M. hyopneumoniae secretome, 15 proteins described as virulence factors were found; while four putative virulence factors were identified in M. flocculare secretome. For the first time, clear differences related to virulence were found between these species, helping to elucidate the pathogenic nature of M. hyopneumoniae to swine hosts. For the first time, the secretomes of two porcine respiratory mycoplasmas, namely the pathogenic M. hyopneumoniae and the commensal M. flocculare were compared. The presented results revealed previously unknown differences between these two genetically related species, some of which are associated to the M. hyopneumoniae ability to cause porcine enzootic pneumonia. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  12. Sex differences in neural and behavioral signatures of cooperation revealed by fNIRS hyperscanning

    Science.gov (United States)

    Baker, Joseph M.; Liu, Ning; Cui, Xu; Vrticka, Pascal; Saggar, Manish; Hosseini, S. M. Hadi; Reiss, Allan L.

    2016-01-01

    Researchers from multiple fields have sought to understand how sex moderates human social behavior. While over 50 years of research has revealed differences in cooperation behavior of males and females, the underlying neural correlates of these sex differences have not been explained. A missing and fundamental element of this puzzle is an understanding of how the sex composition of an interacting dyad influences the brain and behavior during cooperation. Using fNIRS-based hyperscanning in 111 same- and mixed-sex dyads, we identified significant behavioral and neural sex-related differences in association with a computer-based cooperation task. Dyads containing at least one male demonstrated significantly higher behavioral performance than female/female dyads. Individual males and females showed significant activation in the right frontopolar and right inferior prefrontal cortices, although this activation was greater in females compared to males. Female/female dyad’s exhibited significant inter-brain coherence within the right temporal cortex, while significant coherence in male/male dyads occurred in the right inferior prefrontal cortex. Significant coherence was not observed in mixed-sex dyads. Finally, for same-sex dyads only, task-related inter-brain coherence was positively correlated with cooperation task performance. Our results highlight multiple important and previously undetected influences of sex on concurrent neural and behavioral signatures of cooperation. PMID:27270754

  13. Morphometric differences in planum temporale in schizophrenia and bipolar disorder revealed by statistical analysis of Labeled Cortical Depth Maps

    Directory of Open Access Journals (Sweden)

    J Tilak eRatnanather

    2014-08-01

    Full Text Available Differences in cortical thickness in the lateral temporal lobe, including the planum temporale (PT, have been reported in MRI studies of schizophrenia (SCZ and bipolar disorder (BPD patients. Most of these studies have used a single-valued global or local measure for thickness. However, additional and complementary information can be obtained by generating Labelled Cortical Depth Maps (LCDMs, which are distances of labeled gray matter voxels from the nearest point on the gray/white matter (inner cortical surface. Statistical analyses of pooled and censored LCDM distances reveal subtle differences in PT between SCZ and BPD groups from data generated by Ratnanather et al. (Schizophrenia Research, http://dx.doi.org/10.1016/j.schres.2013.08.014. These results confirm that the left PT (LPT is more sensitive than the right PT in distinguishing between SCZ, BPD and healthy controls. Also confirmed is a strong gender effect, with a thicker PT seen in males than in females. The differences between groups at smaller distances in the LPT revealed by pooled and censored LCDM analysis suggest that SCZ and BPD have different effects on the cortical mantle close to the gray/white matter surface. This is consistent with reported subtle changes in the cortical mantle observed in postmortem studies.

  14. Identification of TOEFAZ1-interacting proteins reveals key regulators of Trypanosoma brucei cytokinesis.

    Science.gov (United States)

    Hilton, Nicholas A; Sladewski, Thomas E; Perry, Jenna A; Pataki, Zemplen; Sinclair-Davis, Amy N; Muniz, Richard S; Tran, Holly L; Wurster, Jenna I; Seo, Jiwon; de Graffenried, Christopher L

    2018-05-21

    The protist parasite Trypanosoma brucei is an obligate extracellular pathogen that retains its highly-polarized morphology during cell division and has evolved a novel cytokinetic process independent of non-muscle myosin II. The polo-like kinase homolog TbPLK is essential for transmission of cell polarity during division and for cytokinesis. We previously identified a putative TbPLK substrate named Tip of the Extending FAZ 1 (TOEFAZ1) as an essential kinetoplastid-specific component of the T. brucei cytokinetic machinery. We performed a proximity-dependent biotinylation (BioID) screen using TOEFAZ1 as a means to identify additional proteins that are involved in cytokinesis. Using quantitative proteomic methods, we identified nearly 500 TOEFAZ1-proximal proteins and characterized 59 in further detail. Among the candidates, we identified an essential putative phosphatase that regulates the expression level and localization of both TOEFAZ1 and TbPLK, a previously uncharacterized protein that is necessary for the assembly of a new cell posterior, and a microtubule plus-end directed orphan kinesin that is required for completing cleavage furrow ingression. The identification of these proteins provides new insight into T. brucei cytokinesis and establishes TOEFAZ1 as a key component of this essential and uniquely-configured process in kinetoplastids. This article is protected by copyright. All rights reserved. © 2018 John Wiley & Sons Ltd.

  15. Selective localization of different types of opiate receptors in hippocampus as revealed by in vitro autoradiography

    International Nuclear Information System (INIS)

    Duka, T.; Wuester, M.; Schubert, P.; Stoiber, R.; Herz, A.

    1981-01-01

    The visualization of opiate binding sites within the hippocampus of the rat has been achieved by means of an in vitro autoradiography. In line with the concept of multiple opiate receptors, different opioid agonists revealed a particular distribution pattern. Whereas the selective delta-receptor agonist [ 3 H]D-Ala 2 , D-Leu 5 -enkephalin specifically labelled binding sites in the CA 2 area, [ 3 H]etorphine grains displayed a uniform dense distribution throughout the pyramidal cell layers from CA 1 to CA 4 . (Auth.)

  16. An enhanced chaotic key-based RC5 block cipher adapted to image encryption

    Science.gov (United States)

    Faragallah, Osama S.

    2012-07-01

    RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.

  17. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  18. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  19. Evaluating the use of key performance indicators to evidence the patient experience.

    Science.gov (United States)

    McCance, Tanya; Hastings, Jack; Dowler, Hilda

    2015-11-01

    To test eight person-centred key performance indicators and the feasibility of an appropriate measurement framework as an approach to evidencing the patient experience. The value of measuring the quality of patient care is undisputed in the international literature, however, the type of measures that can be used to generate data that is meaningful for practice continues to be debated. This paper offers a different perspective to the 'measurement' of the nursing and midwifery contribution to the patient experience. Fourth generation evaluation was the methodological approach used to evaluate the implementation of the key performance indicators and measurement framework across three participating organisations involving nine practice settings. Data were collected by repeated use of claims, concerns and issues with staff working across nine participating sites (n = 18) and the senior executives from the three partner organisations (n = 12). Data were collected during the facilitated sessions with stakeholders and analysed in conjunction with the data generated from the measurement framework. The data reveal the inherent value placed on the evidence generated from the implementation of the key performance indicators as reflected in the following themes: measuring what matters; evidencing the patient experience; engaging staff; a focus for improving practice; and articulating and demonstrating the positive contribution of nursing and midwifery. The implementation of the key performance indicators and the measurement framework has been effective in generating evidence that demonstrates the patient experience. The nature of the data generated not only privileges the patient voice but also offers feedback to nurses and midwives that can inform the development of person-centred cultures. The use of these indicators will produce evidence of patient experience that can be used by nurse and midwives to celebrate and further inform person-centred practice. © 2015 John

  20. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  1. Information Security Governanceas as Key Performance Indicator for Financial Institutions

    OpenAIRE

    Krjukovs, D; Strauss, R

    2009-01-01

    Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of ...

  2. Diversity of key players in the microbial ecosystems of the human body.

    Science.gov (United States)

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  3. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  4. Easier detection of invertebrate "identification-key characters" with light of different wavelengths

    Directory of Open Access Journals (Sweden)

    Koken Marcel HM

    2011-10-01

    Full Text Available Abstract The marine α-taxonomist often encounters two problems. Firstly, the "environmental dirt" that is frequently present on the specimens and secondly the difficulty in distinguishing key-features due to the uniform colours which fixed animals often adopt. Here we show that illuminating animals with deep-blue or ultraviolet light instead of the normal white-light abrogates both difficulties; dirt disappears and important details become clearly visible. This light regime has also two other advantages. It allows easy detection of very small, normally invisible, animals (0.1 μm range. And as these light wavelengths can induce fluorescence, new identification markers may be discovered by this approach.

  5. 'Ogura'-based 'CMS' lines with different nuclear backgrounds of cabbage revealed substantial diversity at morphological and molecular levels.

    Science.gov (United States)

    Parkash, Chander; Kumar, Sandeep; Singh, Rajender; Kumar, Ajay; Kumar, Satish; Dey, Shyam Sundar; Bhatia, Reeta; Kumar, Raj

    2018-01-01

    A comprehensive study on characterization and genetic diversity analysis was carried out in 16 'Ogura'-based 'CMS' lines of cabbage using 14 agro-morphological traits and 29 SSR markers. Agro-morphological characterization depicted considerable variations for different horticultural traits studied. The genotype, ZHA-2, performed better for most of the economically important quantitative traits. Further, gross head weight (0.76), head length (0.60) and head width (0.83) revealed significant positive correlation with net head weight. Dendrogram based on 10 quantitative traits exhibited considerable diversity among different CMS lines and principle component analysis (PCA) indicated that net and gross head weight, and head length and width are the main components of divergence between 16 CMS lines of cabbage. In molecular study, a total of 58 alleles were amplified by 29 SSR primers, averaging to 2.0 alleles in each locus. High mean values of Shannon's Information index (0.62), expected (0.45) and observed (0.32) heterozygosity and polymorphic information content (0.35) depicted substantial polymorphism. Dendrogram based on Jaccard's similarity coefficient constructed two major groups and eight sub-groups, which revealed substantial diversity among different CMS lines. In overall, based on agro-morphological and molecular studies genotype RRMA, ZHA-2 and RCA were found most divergent. Hence, they have immense potential in future breeding programs for the high-yielding hybrid development in cabbage.

  6. Novel personalized pathway-based metabolomics models reveal key metabolic pathways for breast cancer diagnosis

    DEFF Research Database (Denmark)

    Huang, Sijia; Chong, Nicole; Lewis, Nathan

    2016-01-01

    diagnosis. We applied this method to predict breast cancer occurrence, in combination with correlation feature selection (CFS) and classification methods. Results: The resulting all-stage and early-stage diagnosis models are highly accurate in two sets of testing blood samples, with average AUCs (Area Under.......993. Moreover, important metabolic pathways, such as taurine and hypotaurine metabolism and the alanine, aspartate, and glutamate pathway, are revealed as critical biological pathways for early diagnosis of breast cancer. Conclusions: We have successfully developed a new type of pathway-based model to study...... metabolomics data for disease diagnosis. Applying this method to blood-based breast cancer metabolomics data, we have discovered crucial metabolic pathway signatures for breast cancer diagnosis, especially early diagnosis. Further, this modeling approach may be generalized to other omics data types for disease...

  7. Second Harmonic Generation Reveals Subtle Fibrosis Differences in Adult and Pediatric Nonalcoholic Fatty Liver Disease.

    Science.gov (United States)

    Liu, Feng; Zhao, Jing-Min; Rao, Hui-Ying; Yu, Wei-Miao; Zhang, Wei; Theise, Neil D; Wee, Aileen; Wei, Lai

    2017-11-20

    Investigate subtle fibrosis similarities and differences in adult and pediatric nonalcoholic fatty liver disease (NAFLD) using second harmonic generation (SHG). SHG/two-photon excitation fluorescence imaging quantified 100 collagen parameters and determined qFibrosis values by using the nonalcoholic steatohepatitis (NASH) Clinical Research Network (CRN) scoring system in 62 adult and 36 pediatric NAFLD liver specimens. Six distinct parameters identified differences among the NASH CRN stages with high accuracy (area under the curve, 0835-0.982 vs 0.885-0.981, adult and pediatric). All portal region parameters showed similar changes across early stages 0, 1C, and 2, in both groups. Parameter values decreased in adults with progression from stage 1A/B to 2 in the central vein region. In children, aggregated collagen parameters decreased, but nearly all distributed collagen parameters increased from stage 1A/B to 2. SHG analysis accurately reproduces NASH CRN staging in NAFLD, as well as reveals differences and similarities between adult and pediatric collagen deposition not captured by currently available quantitative methods. © American Society for Clinical Pathology, 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  8. Probabilistic Inference: Task Dependency and Individual Differences of Probability Weighting Revealed by Hierarchical Bayesian Modeling.

    Science.gov (United States)

    Boos, Moritz; Seer, Caroline; Lange, Florian; Kopp, Bruno

    2016-01-01

    Cognitive determinants of probabilistic inference were examined using hierarchical Bayesian modeling techniques. A classic urn-ball paradigm served as experimental strategy, involving a factorial two (prior probabilities) by two (likelihoods) design. Five computational models of cognitive processes were compared with the observed behavior. Parameter-free Bayesian posterior probabilities and parameter-free base rate neglect provided inadequate models of probabilistic inference. The introduction of distorted subjective probabilities yielded more robust and generalizable results. A general class of (inverted) S-shaped probability weighting functions had been proposed; however, the possibility of large differences in probability distortions not only across experimental conditions, but also across individuals, seems critical for the model's success. It also seems advantageous to consider individual differences in parameters of probability weighting as being sampled from weakly informative prior distributions of individual parameter values. Thus, the results from hierarchical Bayesian modeling converge with previous results in revealing that probability weighting parameters show considerable task dependency and individual differences. Methodologically, this work exemplifies the usefulness of hierarchical Bayesian modeling techniques for cognitive psychology. Theoretically, human probabilistic inference might be best described as the application of individualized strategic policies for Bayesian belief revision.

  9. Probabilistic inference: Task dependency and individual differences of probability weighting revealed by hierarchical Bayesian modelling

    Directory of Open Access Journals (Sweden)

    Moritz eBoos

    2016-05-01

    Full Text Available Cognitive determinants of probabilistic inference were examined using hierarchical Bayesian modelling techniques. A classic urn-ball paradigm served as experimental strategy, involving a factorial two (prior probabilities by two (likelihoods design. Five computational models of cognitive processes were compared with the observed behaviour. Parameter-free Bayesian posterior probabilities and parameter-free base rate neglect provided inadequate models of probabilistic inference. The introduction of distorted subjective probabilities yielded more robust and generalizable results. A general class of (inverted S-shaped probability weighting functions had been proposed; however, the possibility of large differences in probability distortions not only across experimental conditions, but also across individuals, seems critical for the model’s success. It also seems advantageous to consider individual differences in parameters of probability weighting as being sampled from weakly informative prior distributions of individual parameter values. Thus, the results from hierarchical Bayesian modelling converge with previous results in revealing that probability weighting parameters show considerable task dependency and individual differences. Methodologically, this work exemplifies the usefulness of hierarchical Bayesian modelling techniques for cognitive psychology. Theoretically, human probabilistic inference might be best described as the application of individualized strategic policies for Bayesian belief revision.

  10. Enhanced limonene production in cyanobacteria reveals photosynthesis limitations.

    Science.gov (United States)

    Wang, Xin; Liu, Wei; Xin, Changpeng; Zheng, Yi; Cheng, Yanbing; Sun, Su; Li, Runze; Zhu, Xin-Guang; Dai, Susie Y; Rentzepis, Peter M; Yuan, Joshua S

    2016-12-13

    Terpenes are the major secondary metabolites produced by plants, and have diverse industrial applications as pharmaceuticals, fragrance, solvents, and biofuels. Cyanobacteria are equipped with efficient carbon fixation mechanism, and are ideal cell factories to produce various fuel and chemical products. Past efforts to produce terpenes in photosynthetic organisms have gained only limited success. Here we engineered the cyanobacterium Synechococcus elongatus PCC 7942 to efficiently produce limonene through modeling guided study. Computational modeling of limonene flux in response to photosynthetic output has revealed the downstream terpene synthase as a key metabolic flux-controlling node in the MEP (2-C-methyl-d-erythritol 4-phosphate) pathway-derived terpene biosynthesis. By enhancing the downstream limonene carbon sink, we achieved over 100-fold increase in limonene productivity, in contrast to the marginal increase achieved through stepwise metabolic engineering. The establishment of a strong limonene flux revealed potential synergy between photosynthate output and terpene biosynthesis, leading to enhanced carbon flux into the MEP pathway. Moreover, we show that enhanced limonene flux would lead to NADPH accumulation, and slow down photosynthesis electron flow. Fine-tuning ATP/NADPH toward terpene biosynthesis could be a key parameter to adapt photosynthesis to support biofuel/bioproduct production in cyanobacteria.

  11. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  12. Genomewide mapping reveals a combination of different genetic ...

    Indian Academy of Sciences (India)

    could not investigate all kinds of genetic effects, especially epistatic effects, simultaneously on the whole genome. ... consistent with different loci affecting heterosis for different ...... Jones D. F. 1917 Dominance of linked factors as a means of.

  13. Quantum key distribution with finite resources: calculating the min-entropy

    Energy Technology Data Exchange (ETDEWEB)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Heinrich-Heine-Universitaet, Duesseldorf (Germany)

    2010-07-01

    The min-entropy is an important quantity in quantum key distribution. Recently, a connection between the min- entropy and the minimal-error discrimination problem was found. We use this connection to evaluate the min-entropy for different quantum key distribution setups.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  16. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  17. The Geographic Distribution of Saccharomyces cerevisiae Isolates within three Italian Neighboring Winemaking Regions Reveals Strong Differences in Yeast Abundance, Genetic Diversity and Industrial Strain Dissemination

    Directory of Open Access Journals (Sweden)

    Alessia Viel

    2017-08-01

    Full Text Available In recent years the interest for natural fermentations has been re-evaluated in terms of increasing the wine terroir and managing more sustainable winemaking practices. Therefore, the level of yeast genetic variability and the abundance of Saccharomyces cerevisiae native populations in vineyard are becoming more and more crucial at both ecological and technological level. Among the factors that can influence the strain diversity, the commercial starter release that accidentally occur in the environment around the winery, has to be considered. In this study we led a wide scale investigation of S. cerevisiae genetic diversity and population structure in the vineyards of three neighboring winemaking regions of Protected Appellation of Origin, in North-East of Italy. Combining mtDNA RFLP and microsatellite markers analyses we evaluated 634 grape samples collected over 3 years. We could detect major differences in the presence of S. cerevisiae yeasts, according to the winemaking region. The population structures revealed specificities of yeast microbiota at vineyard scale, with a relative Appellation of Origin area homogeneity, and transition zones suggesting a geographic differentiation. Surprisingly, we found a widespread industrial yeast dissemination that was very high in the areas where the native yeast abundance was low. Although geographical distance is a key element involved in strain distribution, the high presence of industrial strains in vineyard reduced the differences between populations. This finding indicates that industrial yeast diffusion it is a real emergency and their presence strongly interferes with the natural yeast microbiota.

  18. Thyroid transcriptome analysis reveals different adaptive responses to cold environmental conditions between two chicken breeds.

    Science.gov (United States)

    Xie, Shanshan; Yang, Xukai; Wang, Dehe; Zhu, Feng; Yang, Ning; Hou, Zhuocheng; Ning, Zhonghua

    2018-01-01

    Selection for cold tolerance in chickens is important for improving production performance and animal welfare. The identification of chicken breeds with higher cold tolerance and production performance will help to target candidates for the selection. The thyroid gland plays important roles in thermal adaptation, and its function is influenced by breed differences and transcriptional plasticity, both of which remain largely unknown in the chicken thyroid transcriptome. In this study, we subjected Bashang Long-tail (BS) and Rhode Island Red (RIR) chickens to either cold or warm environments for 21 weeks and investigated egg production performance, body weight changes, serum thyroid hormone concentrations, and thyroid gland transcriptome profiles. RIR chickens had higher egg production than BS chickens under warm conditions, but BS chickens produced more eggs than RIRs under cold conditions. Furthermore, BS chickens showed stable body weight gain under cold conditions while RIRs did not. These results suggested that BS breed is a preferable candidate for cold-tolerance selection and that the cold adaptability of RIRs should be improved in the future. BS chickens had higher serum thyroid hormone concentrations than RIRs under both environments. RNA-Seq generated 344.3 million paired-end reads from 16 sequencing libraries, and about 90% of the processed reads were concordantly mapped to the chicken reference genome. Differential expression analysis identified 46-1,211 genes in the respective comparisons. With regard to breed differences in the thyroid transcriptome, BS chickens showed higher cell replication and development, and immune response-related activity, while RIR chickens showed higher carbohydrate and protein metabolism activity. The cold environment reduced breed differences in the thyroid transcriptome compared with the warm environment. Transcriptional plasticity analysis revealed different adaptive responses in BS and RIR chickens to cope with the cold

  19. RNA Sequencing and Coexpression Analysis Reveal Key Genes Involved in α-Linolenic Acid Biosynthesis in Perilla frutescens Seed

    Directory of Open Access Journals (Sweden)

    Tianyuan Zhang

    2017-11-01

    Full Text Available Perilla frutescen is used as traditional food and medicine in East Asia. Its seeds contain high levels of α-linolenic acid (ALA, which is important for health, but is scarce in our daily meals. Previous reports on RNA-seq of perilla seed had identified fatty acid (FA and triacylglycerol (TAG synthesis genes, but the underlying mechanism of ALA biosynthesis and its regulation still need to be further explored. So we conducted Illumina RNA-sequencing in seven temporal developmental stages of perilla seeds. Sequencing generated a total of 127 million clean reads, containing 15.88 Gb of valid data. The de novo assembly of sequence reads yielded 64,156 unigenes with an average length of 777 bp. A total of 39,760 unigenes were annotated and 11,693 unigenes were found to be differentially expressed in all samples. According to Kyoto Encyclopedia of Genes and Genomes (KEGG pathway analysis, 486 unigenes were annotated in the “lipid metabolism” pathway. Of these, 150 unigenes were found to be involved in fatty acid (FA biosynthesis and triacylglycerol (TAG assembly in perilla seeds. A coexpression analysis showed that a total of 104 genes were highly coexpressed (r > 0.95. The coexpression network could be divided into two main subnetworks showing over expression in the medium or earlier and late phases, respectively. In order to identify the putative regulatory genes, a transcription factor (TF analysis was performed. This led to the identification of 45 gene families, mainly including the AP2-EREBP, bHLH, MYB, and NAC families, etc. After coexpression analysis of TFs with highly expression of FAD2 and FAD3 genes, 162 TFs were found to be significantly associated with two FAD genes (r > 0.95. Those TFs were predicted to be the key regulatory factors in ALA biosynthesis in perilla seed. The qRT-PCR analysis also verified the relevance of expression pattern between two FAD genes and partial candidate TFs. Although it has been reported that some TFs

  20. A study on different thermodynamic cycle schemes coupled with a high temperature gas-cooled reactor

    International Nuclear Information System (INIS)

    Qu, Xinhe; Yang, Xiaoyong; Wang, Jie

    2017-01-01

    Highlights: • The features of three different power generation schemes, including closed Brayton cycle, non-reheating combined cycle and reheating combined cycle, coupled with high temperature gas-cooled reactor (HTGR) were investigated and compared. • The effects and mechanism of reactor core outlet temperature, compression ratio and other key parameters over cycle characteristics were analyzed by the thermodynamic models.. • It is found that reheated combined cycle has the highest efficiency. Reactor outlet temperature and main steam parameters are key factors to improve the cycle’s performance. - Abstract: With gradual increase in reactor outlet temperature, the efficient power conversion technology has become one of developing trends of (very) high temperature gas-cooled reactors (HTGRs). In this paper, different cycle power generation schemes for HTGRs were systematically studied. Physical and mathematical models were established for these three cycle schemes: closed Brayton cycle, simple combined cycle, and reheated combined cycle. The effects and mechanism of key parameters such as reactor core outlet temperature, reactor core inlet temperature and compression ratio on the features of these cycles were analyzed. Then, optimization results were given with engineering restrictive conditions, including pinch point temperature differences. Results revealed that within the temperature range of HTGRs (700–900 °C), the reheated combined cycle had the highest efficiency, while the simple combined cycle had the lowest efficiency (900 °C). The efficiencies of the closed Brayton cycle, simple combined cycle and reheated combined cycle are 49.5%, 46.6% and 50.1%, respectively. These results provide insights on the different schemes of these cycles, and reveal the effects of key parameters on performance of these cycles. It could be helpful to understand and develop a combined cycle coupled with a high temperature reactor in the future.

  1. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  2. The origins of enhanced activity in factor VIIa analogs and the interplay between key allosteric sites revealed by hydrogen exchange mass spectrometry

    DEFF Research Database (Denmark)

    Rand, Kasper D; Andersen, Mette D; Olsen, Ole H

    2008-01-01

    Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry to invest......Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry...... to investigate the conformational effects of site-directed mutagenesis at key positions in FVIIa and the origins of enhanced intrinsic activity of FVIIa analogs. The differences in hydrogen exchange of two highly active variants, FVIIa(DVQ) and FVIIa(VEAY), imply that enhanced catalytic efficiency was attained...

  3. [Key morphofunctional transformations in the evolution of chiropterans (Bats, Chiroptera)].

    Science.gov (United States)

    Kovaleva, I M

    2014-01-01

    Study on the morphology and morphogenesis of wing membranes in Bats has revealed some peculiarities in their structure and development. Understanding the embryogenesis of these animals, as well as attraction of data obtained on their molecular genetics and paleontology, allows one to single out some factors that could have initiated evolutionary modifications in development programs. A scenario of the key morphofunctional transformations in the forelimbs during the evolution of chiropterans is given.

  4. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  5. Revision of the Oriental genera of Agathidinae (Hymenoptera, Braconidae with an emphasis on Thailand and interactive keys to genera published in three different formats

    Directory of Open Access Journals (Sweden)

    Michael Sharkey

    2009-09-01

    Full Text Available The genera of Oriental Agathidinae are revised and a fully illustrated dichotomous key is presented. New generic concepts are proposed for Bassus Fabricius, 1804 and Hypsostypos Baltazar, 1963. Bassus is restricted to a clade with an Old World distribution and the remaining members are divided amongst the resurrected genera Camptothlipsis Enderlein, 1920, Lytopylus Förster, 1862, and Therophilus Wesmael, 1837. The concept of Hypsostypos is restricted and the new genus Amputostypos Sharkey, gen. n. is proposed to include species formerly included in Hypsostypos that do not have raised antennal bases. Troticus Brullé, 1846 is reported from the Oriental region for the first time. Eighteen genera are recognized for Thailand and neighboring areas, i.e., Agathis Latreille, 1804, Amputostypos, Aneurobracon Brues, 1930, Bassus, Biroia Szépligeti, 1900, Braunsia Kriechbaumer, 1894, Camptothlipsis, Coccygidium Saussure, 1892, Cremnops Förster, 1862, Disophrys Förster, 1862, Earinus Wesmael, 1837, Euagathis Szépligeti, 1900, Gryochus Enderlein, 1920, Hypsostypos, Lytopylus Förster, 1862, Therophilus, Cremnoptoides van Achterberg & Chen, 2004, and Troticus. Identification keys to the genera are provided as a standard textual dichotomous key, as well as online keys in three different formats (conventional dichotomous, DELTA/Intkey, Lucid, and MX to enable users to choose their prefered platform and to allow direct comparisons of the technologies for producing online keys. Publication of underlying data (data matrices, character states table, and images under the OpenDataCommons license (ODbl (http://www.opendatacommons.org/licenses/odbl/1.0/ for DELTA/Intkey files (doi: 10.3897/zookeys.21.271.app.1.ik, primary DELTA files (10.3897/zookeys.21.271.app.2.ik Lucid3 (LIF3 and Lucid SDD key data files (doi: 10.3897/zookeys.21.271.app.3.ik and MX MySQL database files (doi: 10.3897/zookeys.21.271.app.4.ik allows future workers to edit keys and to add newly

  6. Discrimination task reveals differences in neural bases of tinnitus and hearing impairment.

    Directory of Open Access Journals (Sweden)

    Fatima T Husain

    Full Text Available We investigated auditory perception and cognitive processing in individuals with chronic tinnitus or hearing loss using functional magnetic resonance imaging (fMRI. Our participants belonged to one of three groups: bilateral hearing loss and tinnitus (TIN, bilateral hearing loss without tinnitus (HL, and normal hearing without tinnitus (NH. We employed pure tones and frequency-modulated sweeps as stimuli in two tasks: passive listening and active discrimination. All subjects had normal hearing through 2 kHz and all stimuli were low-pass filtered at 2 kHz so that all participants could hear them equally well. Performance was similar among all three groups for the discrimination task. In all participants, a distributed set of brain regions including the primary and non-primary auditory cortices showed greater response for both tasks compared to rest. Comparing the groups directly, we found decreased activation in the parietal and frontal lobes in the participants with tinnitus compared to the HL group and decreased response in the frontal lobes relative to the NH group. Additionally, the HL subjects exhibited increased response in the anterior cingulate relative to the NH group. Our results suggest that a differential engagement of a putative auditory attention and short-term memory network, comprising regions in the frontal, parietal and temporal cortices and the anterior cingulate, may represent a key difference in the neural bases of chronic tinnitus accompanied by hearing loss relative to hearing loss alone.

  7. The Key Genes of Chronic Pancreatitis which Bridge Chronic Pancreatitis and Pancreatic Cancer Can be Therapeutic Targets.

    Science.gov (United States)

    Li, Shuang; Li, Rui; Wang, Heping; Li, Lisha; Li, Huiyu; Li, Yulin

    2018-04-01

    An important question in systems biology is what role the underlying molecular mechanisms play in disease progression. The relationship between chronic pancreatitis and pancreatic cancer needs further exploration in a system view. We constructed the disease network based on gene expression data and protein-protein interaction. We proposed an approach to discover the underlying core network and molecular factors in the progression of pancreatic diseases, which contain stages of chronic pancreatitis and pancreatic cancer. The chronic pancreatitis and pancreatic cancer core network and key factors were revealed and then verified by gene set enrichment analysis of pathways and diseases. The key factors provide the microenvironment for tumor initiation and the change of gene expression level of key factors bridge chronic pancreatitis and pancreatic cancer. Some new candidate genes need further verification by experiments. Transcriptome profiling-based network analysis reveals the importance of chronic pancreatitis genes and pathways in pancreatic cancer development on a system level by computational method and they can be therapeutic targets.

  8. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  9. Students’ performance in the different clinical skills assessed in OSCE: what does it reveal?

    Directory of Open Access Journals (Sweden)

    Joong Hiong Sim

    2015-02-01

    Full Text Available Introduction: The purpose of this study was to compare students’ performance in the different clinical skills (CSs assessed in the objective structured clinical examination. Methods: Data for this study were obtained from final year medical students’ exit examination (n=185. Retrospective analysis of data was conducted using SPSS. Means for the six CSs assessed across the 16 stations were computed and compared. Results: Means for history taking, physical examination, communication skills, clinical reasoning skills (CRSs, procedural skills (PSs, and professionalism were 6.25±1.29, 6.39±1.36, 6.34±0.98, 5.86±0.99, 6.59±1.08, and 6.28±1.02, respectively. Repeated measures ANOVA showed there was a significant difference in the means of the six CSs assessed [F(2.980, 548.332=20.253, p<0.001]. Pairwise multiple comparisons revealed significant differences between the means of the eight pairs of CSs assessed, at p<0.05. Conclusions: CRSs appeared to be the weakest while PSs were the strongest, among the six CSs assessed. Students’ unsatisfactory performance in CRS needs to be addressed as CRS is one of the core competencies in medical education and a critical skill to be acquired by medical students before entering the workplace. Despite its challenges, students must learn the skills of clinical reasoning, while clinical teachers should facilitate the clinical reasoning process and guide students’ clinical reasoning development.

  10. Proteomic analysis reveals heat shock protein 70 has a key role in polycythemia Vera.

    Science.gov (United States)

    Gallardo, Miguel; Barrio, Santiago; Fernandez, Marisol; Paradela, Alberto; Arenas, Alicia; Toldos, Oscar; Ayala, Rosa; Albizua, Enriqueta; Jimenez, Ana; Redondo, Santiago; Garcia-Martin, Rosa Maria; Gilsanz, Florinda; Albar, Juan Pablo; Martinez-Lopez, Joaquin

    2013-11-19

    JAK-STAT signaling through the JAK2V617F mutation is central to the pathogenesis of myeloproliferative neoplasms (MPN). However, other events could precede the JAK2 mutation. The aim of this study is to analyze the phenotypic divergence between polycytemia vera (PV) and essential thrombocytemia (ET) to find novel therapeutics targets by a proteomic and functional approach to identify alternative routes to JAK2 activation. Through 2D-DIGE and mass spectrometry of granulocyte protein from 20 MPN samples, showed differential expression of HSP70 in PV and ET besides other 60 proteins. Immunohistochemistry of 46 MPN bone marrow samples confirmed HSP70 expression. The median of positive granulocytes was 80% in PV (SD 35%) vs. 23% in ET (SD 34.25%). In an ex vivo model KNK437 was used as an inhibition model assay of HSP70, showed dose-dependent inhibition of cell growth and burst formation unit erythroid (BFU-E) in PV and ET, increased apoptosis in the erythroid lineage, and decreased pJAK2 signaling, as well as a specific siRNA for HSP70. These data suggest a key role for HSP70 in proliferation and survival of the erythroid lineage in PV, and may represent a potential therapeutic target in MPN, especially in PV.

  11. Communication in different keys

    International Nuclear Information System (INIS)

    Souwer, Corinne

    1995-01-01

    This paper is based on a study for which the research has been conducted by Esther van der Draai, trainee at ECN - Nuclear Energy, Dutch member of the NucNet board, delegation member of the European Task Force Group - 10th Anniversary of Chernobyl. The complete study is presented to WIN. It explains how to attune communication to the target group, and discusses the communication theory analogue language, which does not only include the typical non-verbal signals, such as eye contact, facial expression, gestures, etc., but also smiling, blushing, sighing, clothing, smell. In short, analogue language is always there and always influences other parties

  12. Consensus building for interlaboratory studies, key comparisons, and meta-analysis

    Science.gov (United States)

    Koepke, Amanda; Lafarge, Thomas; Possolo, Antonio; Toman, Blaza

    2017-06-01

    Interlaboratory studies in measurement science, including key comparisons, and meta-analyses in several fields, including medicine, serve to intercompare measurement results obtained independently, and typically produce a consensus value for the common measurand that blends the values measured by the participants. Since interlaboratory studies and meta-analyses reveal and quantify differences between measured values, regardless of the underlying causes for such differences, they also provide so-called ‘top-down’ evaluations of measurement uncertainty. Measured values are often substantially over-dispersed by comparison with their individual, stated uncertainties, thus suggesting the existence of yet unrecognized sources of uncertainty (dark uncertainty). We contrast two different approaches to take dark uncertainty into account both in the computation of consensus values and in the evaluation of the associated uncertainty, which have traditionally been preferred by different scientific communities. One inflates the stated uncertainties by a multiplicative factor. The other adds laboratory-specific ‘effects’ to the value of the measurand. After distinguishing what we call recipe-based and model-based approaches to data reductions in interlaboratory studies, we state six guiding principles that should inform such reductions. These principles favor model-based approaches that expose and facilitate the critical assessment of validating assumptions, and give preeminence to substantive criteria to determine which measurement results to include, and which to exclude, as opposed to purely statistical considerations, and also how to weigh them. Following an overview of maximum likelihood methods, three general purpose procedures for data reduction are described in detail, including explanations of how the consensus value and degrees of equivalence are computed, and the associated uncertainty evaluated: the DerSimonian-Laird procedure; a hierarchical Bayesian

  13. Comparative Genomics Revealed Genetic Diversity and Species/Strain-Level Differences in Carbohydrate Metabolism of Three Probiotic Bifidobacterial Species

    Directory of Open Access Journals (Sweden)

    Toshitaka Odamaki

    2015-01-01

    Full Text Available Strains of Bifidobacterium longum, Bifidobacterium breve, and Bifidobacterium animalis are widely used as probiotics in the food industry. Although numerous studies have revealed the properties and functionality of these strains, it is uncertain whether these characteristics are species common or strain specific. To address this issue, we performed a comparative genomic analysis of 49 strains belonging to these three bifidobacterial species to describe their genetic diversity and to evaluate species-level differences. There were 166 common clusters between strains of B. breve and B. longum, whereas there were nine common clusters between strains of B. animalis and B. longum and four common clusters between strains of B. animalis and B. breve. Further analysis focused on carbohydrate metabolism revealed the existence of certain strain-dependent genes, such as those encoding enzymes for host glycan utilisation or certain membrane transporters, and many genes commonly distributed at the species level, as was previously reported in studies with limited strains. As B. longum and B. breve are human-residential bifidobacteria (HRB, whereas B. animalis is a non-HRB species, several of the differences in these species’ gene distributions might be the result of their adaptations to the nutrient environment. This information may aid both in selecting probiotic candidates and in understanding their potential function as probiotics.

  14. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  15. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  16. Key-lock colloids in a nematic liquid crystal.

    Science.gov (United States)

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  17. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  18. Duty hour restrictions and surgical complications for head and neck key indicator procedures.

    Science.gov (United States)

    Smith, Aaron; Jain, Nikhita; Wan, Jim; Wang, Lei; Sebelik, Merry

    2017-08-01

    Graduate medical education has traditionally required long work hours, allowing trainees little time for adequate rest. Based on concerns over performance deterioration with sleep deprivation and its effect on patient outcomes, duty hour restrictions have been mandated. We sought to characterize complications from otolaryngology key indicator procedures performed before and after duty hour reform. Retrospective cross-sectional analysis of National Inpatient Sample (NIS). The NIS was queried for procedure codes associated with head and neck key indicator groupings for the years 2000-2002 (45,363 procedures) and 2006-2008 (51,144 procedures). Hospitals were divided into three groups: nonteaching hospitals (NTH), teaching hospitals without otolaryngology programs (TH), and teaching hospitals with otolaryngology programs (TH-OTO). Surgical complication rates, length of stay, and mortality rates were analyzed using logistic and linear regression. The number of procedures increased (12.7%), with TH-OTO contributing more in postrestriction years (21% to 30%). Overall complication rates between the two periods revealed no difference, regardless of hospital setting. Subset analysis showed some variation within each complication within each grouping. Length of stay increased at TH-OTO (2.75 to 2.78 days) and decreased at NTH (2.28 to 2.24 days) and TH (2.39 to 2.36 days). Mortality did not increase among the three hospital types (NTH, P key indicator procedures. Moreover, concerns about reduced surgical case numbers appear unfounded, especially for otolaryngology programs. 2c Laryngoscope, 127:1797-1803, 2017. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  19. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  20. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  1. Key Success Factors and Guidance for International Collaborative Design Projects

    Directory of Open Access Journals (Sweden)

    Robby Soetanto

    2015-11-01

    Full Text Available In the built environment (BE sector, the co-creation process of design demands understanding of requirements (as viewed by parties involved, mobilisation of tacit knowledge, negotiation, and complex exchange of information. The need to collaborate over distance has further exacerbated the complexity of the process, and, in itself, represents a significant challenge for BE professionals who are increasingly expected to undertake this process within globally distributed virtual teams. The research aims to identify key success factors and develop guidance for international collaborative design projects, via the implementation of collaborative design courses in UK and Canadian universities over three academic years. Questionnaire surveys, focus groups, observation of online meetings, personal reflections provided data for the analysis. The findings reveal the significance of the perceived risk of collaboration and a difference in preferred communication mode between architects and civil/structural engineers. These findings suggest the impact of training in the subject discipline, and that the opportunity for co-located working has helped the development of trust. The guidance is aimed at BE educators who wish to implement this activity in their courses.

  2. The key found

    Directory of Open Access Journals (Sweden)

    Agata Stankowka

    2010-01-01

    Full Text Available Poetycka antropologia Julii Hartwig [Julia Hartwig’s poetic anthropology] written by Marcin Terlecki is a book that fills the yawning gap in our literary understanding of the twentieth century Polish poetry and constitutes the first attempt at a comprehensive and detailed presentation of the lyrical works by J. Hartwig. The modern collection in which the work appears allow M. Terlecki to reveal the poetess’ fundamental insights dominating and underlying her world outlook and epistemological views. This, in turn, puts him in a position to give an explanation to the logic embedded in the evolution under scrutiny. M. Terlecki convincingly supports his own argument concerning J. Hartwig’s poetic reception of the world proving the thesis that its fundamentals are deeply rooted in the anthropological perspective. Terlecki differentiates the latter into three basic categories. First, there is “strangeness/alienation”, which results in the need for self-definition (determination of one’s nature and basic qualities. Then, “identity”, whose reflection turns out to be not only what is different in its external shape, but also what is different inside — within the plane of one’s own culture, biography and personality. And, finally, “empathy”, born out of questions on a feasibility of contact with what is different, alien and absent. The three categories, connected by the logic of anthropological vision, are presented as basic and fundamental for the subsequent stages in Hartwig’s poetical output. At the same time, they reveal themselves as axes of anthropological reading material provided by the author — for the discussed book is the author’s own research project on “poetic anthropology”.

  3. Gender differences of brain glucose metabolic networks revealed by FDG-PET: evidence from a large cohort of 400 young adults.

    Science.gov (United States)

    Hu, Yuxiao; Xu, Qiang; Li, Kai; Zhu, Hong; Qi, Rongfeng; Zhang, Zhiqiang; Lu, Guangming

    2013-01-01

    Gender differences of the human brain are an important issue in neuroscience research. In recent years, an increasing amount of evidence has been gathered from noninvasive neuroimaging studies supporting a sexual dimorphism of the human brain. However, there is a lack of imaging studies on gender differences of brain metabolic networks based on a large population sample. FDG PET data of 400 right-handed, healthy subjects, including 200 females (age: 25:45 years, mean age ± SD: 40.9 ± 3.9 years) and 200 age-matched males were obtained and analyzed in the present study. We first investigated the regional differences of brain glucose metabolism between genders using a voxel-based two-sample t-test analysis. Subsequently, we investigated the gender differences of the metabolic networks. Sixteen metabolic covariance networks using seed-based correlation were analyzed. Seven regions showing significant regional metabolic differences between genders, and nine regions conventionally used in the resting-state network studies were selected as regions-of-interest. Permutation tests were used for comparing within- and between-network connectivity between genders. Compared with the males, females showed higher metabolism in the posterior part and lower metabolism in the anterior part of the brain. Moreover, there were widely distributed patterns of the metabolic networks in the human brain. In addition, significant gender differences within and between brain glucose metabolic networks were revealed in the present study. This study provides solid data that reveal gender differences in regional brain glucose metabolism and brain glucose metabolic networks. These observations might contribute to the better understanding of the gender differences in human brain functions, and suggest that gender should be included as a covariate when designing experiments and explaining results of brain glucose metabolic networks in the control and experimental individuals or patients.

  4. Dynamic Metabolic Footprinting Reveals the Key Components of Metabolic Network in Yeast Saccharomyces cerevisiae

    DEFF Research Database (Denmark)

    Chumnanpuen, Pramote; Hansen, Michael Adsetts Edberg; Smedsgaard, Jørn

    2014-01-01

    relies on analysis at a single time point. Using direct infusion-mass spectrometry (DI-MS), we could observe the dynamic metabolic footprinting in yeast S. cerevisiae BY4709 (wild type) cultured on 3 different C-sources (glucose, glycerol, and ethanol) and sampled along 10 time points with 5 biological...... replicates. In order to analyze the dynamic mass spectrometry data, we developed the novel analysis methods that allow us to perform correlation analysis to identify metabolites that significantly correlate over time during growth on the different carbon sources. Both positive and negative electrospray...... reconstructed an interaction map that provides information of how different metabolic pathways have correlated patterns during growth on the different carbon sources....

  5. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  6. Genome-wide identification of key modulators of gene-gene interaction networks in breast cancer.

    Science.gov (United States)

    Chiu, Yu-Chiao; Wang, Li-Ju; Hsiao, Tzu-Hung; Chuang, Eric Y; Chen, Yidong

    2017-10-03

    With the advances in high-throughput gene profiling technologies, a large volume of gene interaction maps has been constructed. A higher-level layer of gene-gene interaction, namely modulate gene interaction, is composed of gene pairs of which interaction strengths are modulated by (i.e., dependent on) the expression level of a key modulator gene. Systematic investigations into the modulation by estrogen receptor (ER), the best-known modulator gene, have revealed the functional and prognostic significance in breast cancer. However, a genome-wide identification of key modulator genes that may further unveil the landscape of modulated gene interaction is still lacking. We proposed a systematic workflow to screen for key modulators based on genome-wide gene expression profiles. We designed four modularity parameters to measure the ability of a putative modulator to perturb gene interaction networks. Applying the method to a dataset of 286 breast tumors, we comprehensively characterized the modularity parameters and identified a total of 973 key modulator genes. The modularity of these modulators was verified in three independent breast cancer datasets. ESR1, the encoding gene of ER, appeared in the list, and abundant novel modulators were illuminated. For instance, a prognostic predictor of breast cancer, SFRP1, was found the second modulator. Functional annotation analysis of the 973 modulators revealed involvements in ER-related cellular processes as well as immune- and tumor-associated functions. Here we present, as far as we know, the first comprehensive analysis of key modulator genes on a genome-wide scale. The validity of filtering parameters as well as the conservativity of modulators among cohorts were corroborated. Our data bring new insights into the modulated layer of gene-gene interaction and provide candidates for further biological investigations.

  7. A Simple Exercise Reveals the Way Students Think about Scientific Modeling

    Science.gov (United States)

    Ruebush, Laura; Sulikowski, Michelle; North, Simon

    2009-01-01

    Scientific modeling is an integral part of contemporary science, yet many students have little understanding of how models are developed, validated, and used to predict and explain phenomena. A simple modeling exercise led to significant gains in understanding key attributes of scientific modeling while revealing some stubborn misconceptions.…

  8. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  9. Population genetics of two key mosquito vectors of Rift Valley Fever virus reveals new insights into the changing disease outbreak patterns in Kenya.

    Directory of Open Access Journals (Sweden)

    David P Tchouassi

    2014-12-01

    Full Text Available Rift Valley fever (RVF outbreaks in Kenya have increased in frequency and range to include northeastern Kenya where viruses are increasingly being isolated from known (Aedes mcintoshi and newly-associated (Ae. ochraceus vectors. The factors contributing to these changing outbreak patterns are unclear and the population genetic structure of key vectors and/or specific virus-vector associations, in particular, are under-studied. By conducting mitochondrial and nuclear DNA analyses on >220 Kenyan specimens of Ae. mcintoshi and Ae. ochraceus, we uncovered high levels of vector complexity which may partly explain the disease outbreak pattern. Results indicate that Ae. mcintoshi consists of a species complex with one of the member species being unique to the newly-established RVF outbreak-prone northeastern region of Kenya, whereas Ae. ochraceus is a homogeneous population that appears to be undergoing expansion. Characterization of specimens from a RVF-prone site in Senegal, where Ae. ochraceus is a primary vector, revealed direct genetic links between the two Ae. ochraceus populations from both countries. Our data strongly suggest that unlike Ae. mcintoshi, Ae. ochraceus appears to be a relatively recent, single 'introduction' into Kenya. These results, together with increasing isolations from this vector, indicate that Ae. ochraceus will likely be of greater epidemiological importance in future RVF outbreaks in Kenya. Furthermore, the overall vector complexity calls into question the feasibility of mosquito population control approaches reliant on genetic modification.

  10. Population Genetics of Two Key Mosquito Vectors of Rift Valley Fever Virus Reveals New Insights into the Changing Disease Outbreak Patterns in Kenya

    Science.gov (United States)

    Tchouassi, David P.; Bastos, Armanda D. S.; Sole, Catherine L.; Diallo, Mawlouth; Lutomiah, Joel; Mutisya, James; Mulwa, Francis; Borgemeister, Christian; Sang, Rosemary; Torto, Baldwyn

    2014-01-01

    Rift Valley fever (RVF) outbreaks in Kenya have increased in frequency and range to include northeastern Kenya where viruses are increasingly being isolated from known (Aedes mcintoshi) and newly-associated (Ae. ochraceus) vectors. The factors contributing to these changing outbreak patterns are unclear and the population genetic structure of key vectors and/or specific virus-vector associations, in particular, are under-studied. By conducting mitochondrial and nuclear DNA analyses on >220 Kenyan specimens of Ae. mcintoshi and Ae. ochraceus, we uncovered high levels of vector complexity which may partly explain the disease outbreak pattern. Results indicate that Ae. mcintoshi consists of a species complex with one of the member species being unique to the newly-established RVF outbreak-prone northeastern region of Kenya, whereas Ae. ochraceus is a homogeneous population that appears to be undergoing expansion. Characterization of specimens from a RVF-prone site in Senegal, where Ae. ochraceus is a primary vector, revealed direct genetic links between the two Ae. ochraceus populations from both countries. Our data strongly suggest that unlike Ae. mcintoshi, Ae. ochraceus appears to be a relatively recent, single 'introduction' into Kenya. These results, together with increasing isolations from this vector, indicate that Ae. ochraceus will likely be of greater epidemiological importance in future RVF outbreaks in Kenya. Furthermore, the overall vector complexity calls into question the feasibility of mosquito population control approaches reliant on genetic modification. PMID:25474018

  11. Nomadic lifestyle of Lactobacillus plantarum revealed by comparative genomics of 54 strains isolated from different habitats.

    Science.gov (United States)

    Martino, Maria Elena; Bayjanov, Jumamurat R; Caffrey, Brian E; Wels, Michiel; Joncour, Pauline; Hughes, Sandrine; Gillet, Benjamin; Kleerebezem, Michiel; van Hijum, Sacha A F T; Leulier, François

    2016-12-01

    The ability of bacteria to adapt to diverse environmental conditions is well-known. The process of bacterial adaptation to a niche has been linked to large changes in the genome content, showing that many bacterial genomes reflect the constraints imposed by their habitat. However, some highly versatile bacteria are found in diverse habitats that almost share nothing in common. Lactobacillus plantarum is a lactic acid bacterium that is found in a large variety of habitat. With the aim of unravelling the link between evolution and ecological versatility of L. plantarum, we analysed the genomes of 54 L. plantarum strains isolated from different environments. Comparative genome analysis identified a high level of genomic diversity and plasticity among the strains analysed. Phylogenomic and functional divergence studies coupled with gene-trait matching analyses revealed a mixed distribution of the strains, which was uncoupled from their environmental origin. Our findings revealed the absence of specific genomic signatures marking adaptations of L. plantarum towards the diverse habitats it is associated with. This suggests fundamentally similar trends of genome evolution in L. plantarum, which occur in a manner that is apparently uncoupled from ecological constraint and reflects the nomadic lifestyle of this species. © 2016 The Authors. Environmental Microbiology published by Society for Applied Microbiology and John Wiley & Sons Ltd.

  12. Significant differences in gene expression and key genetic components associated with high growth vigor in populus section tacamahaca as revealed by comparative transcriptome analysis

    International Nuclear Information System (INIS)

    Cheng, S.; Chen, M.; Li, Y.; Wang, J.; Sun, X.; Wang, J.

    2017-01-01

    To identify genetic components involved in high growth vigor in F1 Populus section Tacamahaca hybrid plants, high and low vigor plants showing significant differences in apical dominance during a rapid growth period were selected. Apical bud transcriptomes of high and low-growth-vigor hybrids and their parents were analyzed using high-throughput RNA sequencing on an Illumina HiSeq 2000 platform. A total of 5,542 genes were differently expressed between high growth vigor hybrid and its parents, the genes were significantly enriched in pathways related to processes such as photosynthesis, pyrimidine ribonucleotide biosynthetic processes and nucleoside metabolic processes. There were 1410 differentially expressed genes between high and low growth vigor hybrid, the genes were mainly involved in photosynthesis, chlorophyll biosynthetic process, carbon fixation in photosynthetic organisms, porphyrin and chlorophyll metabolism and nitrogen metabolism. Moreover, a k-core of a gene co-expression network analysis was performed to identify the potential functions of genes related to high growth vigor. The functions of 8 selected candidate genes were associated mainly with circadian rhythm, water transport, cellulose catabolic processes, sucrose biosynthesis, pyrimidine ribonucleotide biosynthesis, purine nucleotide biosynthesis, meristem maintenance, and carbohydrate metabolism. Our results may contribute to a better understanding of the molecular basis of high growth vigor in hybrids and its regulation. (author)

  13. Using the key success factor concept in competitor intelligence and benchmarking

    DEFF Research Database (Denmark)

    Bisp, Søren; Sørensen, Elin; Grunert, Klaus G.

    1997-01-01

    A key success factor is regarded as a skill or a resource that a business can invest in, which explains a major part of the observable differences in perceived value of the offer and/or relative costs of bringing that offer to the marketplace. Key success factors are potentially useful in structu......A key success factor is regarded as a skill or a resource that a business can invest in, which explains a major part of the observable differences in perceived value of the offer and/or relative costs of bringing that offer to the marketplace. Key success factors are potentially useful...... in structuring the generation of market intelligence in competitor analysis and benchmarking. To this end, a method was developed, based on a reverse laddering procedure, which elicits decision-makers' subjec causal maps. When aggregated, these maps can be used to derive competitor analysis systems. The paper...

  14. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  15. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  16. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  17. Quantitative transcription dynamic analysis reveals candidate genes and key regulators for ethanol tolerance in Saccharomyces cerevisiae

    Directory of Open Access Journals (Sweden)

    Ma Menggen

    2010-06-01

    Full Text Available Abstract Background Derived from our lignocellulosic conversion inhibitor-tolerant yeast, we generated an ethanol-tolerant strain Saccharomyces cerevisiae NRRL Y-50316 by enforced evolutionary adaptation. Using a newly developed robust mRNA reference and a master equation unifying gene expression data analyses, we investigated comparative quantitative transcription dynamics of 175 genes selected from previous studies for an ethanol-tolerant yeast and its closely related parental strain. Results A highly fitted master equation was established and applied for quantitative gene expression analyses using pathway-based qRT-PCR array assays. The ethanol-tolerant Y-50316 displayed significantly enriched background of mRNA abundance for at least 35 genes without ethanol challenge compared with its parental strain Y-50049. Under the ethanol challenge, the tolerant Y-50316 responded in consistent expressions over time for numerous genes belonging to groups of heat shock proteins, trehalose metabolism, glycolysis, pentose phosphate pathway, fatty acid metabolism, amino acid biosynthesis, pleiotropic drug resistance gene family and transcription factors. The parental strain showed repressed expressions for many genes and was unable to withstand the ethanol stress and establish a viable culture and fermentation. The distinct expression dynamics between the two strains and their close association with cell growth, viability and ethanol fermentation profiles distinguished the tolerance-response from the stress-response in yeast under the ethanol challenge. At least 82 genes were identified as candidate and key genes for ethanol-tolerance and subsequent fermentation under the stress. Among which, 36 genes were newly recognized by the present study. Most of the ethanol-tolerance candidate genes were found to share protein binding motifs of transcription factors Msn4p/Msn2p, Yap1p, Hsf1p and Pdr1p/Pdr3p. Conclusion Enriched background of transcription abundance

  18. Seed metabolomic study reveals significant metabolite variations and correlations among different soybean cultivars.

    Science.gov (United States)

    Lin, Hong; Rao, Jun; Shi, Jianxin; Hu, Chaoyang; Cheng, Fang; Wilson, Zoe A; Zhang, Dabing; Quan, Sheng

    2014-09-01

    Soybean [Glycine max (L.) Merr.] is one of the world's major crops, and soybean seeds are a rich and important resource for proteins and oils. While "omics" studies, such as genomics, transcriptomics, and proteomics, have been widely applied in soybean molecular research, fewer metabolomic studies have been conducted for large-scale detection of low molecular weight metabolites, especially in soybean seeds. In this study, we investigated the seed metabolomes of 29 common soybean cultivars through combined gas chromatography-mass spectrometry and ultra-performance liquid chromatography-tandem mass spectrometry. One hundred sixty-nine named metabolites were identified and subsequently used to construct a metabolic network of mature soybean seed. Among the 169 detected metabolites, 104 were found to be significantly variable in their levels across tested cultivars. Metabolite markers that could be used to distinguish genetically related soybean cultivars were also identified, and metabolite-metabolite correlation analysis revealed some significant associations within the same or among different metabolite groups. Findings from this work may potentially provide the basis for further studies on both soybean seed metabolism and metabolic engineering to improve soybean seed quality and yield. © 2014 Institute of Botany, Chinese Academy of Sciences.

  19. Seed metabolomic study reveals significant metabolite variations and correlations among different soybean cultivars

    Institute of Scientific and Technical Information of China (English)

    Hong Lin; Jun Rao; Jianxin Shi; Chaoyang Hu; Fang Cheng; Zoe AWilson; Dabing Zhang; Sheng Quan

    2014-01-01

    Soybean [Glycine max (L.) Merr.] is one of the world’s major crops, and soybean seeds are a rich and important resource for proteins and oils. While “omics”studies, such as genomics, transcriptomics, and proteomics, have been widely applied in soybean molecular research, fewer metabolomic studies have been conducted for large-scale detection of low molecular weight metabolites, especial y in soybean seeds. In this study, we investigated the seed metabolomes of 29 common soybean cultivars through combined gas chromatography-mass spectrometry and ultra-performance liquid chromatography-tandem mass spectrometry. One hundred sixty-nine named metabolites were identified and subsequently used to construct a metabolic network of mature soybean seed. Among the 169 detected metabolites, 104 were found to be significantly variable in their levels across tested cultivars. Metabolite markers that could be used to distinguish genetical y related soybean cultivars were also identified, and metabolite-metabolite correlation analysis revealed some significant associations within the same or among different metabolite groups. Findings from this work may potentially provide the basis for further studies on both soybean seed metabolism and metabolic engineering to improve soybean seed quality and yield.

  20. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  1. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  2. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  3. Bursal transcriptome profiling of different inbred chicken lines reveals key differentially expressed genes at 3 days post-infection with very virulent infectious bursal disease virus.

    Science.gov (United States)

    Farhanah, Mohd Isa; Yasmin, Abd Rahaman; Mat Isa, Nurulfiza; Hair-Bejo, Mohd; Ideris, Aini; Powers, Claire; Oladapo, Omobolanle; Nair, Venugopal; Khoo, Jia-Shiun; Ghazali, Ahmad-Kamal; Yee, Wai-Yan; Omar, Abdul Rahman

    2018-01-01

    Infectious bursal disease is a highly contagious disease in the poultry industry and causes immunosuppression in chickens. Genome-wide regulations of immune response genes of inbred chickens with different genetic backgrounds, following very virulent infectious bursal disease virus (vvIBDV) infection are poorly characterized. Therefore, this study aims to analyse the bursal tissue transcriptome of six inbred chicken lines 6, 7, 15, N, O and P following infection with vvIBDV strain UK661 using strand-specific next-generation sequencing, by highlighting important genes and pathways involved in the infected chicken during peak infection at 3 days post-infection. All infected chickens succumbed to the infection without major variations among the different lines. However, based on the viral loads and bursal lesion scoring, lines P and 6 can be considered as the most susceptible lines, while lines 15 and N were regarded as the least affected lines. Transcriptome profiling of the bursa identified 4588 genes to be differentially expressed, with 2985 upregulated and 1642 downregulated genes, in which these genes were commonly or uniquely detected in all or several infected lines. Genes that were upregulated are primarily pro-inflammatory cytokines, chemokines and IFN-related. Various genes that are associated with B-cell functions and genes related to apoptosis were downregulated, together with the genes involved in p53 signalling. In conclusion, bursal transcriptome profiles of different inbred lines showed differential expressions of pro-inflammatory cytokines and chemokines, Th1 cytokines, JAK-STAT signalling genes, MAPK signalling genes, and their related pathways following vvIBDV infection.

  4. Glycoprotein profiles of macrophages at different stages of activation as revealed by lectin binding after electrophoretic separation.

    Science.gov (United States)

    Irimura, T; North, S M; Nicolson, G L

    1987-01-01

    Glycoprotein profiles of rat macrophages (M phi) at different stages of activation were studied by examining the reactivity of various lectins to the glycoproteins separated by polyacrylamide gel electrophoresis. Ricinus communis agglutinin 1 (RCA1) revealed several components including glycoproteins of Mr 160 kDa and 65 kDa prominent in resident M phi. A pokeweed mitogen (PWM) isolectin, Pa-4, recognizes branched poly(N-acetyllactosamine)-type carbohydrate chains, and revealed a significant increase in glycoproteins of Mr ranging from 70 kDa to 150 kDa on thioglycolate-elicited M phi. Increased reactivity of PWM to thioglycolate-elicited M phi was observed by direct binding of 125I-labeled Pa-4 to intact or glutaraldehyde-fixed M phi. Histochemical staining of formaldehyde-fixed M phi in vitro with biotinylated Pa-4 was consistent with the gel analysis, that is, resident M phi had no reactivity while thioglycolate-elicited M phi showed slight reactivity. Alveolar and intratumoral M phi bound more Pa-4 than resident or thioglycolate-elicited M phi. The PWM isolectin may therefore serve as a marker for an early stage of M phi activation.

  5. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  6. Network analysis of ChIP-Seq data reveals key genes in prostate cancer.

    Science.gov (United States)

    Zhang, Yu; Huang, Zhen; Zhu, Zhiqiang; Liu, Jianwei; Zheng, Xin; Zhang, Yuhai

    2014-09-03

    Prostate cancer (PC) is the second most common cancer among men in the United States, and it imposes a considerable threat to human health. A deep understanding of its underlying molecular mechanisms is the premise for developing effective targeted therapies. Recently, deep transcriptional sequencing has been used as an effective genomic assay to obtain insights into diseases and may be helpful in the study of PC. In present study, ChIP-Seq data for PC and normal samples were compared, and differential peaks identified, based upon fold changes (with P-values calculated with t-tests). Annotations of these peaks were performed. Protein-protein interaction (PPI) network analysis was performed with BioGRID and constructed with Cytoscape, following which the highly connected genes were screened. We obtained a total of 5,570 differential peaks, including 3,726 differentially enriched peaks in tumor samples and 1,844 differentially enriched peaks in normal samples. There were eight significant regions of the peaks. The intergenic region possessed the highest score (51%), followed by intronic (31%) and exonic (11%) regions. The analysis revealed the top 35 highly connected genes, which comprised 33 differential genes (such as YWHAQ, tyrosine 3-monooxygenase/tryptophan 5-monooxygenase activation protein and θ polypeptide) from ChIP-Seq data and 2 differential genes retrieved from the PPI network: UBA52 (ubiquitin A-52 residue ribosomal protein fusion product (1) and SUMO2 (SMT3 suppressor of mif two 3 homolog (2) . Our findings regarding potential PC-related genes increase the understanding of PC and provides direction for future research.

  7. Metabonomics revealed xanthine oxidase-induced oxidative stress and inflammation in the pathogenesis of diabetic nephropathy.

    Science.gov (United States)

    Liu, Jingping; Wang, Chengshi; Liu, Fang; Lu, Yanrong; Cheng, Jingqiu

    2015-03-01

    Diabetic nephropathy (DN) is a serious complication of diabetes mellitus (DM), which is a major public health problem in the world. To reveal the metabolic changes associated with DN, we analyzed the serum, urine, and renal extracts obtained from control and streptozotocin (STZ)-induced DN rats by (1)H NMR-based metabonomics and multivariate data analysis. A significant difference between control and DN rats was revealed in metabolic profiles, and we identified several important DN-related metabolites including increased levels of allantoin and uric acid (UA) in the DN rats, suggesting that disturbed purine metabolism may be involved in the DN. Combined with conventional histological and biological methods, we further demonstrated that xanthine oxidase (XO), a key enzyme for purine catabolism, was abnormally activated in the kidney of diabetic rats by hyperglycemia. The highly activated XO increased the level of intracellular ROS, which caused renal injury by direct oxidative damage to renal cells, and indirect inducing inflammatory responses via activating NF-κB signaling pathway. Our study highlighted that metabonomics is a promising tool to reveal the metabolic changes and the underlying mechanism involved in the pathogenesis of DN.

  8. Device-independent secret-key-rate analysis for quantum repeaters

    Science.gov (United States)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  9. Chaotic map based key agreement with/out clock synchronization

    International Nuclear Information System (INIS)

    Han, S.; Chang, E.

    2009-01-01

    In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.

  10. DNA polymorphisms revealed by the RAPD technique show differences between radionuclide-contaminated and uncontaminated mosquitofish populations

    International Nuclear Information System (INIS)

    Theodorakis, C.W.; Shugart, L.R.

    1993-01-01

    In 1977, approximately 250 Mosquitofish (Gambusia affines) were transplanted from a relatively uncontaminated site into a small pond on the Oak Ridge Reservation that is heavily contaminated with radionuclides. DNA polymorphisms, using the RAPD technique, were examined in order to determine if any genetic differentiation had occurred between the two populations. Also, fish from another radionuclide-contaminated population (White Oak Lake) and two unrelated non-contaminated populations were also examined. The RAPD (Randomly Amplified Polymorphic DNA) technique uses the polymerase chain reaction with a short oligonucleotide primer to produce DNA fragments of various lengths. When analyzed by gel electrophoresis, these fragments form banding patterns similar to DNA fingerprints. A total of 26 primers were used to produce DNA band patterns, many of which revealed population differences. In addition several primers revealed banding patterns which differentiated between the Crystal Springs and Pond 3513 populations. Furthermore, bands found at high frequency in Pond 3513 and White Oak Lake populations were absent or present at a lower frequency in the non-contaminated populations. For some primers, the contaminated populations showed more DNA bands per individual, and fish with more bands had fewer DNA strand breaks than the fish with fewer bands. These data will be discussed with relation to biomonitoring programs and evolution of resistance to genotoxins in natural populations

  11. Large-scale expression analysis reveals distinct microRNA profiles at different stages of human neurodevelopment.

    Directory of Open Access Journals (Sweden)

    Brandon Smith

    Full Text Available BACKGROUND: MicroRNAs (miRNAs are short non-coding RNAs predicted to regulate one third of protein coding genes via mRNA targeting. In conjunction with key transcription factors, such as the repressor REST (RE1 silencing transcription factor, miRNAs play crucial roles in neurogenesis, which requires a highly orchestrated program of gene expression to ensure the appropriate development and function of diverse neural cell types. Whilst previous studies have highlighted select groups of miRNAs during neural development, there remains a need for amenable models in which miRNA expression and function can be analyzed over the duration of neurogenesis. PRINCIPAL FINDINGS: We performed large-scale expression profiling of miRNAs in human NTera2/D1 (NT2 cells during retinoic acid (RA-induced transition from progenitors to fully differentiated neural phenotypes. Our results revealed dynamic changes of miRNA patterns, resulting in distinct miRNA subsets that could be linked to specific neurodevelopmental stages. Moreover, the cell-type specific miRNA subsets were very similar in NT2-derived differentiated cells and human primary neurons and astrocytes. Further analysis identified miRNAs as putative regulators of REST, as well as candidate miRNAs targeted by REST. Finally, we confirmed the existence of two predicted miRNAs; pred-MIR191 and pred-MIR222 associated with SLAIN1 and FOXP2, respectively, and provided some evidence of their potential co-regulation. CONCLUSIONS: In the present study, we demonstrate that regulation of miRNAs occurs in precise patterns indicative of their roles in cell fate commitment, progenitor expansion and differentiation into neurons and glia. Furthermore, the similarity between our NT2 system and primary human cells suggests their roles in molecular pathways critical for human in vivo neurogenesis.

  12. An empirical study on key factors for purchasing strategy on project based organizations: A case study of gas field development projects

    Directory of Open Access Journals (Sweden)

    Aboulfazl Kazazi

    2012-08-01

    Full Text Available One of the primary concerns in development of oil and gas resources is to find the critical success factors associated with different important projects. Purchasing and procurement plays a key role in these projects. There is no doubt that in history of similar studies, there are not much studies to determine key factors. The proposed study of this paper presents an empirical study to find these factors in one of the most important gas filed in Iran is now South Pars Gas Field. The study distributes a questionnaire consists of various questions associated with purchasing activities. We investigate the feedbacks gathered from decision makers using factor analysis. The results of our survey reveal that there are three categories of organizational strategy, the relative importance of strategy and risk according to factor analysis. Each factor consists of many other factors and the relative importance of all factors are investigated.

  13. Cytogenetical and morphological features reveal significant differences among Venezuelan and Brazilian samples of Mugil curema (Teleostei: Mugilidae

    Directory of Open Access Journals (Sweden)

    Mauro Nirchio

    Full Text Available Karyotype of M. curema from the Gulf of Mexico and Brazil have been reported as possessing chromosome complement with 2n=28 and FN=48, whereas specimens from Venezuela has been reported as possessing a diploid number 2n=24 and a conserved FN (48. Although at first sight this variation suggests the presence of a chromosomal intraspecific (interpopulational variability, the possibility that we are dealing with two different species was examined. This work revisit the karyotypes of M. curema from Venezuela and Brazil, including new data on C-banding, and NOR localization, and compares morphologic characteristics of samples from both localities. Thus, besides diploid number, the constitutive heterochromatin distribution and NORs location, mark other differences between M. curema Cytotype 1 (2n=28; FN=48 and Cytotype 2 (2n=24; NF=48. Moreover, morphologic comparison revealed differences in the scale counts and pectoral fin rays: 35 scales in the middle body line and 15 pectoral fin rays in specimens possessing the karyotype 2n=28, compared with 37-39 scales in the middle body line and 17 pectoral fin rays in specimens with the karyotype 2n=24. These differences lead us to suggest that both cytotypes are not related merely to geographic polytipic variations but could correspond to different species.

  14. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  15. Museum specimens reveal loss of pollen host plants as key factor driving wild bee decline in The Netherlands

    Science.gov (United States)

    Scheper, Jeroen; Reemer, Menno; van Kats, Ruud; Ozinga, Wim A.; van der Linden, Giel T. J.; Schaminée, Joop H. J.; Siepel, Henk; Kleijn, David

    2014-01-01

    Evidence for declining populations of both wild and managed bees has raised concern about a potential global pollination crisis. Strategies to mitigate bee loss generally aim to enhance floral resources. However, we do not really know whether loss of preferred floral resources is the key driver of bee decline because accurate assessment of host plant preferences is difficult, particularly for species that have become rare. Here we examine whether population trends of wild bees in The Netherlands can be explained by trends in host plants, and how this relates to other factors such as climate change. We determined host plant preference of bee species using pollen loads on specimens in entomological collections that were collected before the onset of their decline, and used atlas data to quantify population trends of bee species and their host plants. We show that decline of preferred host plant species was one of two main factors associated with bee decline. Bee body size, the other main factor, was negatively related to population trend, which, because larger bee species have larger pollen requirements than smaller species, may also point toward food limitation as a key factor driving wild bee loss. Diet breadth and other potential factors such as length of flight period or climate change sensitivity were not important in explaining twentieth century bee population trends. These results highlight the species-specific nature of wild bee decline and indicate that mitigation strategies will only be effective if they target the specific host plants of declining species. PMID:25422416

  16. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. Key parameters analysis of hybrid HEMP simulator

    International Nuclear Information System (INIS)

    Mao Congguang; Zhou Hui

    2009-01-01

    According to the new standards on the high-altitude electromagnetic pulse (HEMP) developed by International Electrotechnical Commission (IEC), the target parameter requirements of the key structure of the hybrid HEMP simulator are decomposed. Firstly, the influences of the different excitation sources and biconical structures to the key parameters of the radiated electric field wave shape are investigated and analyzed. Then based on the influence curves the target parameter requirements of the pulse generator are proposed. Finally the appropriate parameters of the biconical structure and the excitation sources are chosen, and the computational result of the electric field in free space is presented. The results are of great value for the design of the hybrid HEMP simulator. (authors)

  19. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  20. Experimental evolution reveals differences between phenotypic and evolutionary responses to population density.

    Science.gov (United States)

    McNamara, K B; Simmons, L W

    2017-09-01

    Group living can select for increased immunity, given the heightened risk of parasite transmission. Yet, it also may select for increased male reproductive investment, given the elevated risk of female multiple mating. Trade-offs between immunity and reproduction are well documented. Phenotypically, population density mediates both reproductive investment and immune function in the Indian meal moth, Plodia interpunctella. However, the evolutionary response of populations to these traits is unknown. We created two replicated populations of P. interpunctella, reared and mated for 14 generations under high or low population densities. These population densities cause plastic responses in immunity and reproduction: at higher numbers, both sexes invest more in one index of immunity [phenoloxidase (PO) activity] and males invest more in sperm. Interestingly, our data revealed divergence in PO and reproduction in a different direction to previously reported phenotypic responses. Males evolving at low population densities transferred more sperm, and both males and females displayed higher PO than individuals at high population densities. These positively correlated responses to selection suggest no apparent evolutionary trade-off between immunity and reproduction. We speculate that the reduced PO activity and sperm investment when evolving under high population density may be due to the reduced population fitness predicted under increased sexual conflict and/or to trade-offs between pre- and post-copulatory traits. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  1. Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution

    CERN Document Server

    Tamaki, K

    2005-01-01

    In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in "SARG04 protocol" proposed by V. Scarani et al, in Phys. Rev. Lett. 92, 057901 (2004). This protocol differs from BB84 only in the classical communication. It is, thus, interesting to see how only the classical communication of QKD protocol might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.

  2. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  3. Long-distance quantum key distribution with imperfect devices

    International Nuclear Information System (INIS)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-01-01

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R QKD . The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels. We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols

  4. Integrated Analysis of Alzheimer's Disease and Schizophrenia Dataset Revealed Different Expression Pattern in Learning and Memory.

    Science.gov (United States)

    Li, Wen-Xing; Dai, Shao-Xing; Liu, Jia-Qian; Wang, Qian; Li, Gong-Hua; Huang, Jing-Fei

    2016-01-01

    Alzheimer's disease (AD) and schizophrenia (SZ) are both accompanied by impaired learning and memory functions. This study aims to explore the expression profiles of learning or memory genes between AD and SZ. We downloaded 10 AD and 10 SZ datasets from GEO-NCBI for integrated analysis. These datasets were processed using RMA algorithm and a global renormalization for all studies. Then Empirical Bayes algorithm was used to find the differentially expressed genes between patients and controls. The results showed that most of the differentially expressed genes were related to AD whereas the gene expression profile was little affected in the SZ. Furthermore, in the aspects of the number of differentially expressed genes, the fold change and the brain region, there was a great difference in the expression of learning or memory related genes between AD and SZ. In AD, the CALB1, GABRA5, and TAC1 were significantly downregulated in whole brain, frontal lobe, temporal lobe, and hippocampus. However, in SZ, only two genes CRHBP and CX3CR1 were downregulated in hippocampus, and other brain regions were not affected. The effect of these genes on learning or memory impairment has been widely studied. It was suggested that these genes may play a crucial role in AD or SZ pathogenesis. The different gene expression patterns between AD and SZ on learning and memory functions in different brain regions revealed in our study may help to understand the different mechanism between two diseases.

  5. DNA entropy reveals a significant difference in complexity between housekeeping and tissue specific gene promoters.

    Science.gov (United States)

    Thomas, David; Finan, Chris; Newport, Melanie J; Jones, Susan

    2015-10-01

    The complexity of DNA can be quantified using estimates of entropy. Variation in DNA complexity is expected between the promoters of genes with different transcriptional mechanisms; namely housekeeping (HK) and tissue specific (TS). The former are transcribed constitutively to maintain general cellular functions, and the latter are transcribed in restricted tissue and cells types for specific molecular events. It is known that promoter features in the human genome are related to tissue specificity, but this has been difficult to quantify on a genomic scale. If entropy effectively quantifies DNA complexity, calculating the entropies of HK and TS gene promoters as profiles may reveal significant differences. Entropy profiles were calculated for a total dataset of 12,003 human gene promoters and for 501 housekeeping (HK) and 587 tissue specific (TS) human gene promoters. The mean profiles show the TS promoters have a significantly lower entropy (pentropy distributions for the 3 datasets show that promoter entropies could be used to identify novel HK genes. Functional features comprise DNA sequence patterns that are non-random and hence they have lower entropies. The lower entropy of TS gene promoters can be explained by a higher density of positive and negative regulatory elements, required for genes with complex spatial and temporary expression. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  7. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to 'steal' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  8. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  9. Correction: Comparative analysis of fungal genomes reveals different plant cell wall degrading capacity in fungi

    Science.gov (United States)

    2014-01-01

    Abstract The version of this article published in BMC Genomics 2013, 14: 274, contains 9 unpublished genomes (Botryobasidium botryosum, Gymnopus luxurians, Hypholoma sublateritium, Jaapia argillacea, Hebeloma cylindrosporum, Conidiobolus coronatus, Laccaria amethystina, Paxillus involutus, and P. rubicundulus) downloaded from JGI website. In this correction, we removed these genomes after discussion with editors and data producers whom we should have contacted before downloading these genomes. Removing these data did not alter the principle results and conclusions of our original work. The relevant Figures 1, 2, 3, 4 and 6; and Table 1 have been revised. Additional files 1, 3, 4, and 5 were also revised. We would like to apologize for any confusion or inconvenience this may have caused. Background Fungi produce a variety of carbohydrate activity enzymes (CAZymes) for the degradation of plant polysaccharide materials to facilitate infection and/or gain nutrition. Identifying and comparing CAZymes from fungi with different nutritional modes or infection mechanisms may provide information for better understanding of their life styles and infection models. To date, over hundreds of fungal genomes are publicly available. However, a systematic comparative analysis of fungal CAZymes across the entire fungal kingdom has not been reported. Results In this study, we systemically identified glycoside hydrolases (GHs), polysaccharide lyases (PLs), carbohydrate esterases (CEs), and glycosyltransferases (GTs) as well as carbohydrate-binding modules (CBMs) in the predicted proteomes of 94 representative fungi from Ascomycota, Basidiomycota, Chytridiomycota, and Zygomycota. Comparative analysis of these CAZymes that play major roles in plant polysaccharide degradation revealed that fungi exhibit tremendous diversity in the number and variety of CAZymes. Among them, some families of GHs and CEs are the most prevalent CAZymes that are distributed in all of the fungi analyzed

  10. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  11. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  12. The control processes and subjective well-being of Chinese teachers: Evidence of convergence with and divergence from the key propositions of the motivational theory of life-span development

    Directory of Open Access Journals (Sweden)

    Wan-Chi eWong

    2014-05-01

    Full Text Available An analytical review of the motivational theory of life-span development reveals that this theory has undergone a series of elegant theoretical integrations. Its claim to universality nonetheless brings forth unresolved controversies. With the purpose of scrutinizing the key propositions of this theory, an empirical study was designed to examine the control processes and subjective well-being of Chinese teachers (N = 637. The OPS-Scales (Optimization in Primary and Secondary Control Scales for the Domain of Teaching were constructed to assess patterns of control processes. Three facets of subjective well-being were investigated with the Positive and Negative Affect Schedule, the Life Satisfaction Scale, and the Subjective Vitality Scale. The results revealed certain aspects of alignment with and certain divergences from the key propositions of the motivational theory of life-span development. Neither primacy of primary control nor primacy of secondary control was clearly supported. Notably, using different criteria for subjective well-being yielded different subtypes of primary and secondary control as predictors. The hypothesized life-span trajectories of primary and secondary control received limited support. To advance the theory in this area, we recommend incorporating Lakatos’ ideas about sophisticated falsification by specifying the hard core of the motivational theory of life-span development and articulating new auxiliary hypotheses.

  13. Understanding Key Determinants of Brand Loyalty in Full Service Restaurants in Uganda

    Directory of Open Access Journals (Sweden)

    Samson Omuudu OTENGEI

    2014-12-01

    Full Text Available The study investigates the key determinants of brand loyalty in full service restaurants in Uganda. The study used a quantitative research approach and adopted a cross sectional correlation survey design to test the study hypotheses. A total of 348 completed questionnaires collected from 116 restaurants were used in the analysis. To the best of our knowledge, this is the first study to propose a model that examines the key determinants of brand loyalty in full service restaurants in Uganda. The findings from the study revealed that dining experience and restaurant image were significant predictors of brand loyalty in full service restaurants in Uganda and customer satisfaction was not a significant predictor of guest loyalty. Despite its managerial implications, several limitations of the study call for further empirical enquiry.

  14. Instantaneous, Simple, and Reversible Revealing of Invisible Patterns Encrypted in Robust Hollow Sphere Colloidal Photonic Crystals.

    Science.gov (United States)

    Zhong, Kuo; Li, Jiaqi; Liu, Liwang; Van Cleuvenbergen, Stijn; Song, Kai; Clays, Koen

    2018-05-04

    The colors of photonic crystals are based on their periodic crystalline structure. They show clear advantages over conventional chromophores for many applications, mainly due to their anti-photobleaching and responsiveness to stimuli. More specifically, combining colloidal photonic crystals and invisible patterns is important in steganography and watermarking for anticounterfeiting applications. Here a convenient way to imprint robust invisible patterns in colloidal crystals of hollow silica spheres is presented. While these patterns remain invisible under static environmental humidity, even up to near 100% relative humidity, they are unveiled immediately (≈100 ms) and fully reversibly by dynamic humid flow, e.g., human breath. They reveal themselves due to the extreme wettability of the patterned (etched) regions, as confirmed by contact angle measurements. The liquid surface tension threshold to induce wetting (revealing the imprinted invisible images) is evaluated by thermodynamic predictions and subsequently verified by exposure to various vapors with different surface tension. The color of the patterned regions is furthermore independently tuned by vapors with different refractive indices. Such a system can play a key role in applications such as anticounterfeiting, identification, and vapor sensing. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. In Vivo Loss of Function Screening Reveals Carbonic Anhydrase IX as a Key Modulator of Tumor Initiating Potential in Primary Pancreatic Tumors

    Directory of Open Access Journals (Sweden)

    Nabendu Pore

    2015-06-01

    Full Text Available Reprogramming of energy metabolism is one of the emerging hallmarks of cancer. Up-regulation of energy metabolism pathways fuels cell growth and division, a key characteristic of neoplastic disease, and can lead to dependency on specific metabolic pathways. Thus, targeting energy metabolism pathways might offer the opportunity for novel therapeutics. Here, we describe the application of a novel in vivo screening approach for the identification of genes involved in cancer metabolism using a patient-derived pancreatic xenograft model. Lentiviruses expressing short hairpin RNAs (shRNAs targeting 12 different cell surface protein transporters were separately transduced into the primary pancreatic tumor cells. Transduced cells were pooled and implanted into mice. Tumors were harvested at different times, and the frequency of each shRNA was determined as a measure of which ones prevented tumor growth. Several targets including carbonic anhydrase IX (CAIX, monocarboxylate transporter 4, and anionic amino acid transporter light chain, xc- system (xCT were identified in these studies and shown to be required for tumor initiation and growth. Interestingly, CAIX was overexpressed in the tumor initiating cell population. CAIX expression alone correlated with a highly tumorigenic subpopulation of cells. Furthermore, CAIX expression was essential for tumor initiation because shRNA knockdown eliminated the ability of cells to grow in vivo. To the best of our knowledge, this is the first parallel in vivo assessment of multiple novel oncology target genes using a patient-derived pancreatic tumor model.

  16. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  17. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  18. Transcriptome analysis of pecan seeds at different developing stages and identification of key genes involved in lipid metabolism.

    Science.gov (United States)

    Xu, Zheng; Ni, Jun; Shah, Faheem Afzal; Wang, Qiaojian; Wang, Zhaocheng; Wu, Lifang; Fu, Songling

    2018-01-01

    Pecan is an economically important nut crop tree due to its unique texture and flavor properties. The pecan seed is rich of unsaturated fatty acid and protein. However, little is known about the molecular mechanisms of the biosynthesis of fatty acids in the developing seeds. In this study, transcriptome sequencing of the developing seeds was performed using Illumina sequencing technology. Pecan seed embryos at different developmental stages were collected and sequenced. The transcriptomes of pecan seeds at two key developing stages (PA, the initial stage and PS, the fast oil accumulation stage) were also compared. A total of 82,155 unigenes, with an average length of 1,198 bp from seven independent libraries were generated. After functional annotations, we detected approximately 55,854 CDS, among which, 2,807 were Transcription Factor (TF) coding unigenes. Further, there were 13,325 unigenes that showed a 2-fold or greater expression difference between the two groups of libraries (two developmental stages). After transcriptome analysis, we identified abundant unigenes that could be involved in fatty acid biosynthesis, degradation and some other aspects of seed development in pecan. This study presents a comprehensive dataset of transcriptomic changes during the seed development of pecan. It provides insights in understanding the molecular mechanisms responsible for fatty acid biosynthesis in the seed development. The identification of functional genes will also be useful for the molecular breeding work of pecan.

  19. Multivariate pattern analysis reveals anatomical connectivity differences between the left and right mesial temporal lobe epilepsy.

    Science.gov (United States)

    Fang, Peng; An, Jie; Zeng, Ling-Li; Shen, Hui; Chen, Fanglin; Wang, Wensheng; Qiu, Shijun; Hu, Dewen

    2015-01-01

    Previous studies have demonstrated differences of clinical signs and functional brain network organizations between the left and right mesial temporal lobe epilepsy (mTLE), but the anatomical connectivity differences underlying functional variance between the left and right mTLE remain uncharacterized. We examined 43 (22 left, 21 right) mTLE patients with hippocampal sclerosis and 39 healthy controls using diffusion tensor imaging. After the whole-brain anatomical networks were constructed for each subject, multivariate pattern analysis was applied to classify the left mTLE from the right mTLE and extract the anatomical connectivity differences between the left and right mTLE patients. The classification results reveal 93.0% accuracy for the left mTLE versus the right mTLE, 93.4% accuracy for the left mTLE versus controls and 90.0% accuracy for the right mTLE versus controls. Compared with the right mTLE, the left mTLE exhibited a different connectivity pattern in the cortical-limbic network and cerebellum. The majority of the most discriminating anatomical connections were located within or across the cortical-limbic network and cerebellum, thereby indicating that these disease-related anatomical network alterations may give rise to a portion of the complex of emotional and memory deficit between the left and right mTLE. Moreover, the orbitofrontal gyrus, cingulate cortex, hippocampus and parahippocampal gyrus, which exhibit high discriminative power in classification, may play critical roles in the pathophysiology of mTLE. The current study demonstrated that anatomical connectivity differences between the left mTLE and the right mTLE may have the potential to serve as a neuroimaging biomarker to guide personalized diagnosis of the left and right mTLE.

  20. Revealing the Determinants of Widespread Alternative Splicing Perturbation in Cancer

    Directory of Open Access Journals (Sweden)

    Yongsheng Li

    2017-10-01

    Full Text Available It is increasingly appreciated that alternative splicing plays a key role in generating functional specificity and diversity in cancer. However, the mechanisms by which cancer mutations perturb splicing remain unknown. Here, we developed a network-based strategy, DrAS-Net, to investigate more than 2.5 million variants across cancer types and link somatic mutations with cancer-specific splicing events. We identified more than 40,000 driver variant candidates and their 80,000 putative splicing targets deregulated in 33 cancer types and inferred their functional impact. Strikingly, tumors with splicing perturbations show reduced expression of immune system-related genes and increased expression of cell proliferation markers. Tumors harboring different mutations in the same gene often exhibit distinct splicing perturbations. Further stratification of 10,000 patients based on their mutation-splicing relationships identifies subtypes with distinct clinical features, including survival rates. Our work reveals how single-nucleotide changes can alter the repertoires of splicing isoforms, providing insights into oncogenic mechanisms for precision medicine.

  1. Quantum key distribution without sending a quantum signal

    International Nuclear Information System (INIS)

    Ralph, T C; Walk, N

    2015-01-01

    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. While this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space–time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology. (paper)

  2. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  3. Tight finite-key analysis for quantum cryptography.

    Science.gov (United States)

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  4. Key-Feature-Probleme zum Prüfen von prozeduralem Wissen: Ein Praxisleitfaden [Key Feature Problems for the assessment of procedural knowledge: a practical guide

    Directory of Open Access Journals (Sweden)

    Kopp, Veronika

    2006-08-01

    Full Text Available [english] After assigning the different examination formats to the diverse terms of Miller's pyramide of knowledge, this paper provides a short presentation of the key feature approach by giving the definition and an example for clarification. Afterwards, a practical guide to writing key feature problems is given consisting of the following steps: define the domain, choose a clinical situation, define the key features, develop a test case scenario, write questions, select a preferred response format, define the scoring key, and validation. Finally, we present the evaluation results of this practical guide. In sum, the participants were very pleased with it. The differences between the estimations of their knowledge before and after the workshop concerning key features were significant. The key feature approach is an innovative tool for assessing clinical decision-making skills, also for electronical examinations. Substituting the write-in format for the long-menu format allows an automatic data analysis. [german] Im vorliegenden Beitrag wird - nach der Zuordnung unterschiedlicher Prüfungsformen zu den verschiedenen Wissensarten der Wissenspyramide von Miller - der Key-Feature (KF Ansatz vorgestellt. Nachdem anhand der Definition und einem Beispiel erklärt wurde, was ein KF ist, wird im Anschluss eine Anleitung für die Erstellung eines KF-Problems gegeben. Diese besteht aus folgenden Schritten: Definition des Kontextes, Wahl der klinischen Situation, Identifikation der KFs des klinischen Problems, Schreiben des klinischen Szenarios (Fallvignette, Schreiben der einzelnen KF-Fragen, Auswahl des Antwortformates, Bewertungsverfahren und Inhaltsvalidierung. Am Ende werden die Ergebnisse einer Evaluation dieser Anleitung, die im Rahmen eines KF-Workshops gewonnen wurden, präsentiert. Die Teilnehmer waren mit dieser Workshopeinheit sehr zufrieden und gaben an, sehr viel gelernt zu haben. Die subjektive Einschätzung ihres Wissensstands vor und nach

  5. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    International Nuclear Information System (INIS)

    Lan, Ganhui; Tu, Yuhai

    2016-01-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  6. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  7. Phenotypic diversity of diploid and haploid Emiliania huxleyi cells and of cells in different growth phases revealed by comparative metabolomics.

    Science.gov (United States)

    Mausz, Michaela A; Pohnert, Georg

    2015-01-01

    In phytoplankton a high species diversity of microalgae co-exists at a given time. But diversity is not only reflected by the species composition. Within these species different life phases as well as different metabolic states can cause additional diversity. One important example is the coccolithophore Emiliania huxleyi. Diploid cells play an important role in marine ecosystems since they can form massively abundant algal blooms but in addition the less abundant haploid life phase of E. huxleyi occurs in lower quantities. Both life phases may fulfill different functions in the plankton. We hypothesize that in addition to the functional diversity caused by this life phase transition the growth stage of cells can also influence the metabolic composition and thus the ecological impact of E. huxleyi. Here we introduce a metabolomic survey in dependence of life phases as well as different growth phases to reveal such changes. The comparative metabolomic approach is based on the extraction of intracellular metabolites from intact microalgae, derivatization and analysis by gas chromatography coupled to mass spectrometry (GC-MS). Automated data processing and statistical analysis using canonical analysis of principal coordinates (CAP) revealed unique metabolic profiles for each life phase. Concerning the correlations of metabolites to growth phases, complex patterns were observed. As for example the saccharide mannitol showed its highest concentration in the exponential phase, whereas fatty acids were correlated to stationary and sterols to declining phase. These results are indicative for specific ecological roles of these stages of E. huxleyi and are discussed in the context of previous physiological and ecological studies. Copyright © 2014 Elsevier GmbH. All rights reserved.

  8. Megacity precipitationsheds reveal tele-connected water security challenges

    Science.gov (United States)

    Wang-Erlandsson, Lan; Gordon, Line J.

    2018-01-01

    Urbanization is a global process that has taken billions of people from the rural countryside to concentrated urban centers, adding pressure to existing water resources. Many cities are specifically reliant on renewable freshwater regularly refilled by precipitation, rather than fossil groundwater or desalination. A precipitationshed can be considered the “watershed of the sky” and identifies the origin of precipitation falling in a given region. In this paper, we use this concept to determine the sources of precipitation that supply renewable water in the watersheds of the largest cities of the world. We quantify the sources of precipitation for 29 megacities and analyze their differences between dry and wet years. Our results reveal that 19 of 29 megacities depend for more than a third of their water supply on evaporation from land. We also show that for many of the megacities, the terrestrial dependence is higher in dry years. This high dependence on terrestrial evaporation for their precipitation exposes these cities to potential land-use change that could reduce the evaporation that generates precipitation. Combining indicators of water stress, moisture recycling exposure, economic capacity, vegetation-regulated evaporation, land-use change, and dry-season moisture recycling sensitivity reveals four highly vulnerable megacities (Karachi, Shanghai, Wuhan, and Chongqing). A further six megacities were found to have medium vulnerability with regard to their water supply. We conclude that understanding how upwind landscapes affect downwind municipal water resources could be a key component for understanding the complexity of urban water security. PMID:29534109

  9. The new galaxy evolution paradigm revealed by the Herschel surveys

    Science.gov (United States)

    Eales, Stephen; Smith, Dan; Bourne, Nathan; Loveday, Jon; Rowlands, Kate; van der Werf, Paul; Driver, Simon; Dunne, Loretta; Dye, Simon; Furlanetto, Cristina; Ivison, R. J.; Maddox, Steve; Robotham, Aaron; Smith, Matthew W. L.; Taylor, Edward N.; Valiante, Elisabetta; Wright, Angus; Cigan, Philip; De Zotti, Gianfranco; Jarvis, Matt J.; Marchetti, Lucia; Michałowski, Michał J.; Phillipps, Steven; Viaene, Sebastien; Vlahakis, Catherine

    2018-01-01

    The Herschel Space Observatory has revealed a very different galaxyscape from that shown by optical surveys which presents a challenge for galaxy-evolution models. The Herschel surveys reveal (1) that there was rapid galaxy evolution in the very recent past and (2) that galaxies lie on a single Galaxy Sequence (GS) rather than a star-forming 'main sequence' and a separate region of 'passive' or 'red-and-dead' galaxies. The form of the GS is now clearer because far-infrared surveys such as the Herschel ATLAS pick up a population of optically red star-forming galaxies that would have been classified as passive using most optical criteria. The space-density of this population is at least as high as the traditional star-forming population. By stacking spectra of H-ATLAS galaxies over the redshift range 0.001 high stellar masses, high star-formation rates but, even several billion years in the past, old stellar populations - they are thus likely to be relatively recent ancestors of early-type galaxies in the Universe today. The form of the GS is inconsistent with rapid quenching models and neither the analytic bathtub model nor the hydrodynamical EAGLE simulation can reproduce the rapid cosmic evolution. We propose a new gentler model of galaxy evolution that can explain the new Herschel results and other key properties of the galaxy population.

  10. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  11. Proteomic Profiles Reveal the Function of Different Vegetative Tissues of Moringa oleifera.

    Science.gov (United States)

    Wang, Lei; Zou, Qiong; Wang, Jinxing; Zhang, Junjie; Liu, Zeping; Chen, Xiaoyang

    2016-12-01

    Moringa oleifera is a rich source of bioactive compounds and is widely used in traditional medicine and food for its nutritional value; however, the protein and peptide components of different tissues are rarely discussed. Here, we describe the first investigation of M. oleifera proteomes using mass spectrometry and bioinformatics methods. We aimed to elucidate the protein profiles of M. oleifera leaves, stem, bark, and root. Totally 202 proteins were identified from four vegetative organs. We identified 101 proteins from leaves, 51 from stem, 94 from bark and 67 from root, finding that only five proteins existed in both four vegetative parts. The calculated pI of most of the proteins is distributed in 5-10 and the molecular weight distributed below 100 kDa. Functional classification analysis revealed that proteins which are involved in catalytic activities are the most abundant both in leaves, stem, bark and root. Identification of several heat shock proteins in four vegetative tissues might be adaptive for resistance to high temperature environmental stresses of tropical or subtropical areas. Some enzymes involved in antioxidant processes were also identified in M. oleifera leaves, stem, bark and root. Among the four tissues studies here, leaves protein content and molecular diversity were the highest. The identification of the flocculating protein MO2.1 and MO2.2 in the bark and root provides clue to clarify the antimicrobial molecular mechanisms of root and bark. This study provides information on the protein compositions of M. oleifera vegetative tissues that will be beneficial for potential drug and food supplement development and plant physiology research.

  12. Autoshaping and automaintenance of a key-press response in squirrel monkeys.

    Science.gov (United States)

    Gamzu, E; Schwam, E

    1974-03-01

    Following exposure for a minimum of 500 to 600 trials, three of four naive squirrel monkeys eventually pressed a response key, illumination of which always preceded delivery of a food pellet. Three other naive monkeys did not press the key when the pellets were delivered randomly with respect to key illumination. Despite some similarities to autoshaping using pigeons, the data indicate many points of difference when squirrel monkeys are used as subjects. Although key-food pairings were shown to be important in the acquisition of the key-press response, they were ineffective in maintaining the response when either a negative response-reinforcer dependency was introduced, or when there was no scheduled response-reinforcer dependency (fixed trial). Not all demonstrations of autoshaping can be considered to be under the control of those processes that are primarily responsible for the phenomena obtained in pigeons.

  13. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  14. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  15. Quantum hacking on quantum key distribution using homodyne detection

    Science.gov (United States)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  16. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  17. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  18. Attention: Reaction Time and Accuracy Reveal Different Mechanisms

    Science.gov (United States)

    Prinzmetal, William; McCool, Christin; Park, Samuel

    2005-01-01

    The authors propose that there are 2 different mechanisms whereby spatial cues capture attention. The voluntary mechanism is the strategic allocation of perceptual resources to the location most likely to contain the target. The involuntary mechanism is a reflexive orienting response that occurs even when the spatial cue does not indicate the…

  19. Corporate Author Entry Records Retrieved by Use of Derived Truncated Search Keys

    Directory of Open Access Journals (Sweden)

    Alan L. Landgraf

    1973-09-01

    Full Text Available An experiment was conducted to design a corporate author index to a large bibliographic file. The nature of corporate entries necessitates a different search key construction from that of personal names or titles. Derivation of a search key to select distinct corporate entry records is discussed.

  20. Effective connectivity reveals strategy differences in an expert calculator.

    Directory of Open Access Journals (Sweden)

    Ludovico Minati

    Full Text Available Mathematical reasoning is a core component of cognition and the study of experts defines the upper limits of human cognitive abilities, which is why we are fascinated by peak performers, such as chess masters and mental calculators. Here, we investigated the neural bases of calendrical skills, i.e. the ability to rapidly identify the weekday of a particular date, in a gifted mental calculator who does not fall in the autistic spectrum, using functional MRI. Graph-based mapping of effective connectivity, but not univariate analysis, revealed distinct anatomical location of "cortical hubs" supporting the processing of well-practiced close dates and less-practiced remote dates: the former engaged predominantly occipital and medial temporal areas, whereas the latter were associated mainly with prefrontal, orbitofrontal and anterior cingulate connectivity. These results point to the effect of extensive practice on the development of expertise and long term working memory, and demonstrate the role of frontal networks in supporting performance on less practiced calculations, which incur additional processing demands. Through the example of calendrical skills, our results demonstrate that the ability to perform complex calculations is initially supported by extensive attentional and strategic resources, which, as expertise develops, are gradually replaced by access to long term working memory for familiar material.

  1. Multivariate pattern analysis reveals anatomical connectivity differences between the left and right mesial temporal lobe epilepsy

    Directory of Open Access Journals (Sweden)

    Peng Fang

    2015-01-01

    Full Text Available Previous studies have demonstrated differences of clinical signs and functional brain network organizations between the left and right mesial temporal lobe epilepsy (mTLE, but the anatomical connectivity differences underlying functional variance between the left and right mTLE remain uncharacterized. We examined 43 (22 left, 21 right mTLE patients with hippocampal sclerosis and 39 healthy controls using diffusion tensor imaging. After the whole-brain anatomical networks were constructed for each subject, multivariate pattern analysis was applied to classify the left mTLE from the right mTLE and extract the anatomical connectivity differences between the left and right mTLE patients. The classification results reveal 93.0% accuracy for the left mTLE versus the right mTLE, 93.4% accuracy for the left mTLE versus controls and 90.0% accuracy for the right mTLE versus controls. Compared with the right mTLE, the left mTLE exhibited a different connectivity pattern in the cortical-limbic network and cerebellum. The majority of the most discriminating anatomical connections were located within or across the cortical-limbic network and cerebellum, thereby indicating that these disease-related anatomical network alterations may give rise to a portion of the complex of emotional and memory deficit between the left and right mTLE. Moreover, the orbitofrontal gyrus, cingulate cortex, hippocampus and parahippocampal gyrus, which exhibit high discriminative power in classification, may play critical roles in the pathophysiology of mTLE. The current study demonstrated that anatomical connectivity differences between the left mTLE and the right mTLE may have the potential to serve as a neuroimaging biomarker to guide personalized diagnosis of the left and right mTLE.

  2. Comparative Transcriptome Analysis of Fetal Skin Reveals Key Genes Related to Hair Follicle Morphogenesis in Cashmere Goats.

    Directory of Open Access Journals (Sweden)

    Ye Gao

    Full Text Available Cashmere goat skin contains two types of hair follicles (HF: primary hair follicles (PHF and secondary hair follicles (SHF. Although multiple genetic determinants associated with HF formation have been identified, the molecules that determine the independent morphogenesis of HF in cashmere goats remain elusive. The growth and development of SHF directly influence the quantity and quality of cashmere production. Here, we report the transcriptome profiling analysis of nine skin samples from cashmere goats using 60- and 120-day-old embryos (E60 and E120, respectively, as well as newborns (NB, through RNA-sequencing (RNA-seq. HF morphological changes indicated that PHF were initiated at E60, with maturation from E120, while differentiation of SHF was identified at E120 until formation of cashmere occurred after birth (NB. The RNA-sequencing analysis generated over 20.6 million clean reads from each mRNA library. The number of differentially expressed genes (DEGs in E60 vs. E120, E120 vs. NB, and E60 vs. NB were 1,024, 0 and 1,801, respectively, indicating that no significant differences were found at transcriptomic levels between E120 and NB. Key genes including B4GALT4, TNC, a-integrin, and FGFR1, were up-regulated and expressed in HF initiation from E60 to E120, while regulatory genes such as GPRC5D, PAD3, HOXC13, PRR9, VSIG8, LRRC15, LHX2, MSX-2, and FOXN1 were up-regulated and expressed in HF keratinisation and hair shaft differentiation from E120 and NB to E60. Several genes belonging to the KRT and KRTAP gene families were detected throughout the three HF developmental stages. The transcriptional trajectory analyses of all DEGs indicated that immune privilege, glycosaminoglycan biosynthesis, extracellular matrix receptor interaction, and growth factor receptors all played dominant roles in the epithelial-mesenchymal interface and HF formation. We found that the Wnt, transforming growth factor-beta/bone morphogenetic protein, and Notch family

  3. Comparative Transcriptome Analysis of Fetal Skin Reveals Key Genes Related to Hair Follicle Morphogenesis in Cashmere Goats.

    Science.gov (United States)

    Gao, Ye; Wang, Xiaolong; Yan, Hailong; Zeng, Jie; Ma, Sen; Niu, Yiyuan; Zhou, Guangxian; Jiang, Yu; Chen, Yulin

    2016-01-01

    Cashmere goat skin contains two types of hair follicles (HF): primary hair follicles (PHF) and secondary hair follicles (SHF). Although multiple genetic determinants associated with HF formation have been identified, the molecules that determine the independent morphogenesis of HF in cashmere goats remain elusive. The growth and development of SHF directly influence the quantity and quality of cashmere production. Here, we report the transcriptome profiling analysis of nine skin samples from cashmere goats using 60- and 120-day-old embryos (E60 and E120, respectively), as well as newborns (NB), through RNA-sequencing (RNA-seq). HF morphological changes indicated that PHF were initiated at E60, with maturation from E120, while differentiation of SHF was identified at E120 until formation of cashmere occurred after birth (NB). The RNA-sequencing analysis generated over 20.6 million clean reads from each mRNA library. The number of differentially expressed genes (DEGs) in E60 vs. E120, E120 vs. NB, and E60 vs. NB were 1,024, 0 and 1,801, respectively, indicating that no significant differences were found at transcriptomic levels between E120 and NB. Key genes including B4GALT4, TNC, a-integrin, and FGFR1, were up-regulated and expressed in HF initiation from E60 to E120, while regulatory genes such as GPRC5D, PAD3, HOXC13, PRR9, VSIG8, LRRC15, LHX2, MSX-2, and FOXN1 were up-regulated and expressed in HF keratinisation and hair shaft differentiation from E120 and NB to E60. Several genes belonging to the KRT and KRTAP gene families were detected throughout the three HF developmental stages. The transcriptional trajectory analyses of all DEGs indicated that immune privilege, glycosaminoglycan biosynthesis, extracellular matrix receptor interaction, and growth factor receptors all played dominant roles in the epithelial-mesenchymal interface and HF formation. We found that the Wnt, transforming growth factor-beta/bone morphogenetic protein, and Notch family members

  4. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media-based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies.

  5. The Evolution of Two-Component Systems in Bacteria RevealsDifferent Strategies for Niche Adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Alm, Eric; Huang, Katherine; Arkin, Adam

    2006-09-13

    Two-component systems including histidine protein kinasesrepresent the primary signal transduction paradigm in prokaryoticorganisms. To understand how these systems adapt to allow organisms todetect niche-specific signals, we analyzed the phylogenetic distributionof nearly 5000 histidine protein kinases from 207 sequenced prokaryoticgenomes. We found that many genomes carry a large repertoire of recentlyevolved signaling genes, which may reflect selective pressure to adapt tonew environmental conditions. Both lineage-specific gene family expansionand horizontal gene transfer play major roles in the introduction of newhistidine kinases into genomes; however, there are differences in howthese two evolutionary forces act. Genes imported via horizontal transferare more likely to retain their original functionality as inferred from asimilar complement of signaling domains, while gene family expansionaccompanied by domain shuffling appears to be a major source of novelgenetic diversity. Family expansion is the dominantsource of newhistidine kinase genes in the genomes most enriched in signalingproteins, and detailed analysis reveals that divergence in domainstructure and changes in expression patterns are hallmarks of recentexpansions. Finally, while these two modes of gene acquisition arewidespread across bacterial taxa, there are clear species-specificpreferences for which mode is used.

  6. Mapping of the Lassa virus LAMP1 binding site reveals unique determinants not shared by other old world arenaviruses.

    Directory of Open Access Journals (Sweden)

    Hadar Israeli

    2017-04-01

    Full Text Available Cell entry of many enveloped viruses occurs by engagement with cellular receptors, followed by internalization into endocytic compartments and pH-induced membrane fusion. A previously unnoticed step of receptor switching was found to be critical during cell entry of two devastating human pathogens: Ebola and Lassa viruses. Our recent studies revealed the functional role of receptor switching to LAMP1 for triggering membrane fusion by Lassa virus and showed the involvement of conserved histidines in this switching, suggesting that other viruses from this family may also switch to LAMP1. However, when we investigated viruses that are genetically close to Lassa virus, we discovered that they cannot bind LAMP1. A crystal structure of the receptor-binding module from Morogoro virus revealed structural differences that allowed mapping of the LAMP1 binding site to a unique set of Lassa residues not shared by other viruses in its family, illustrating a key difference in the cell-entry mechanism of Lassa virus that may contribute to its pathogenicity.

  7. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  8. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  9. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  10. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    Science.gov (United States)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  11. Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.

    Science.gov (United States)

    Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra

    2017-10-01

    This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.

  12. Fast implementation of length-adaptive privacy amplification in quantum key distribution

    International Nuclear Information System (INIS)

    Zhang Chun-Mei; Li Mo; Huang Jing-Zheng; Li Hong-Wei; Li Fang-Yi; Wang Chuan; Yin Zhen-Qiang; Chen Wei; Han Zhen-Fu; Treeviriyanupab Patcharapong; Sripimanwat Keattisak

    2014-01-01

    Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems. (general)

  13. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  14. The complete genome and proteome of Laribacter hongkongensis reveal potential mechanisms for adaptations to different temperatures and habitats.

    Science.gov (United States)

    Woo, Patrick C Y; Lau, Susanna K P; Tse, Herman; Teng, Jade L L; Curreem, Shirly O T; Tsang, Alan K L; Fan, Rachel Y Y; Wong, Gilman K M; Huang, Yi; Loman, Nicholas J; Snyder, Lori A S; Cai, James J; Huang, Jian-Dong; Mak, William; Pallen, Mark J; Lok, Si; Yuen, Kwok-Yung

    2009-03-01

    Laribacter hongkongensis is a newly discovered Gram-negative bacillus of the Neisseriaceae family associated with freshwater fish-borne gastroenteritis and traveler's diarrhea. The complete genome sequence of L. hongkongensis HLHK9, recovered from an immunocompetent patient with severe gastroenteritis, consists of a 3,169-kb chromosome with G+C content of 62.35%. Genome analysis reveals different mechanisms potentially important for its adaptation to diverse habitats of human and freshwater fish intestines and freshwater environments. The gene contents support its phenotypic properties and suggest that amino acids and fatty acids can be used as carbon sources. The extensive variety of transporters, including multidrug efflux and heavy metal transporters as well as genes involved in chemotaxis, may enable L. hongkongensis to survive in different environmental niches. Genes encoding urease, bile salts efflux pump, adhesin, catalase, superoxide dismutase, and other putative virulence factors-such as hemolysins, RTX toxins, patatin-like proteins, phospholipase A1, and collagenases-are present. Proteomes of L. hongkongensis HLHK9 cultured at 37 degrees C (human body temperature) and 20 degrees C (freshwater habitat temperature) showed differential gene expression, including two homologous copies of argB, argB-20, and argB-37, which encode two isoenzymes of N-acetyl-L-glutamate kinase (NAGK)-NAGK-20 and NAGK-37-in the arginine biosynthesis pathway. NAGK-20 showed higher expression at 20 degrees C, whereas NAGK-37 showed higher expression at 37 degrees C. NAGK-20 also had a lower optimal temperature for enzymatic activities and was inhibited by arginine probably as negative-feedback control. Similar duplicated copies of argB are also observed in bacteria from hot springs such as Thermus thermophilus, Deinococcus geothermalis, Deinococcus radiodurans, and Roseiflexus castenholzii, suggesting that similar mechanisms for temperature adaptation may be employed by other

  15. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  16. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  17. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  18. Expression of cytokeratins in odontogenic jaw cysts: monoclonal antibodies reveal distinct variation between different cyst types.

    Science.gov (United States)

    Hormia, M; Ylipaavalniemi, P; Nagle, R B; Virtanen, I

    1987-08-01

    Immunostaining with monoclonal antibodies was used to study and compare the cytokeratin content of odontogenic cysts and normal gingival epithelium. Two monoclonal antibodies, PKK2 and KA1, stained the whole epithelium in all cyst samples. In gingiva, PKK2 gave a suprabasal staining and KA1 reacted with all epithelial cell layers. Antibodies PKK1, KM 4.62 and KS 8.12 gave a heterogeneous staining in follicular and radicular cysts. In keratocysts and in gingiva PKK1 and KM 4.62 reacted mainly with basal cells and KS 8.12 gave a suprabasal staining. Antibodies reacting with the simple epithelial cytokeratin polypeptide No. 18 (PKK3, KS 18.18) recognized in gingiva only solitary cells compatible with Merkel cells. In a case of follicular ameloblastoma a distinct staining of tumor epithelium was revealed with these antibodies. In 2 follicular cysts, but not in other cyst types, a layer of cytokeratin 18-positive cells was revealed. KA5 and KK 8.60 antibodies, reacting exclusively with keratinizing epithelia, including normal gingiva, gave no reaction in radicular cysts, keratocysts and ameloblastoma. Two of the follicular cysts, were negative for PKK3 and KS 18.18, but reacted strongly with KA5 and KK 8.60. The present results show that odontogenic jaw cysts have distinct differences in their cytokeratin content. With the exception of some follicular cysts, they lack signs of keratinizing epithelial differentiation. Only follicular cysts appear to share with some types of ameloblastoma the expression of cytokeratin polypeptide No. 18.

  19. The MTP1 promoters from Arabidopsis halleri reveal cis-regulating elements for the evolution of metal tolerance.

    Science.gov (United States)

    Fasani, Elisa; DalCorso, Giovanni; Varotto, Claudio; Li, Mingai; Visioli, Giovanna; Mattarozzi, Monica; Furini, Antonella

    2017-06-01

    In the hyperaccumulator Arabidopsis halleri, the zinc (Zn) vacuolar transporter MTP1 is a key component of hypertolerance. Because protein sequences and functions are highly conserved between A. halleri and Arabidopsis thaliana, Zn tolerance in A. halleri may reflect the constitutively higher MTP1 expression compared with A. thaliana, based on copy number expansion and different cis regulation. Three MTP1 promoters were characterized in A. halleri ecotype I16. The comparison with the A. thaliana MTP1 promoter revealed different expression profiles correlated with specific cis-acting regulatory elements. The MTP1 5' untranslated region, highly conserved among A. thaliana, Arabidopsis lyrata and A. halleri, contains a dimer of MYB-binding motifs in the A. halleri promoters absent in the A. thaliana and A. lyrata sequences. Site-directed mutagenesis of these motifs revealed their role for expression in trichomes. A. thaliana mtp1 transgenic lines expressing AtMTP1 controlled by the native A. halleri promoter were more Zn-tolerant than lines carrying mutations on MYB-binding motifs. Differences in Zn tolerance were associated with different distribution of Zn among plant organs and in trichomes. The different cis-acting elements in the MTP1 promoters of A. halleri, particularly the MYB-binding sites, are probably involved in the evolution of Zn tolerance. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  20. Identification of key residues for protein conformational transition using elastic network model.

    Science.gov (United States)

    Su, Ji Guo; Xu, Xian Jin; Li, Chun Hua; Chen, Wei Zu; Wang, Cun Xin

    2011-11-07

    Proteins usually undergo conformational transitions between structurally disparate states to fulfill their functions. The large-scale allosteric conformational transitions are believed to involve some key residues that mediate the conformational movements between different regions of the protein. In the present work, a thermodynamic method based on the elastic network model is proposed to predict the key residues involved in protein conformational transitions. In our method, the key functional sites are identified as the residues whose perturbations largely influence the free energy difference between the protein states before and after transition. Two proteins, nucleotide binding domain of the heat shock protein 70 and human/rat DNA polymerase β, are used as case studies to identify the critical residues responsible for their open-closed conformational transitions. The results show that the functionally important residues mainly locate at the following regions for these two proteins: (1) the bridging point at the interface between the subdomains that control the opening and closure of the binding cleft; (2) the hinge region between different subdomains, which mediates the cooperative motions between the corresponding subdomains; and (3) the substrate binding sites. The similarity in the positions of the key residues for these two proteins may indicate a common mechanism in their conformational transitions.

  1. FDG PET imaging of Ela1-myc mice reveals major biological differences between pancreatic acinar and ductal tumours

    Energy Technology Data Exchange (ETDEWEB)

    Abasolo, Ibane [Institut Municipal d' Investigacio Medica-Hospital del Mar, Parc de Recerca Biomedica de Barcelona, Barcelona (Spain); Universitat Pompeu Fabra, Parc de Recerca Biomedica de Barcelona, Departament de Ciencies Experimentals i de la Salut, Barcelona (Spain); Institut d' Alta Tecnologia - CRC, Parc de Recerca Biomedica de Barcelona, Barcelona (Spain); Pujal, Judit; Navarro, Pilar [Institut Municipal d' Investigacio Medica-Hospital del Mar, Parc de Recerca Biomedica de Barcelona, Barcelona (Spain); Rabanal, Rosa M.; Serafin, Anna [Universitat Autonoma de Barcelona, Departament de Medicina i Cirurgia Animals, Barcelona (Spain); Millan, Olga [Institut d' Alta Tecnologia - CRC, Parc de Recerca Biomedica de Barcelona, Barcelona (Spain); Real, Francisco X. [Institut Municipal d' Investigacio Medica-Hospital del Mar, Parc de Recerca Biomedica de Barcelona, Barcelona (Spain); Universitat Pompeu Fabra, Parc de Recerca Biomedica de Barcelona, Departament de Ciencies Experimentals i de la Salut, Barcelona (Spain); Programa de Patologia Molecular, Centro Nacional de Investigaciones Oncologicas, Madrid (Spain)

    2009-07-15

    The aim was to evaluate FDG PET imaging in Ela1-myc mice, a pancreatic cancer model resulting in the development of tumours with either acinar or mixed acinar-ductal phenotype. Transversal and longitudinal FDG PET studies were conducted; selected tissue samples were subjected to autoradiography and ex vivo organ counting. Glucose transporter and hexokinase mRNA expression was analysed by quantitative reverse transcription polymerase chain reaction (RT-PCR); Glut2 expression was analysed by immunohistochemistry. Transversal studies showed that mixed acinar-ductal tumours could be identified by FDG PET several weeks before they could be detected by hand palpation. Longitudinal studies revealed that ductal - but not acinar - tumours could be detected by FDG PET. Autoradiographic analysis confirmed that tumour areas with ductal differentiation incorporated more FDG than areas displaying acinar differentiation. Ex vivo radioactivity measurements showed that tumours of solely acinar phenotype incorporated more FDG than pancreata of non-transgenic littermates despite the fact that they did not yield positive PET images. To gain insight into the biological basis of the differential FDG uptake, glucose transporter and hexokinase transcript expression was studied in microdissected tumour areas enriched for acinar or ductal cells and validated using cell-specific markers. Glut2 and hexokinase I and II mRNA levels were up to 20-fold higher in ductal than in acinar tumours. Besides, Glut2 protein overexpression was found in ductal neoplastic cells but not in the surrounding stroma. In Ela1-myc mice, ductal tumours incorporate significantly more FDG than acinar tumours. This difference likely results from differential expression of Glut2 and hexokinases. These findings reveal previously unreported biological differences between acinar and ductal pancreatic tumours. (orig.)

  2. FDG PET imaging of Ela1-myc mice reveals major biological differences between pancreatic acinar and ductal tumours

    International Nuclear Information System (INIS)

    Abasolo, Ibane; Pujal, Judit; Navarro, Pilar; Rabanal, Rosa M.; Serafin, Anna; Millan, Olga; Real, Francisco X.

    2009-01-01

    The aim was to evaluate FDG PET imaging in Ela1-myc mice, a pancreatic cancer model resulting in the development of tumours with either acinar or mixed acinar-ductal phenotype. Transversal and longitudinal FDG PET studies were conducted; selected tissue samples were subjected to autoradiography and ex vivo organ counting. Glucose transporter and hexokinase mRNA expression was analysed by quantitative reverse transcription polymerase chain reaction (RT-PCR); Glut2 expression was analysed by immunohistochemistry. Transversal studies showed that mixed acinar-ductal tumours could be identified by FDG PET several weeks before they could be detected by hand palpation. Longitudinal studies revealed that ductal - but not acinar - tumours could be detected by FDG PET. Autoradiographic analysis confirmed that tumour areas with ductal differentiation incorporated more FDG than areas displaying acinar differentiation. Ex vivo radioactivity measurements showed that tumours of solely acinar phenotype incorporated more FDG than pancreata of non-transgenic littermates despite the fact that they did not yield positive PET images. To gain insight into the biological basis of the differential FDG uptake, glucose transporter and hexokinase transcript expression was studied in microdissected tumour areas enriched for acinar or ductal cells and validated using cell-specific markers. Glut2 and hexokinase I and II mRNA levels were up to 20-fold higher in ductal than in acinar tumours. Besides, Glut2 protein overexpression was found in ductal neoplastic cells but not in the surrounding stroma. In Ela1-myc mice, ductal tumours incorporate significantly more FDG than acinar tumours. This difference likely results from differential expression of Glut2 and hexokinases. These findings reveal previously unreported biological differences between acinar and ductal pancreatic tumours. (orig.)

  3. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  4. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  5. Evaluation of Lactococcus lactis Isolates from Nondairy Sources with Potential Dairy Applications Reveals Extensive Phenotype-Genotype Disparity and Implications for a Revised Species.

    Science.gov (United States)

    Cavanagh, Daniel; Casey, Aidan; Altermann, Eric; Cotter, Paul D; Fitzgerald, Gerald F; McAuliffe, Olivia

    2015-06-15

    Lactococcus lactis is predominantly associated with dairy fermentations, but evidence suggests that the domesticated organism originated from a plant niche. L. lactis possesses an unusual taxonomic structure whereby strain phenotypes and genotypes often do not correlate, which in turn has led to confusion in L. lactis classification. A bank of L. lactis strains was isolated from various nondairy niches (grass, vegetables, and bovine rumen) and was further characterized on the basis of key technological traits, including growth in milk and key enzyme activities. Phenotypic analysis revealed all strains from nondairy sources to possess an L. lactis subsp. lactis phenotype (lactis phenotype); however, seven of these strains possessed an L. lactis subsp. cremoris genotype (cremoris genotype), determined by two separate PCR assays. Multilocus sequence typing (MLST) showed that strains with lactis and cremoris genotypes clustered together regardless of habitat, but it highlighted the increased diversity that exists among "wild" strains. Calculation of average nucleotide identity (ANI) and tetranucleotide frequency correlation coefficients (TETRA), using the JSpecies software tool, revealed that L. lactis subsp. cremoris and L. lactis subsp. lactis differ in ANI values by ∼14%, below the threshold set for species circumscription. Further analysis of strain TIFN3 and strains from nonindustrial backgrounds revealed TETRA values of lactis taxonomy. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  6. Data-driven analysis of simultaneous EEG/fMRI reveals neurophysiological phenotypes of impulse control.

    Science.gov (United States)

    Schmüser, Lena; Sebastian, Alexandra; Mobascher, Arian; Lieb, Klaus; Feige, Bernd; Tüscher, Oliver

    2016-09-01

    Response inhibition is the ability to suppress inadequate but prepotent or ongoing response tendencies. A fronto-striatal network is involved in these processes. Between-subject differences in the intra-individual variability have been suggested to constitute a key to pathological processes underlying impulse control disorders. Single-trial EEG/fMRI analysis allows to increase sensitivity for inter-individual differences by incorporating intra-individual variability. Thirty-eight healthy subjects performed a visual Go/Nogo task during simultaneous EEG/fMRI. Of 38 healthy subjects, 21 subjects reliably showed Nogo-related ICs (Nogo-IC-positive) while 17 subjects (Nogo-IC-negative) did not. Comparing both groups revealed differences on various levels: On trait level, Nogo-IC-negative subjects scored higher on questionnaires regarding attention deficit/hyperactivity disorder; on a behavioral level, they displayed slower response times (RT) and higher intra-individual RT variability while both groups did not differ in their inhibitory performance. On the neurophysiological level, Nogo-IC-negative subjects showed a hyperactivation of left inferior frontal cortex/insula and left putamen as well as significantly reduced P3 amplitudes. Thus, a data-driven approach for IC classification and the resulting presence or absence of early Nogo-specific ICs as criterion for group selection revealed group differences at behavioral and neurophysiological levels. This may indicate electrophysiological phenotypes characterized by inter-individual variations of neural and behavioral correlates of impulse control. We demonstrated that the inter-individual difference in an electrophysiological correlate of response inhibition is correlated with distinct, potentially compensatory neural activity. This may suggest the existence of electrophysiologically dissociable phenotypes of behavioral and neural motor response inhibition with the Nogo-IC-positive phenotype possibly providing

  7. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  8. Different localization patterns of anthocyanin species in the pericarp of black rice revealed by imaging mass spectrometry.

    Directory of Open Access Journals (Sweden)

    Yukihiro Yoshimura

    Full Text Available Black rice (Oryza sativa L. Japonica contains high levels of anthocyanins in the pericarp and is considered an effective health-promoting food. Several studies have identified the molecular species of anthocyanins in black rice, but information about the localization of each anthocyanin species is limited because methodologies for investigating the localization such as determining specific antibodies to anthocyanin, have not yet been developed Matrix-assisted laser desorption/ionization imaging mass spectrometry (MALDI-IMS is a suitable tool for investigating the localization of metabolites. In this study, we identified 7 species of anthocyanin monoglycosides and 2 species of anthocyanin diglycosides in crude extracts from black rice by matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS analysis. We also analyzed black rice sections by MALDI-IMS and found 2 additional species of anthocyanin pentosides and revealed different localization patterns of anthocyanin species composed of different sugar moieties. Anthocyanin species composed of a pentose moiety (cyanidin-3-O-pentoside and petunidin-3-O-pentoside were localized in the entire pericarp, whereas anthocyanin species composed of a hexose moiety (cyanidin-3-O-hexoside and peonidin-3-O-hexoside were focally localized in the dorsal pericarp. These results indicate that anthocyanin species composed of different sugar moieties exhibit different localization patterns in the pericarp of black rice. This is the first detailed investigation into the localization of molecular species of anthocyanins by MALDI-IMS.

  9. Comparison at the peptide level with post-translational modification consideration reveals more differences between two unenriched samples.

    Science.gov (United States)

    Yin, Jianrui; Shao, Chen; Jia, Lulu; Gao, Youhe

    2014-06-30

    In shotgun strategies, peptide sequences are first identified from tandem mass (MS/MS) spectra, and the existence and abundance of the proteins are then inferred from the peptide information. However, the protein inference step can produce errors and a loss of information. To identify the information that is lost using the traditional approaches, this study compared the proteomic data of two leukemia cell lines (Jurkat and K562) at the peptide level with consideration of post-translational modifications (PTMs). The raw files from the two cell lines were searched against the decoy IPI-human database version 3.68, which contains forward and reverse sequences. Then the observed modification name in the results was matched with the modification classification on the Unimod website by a manual search. Only the peptides with 'post-translational' modifications were compared between the two cell lines. After searching the database with consideration of PTMs, a total of 44046 non-redundant peptides were identified in both the Jurkat and K562 cell lines. Of these peptides, even without specific PTM enrichment, 11.43% of them (with at least two spectra in one cell line) existed in different PTM forms between the two cell lines, and 1.73% of the peptides were modified in both cell lines, but with different modifications or possibly on different sites. Comparing proteomic data at the peptide level with consideration of PTMs can reveal more differences between two unenriched samples. Copyright © 2014 John Wiley & Sons, Ltd.

  10. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  11. Gene expression profiles reveal key genes for early diagnosis and treatment of adamantinomatous craniopharyngioma.

    Science.gov (United States)

    Yang, Jun; Hou, Ziming; Wang, Changjiang; Wang, Hao; Zhang, Hongbing

    2018-04-23

    Adamantinomatous craniopharyngioma (ACP) is an aggressive brain tumor that occurs predominantly in the pediatric population. Conventional diagnosis method and standard therapy cannot treat ACPs effectively. In this paper, we aimed to identify key genes for ACP early diagnosis and treatment. Datasets GSE94349 and GSE68015 were obtained from Gene Expression Omnibus database. Consensus clustering was applied to discover the gene clusters in the expression data of GSE94349 and functional enrichment analysis was performed on gene set in each cluster. The protein-protein interaction (PPI) network was built by the Search Tool for the Retrieval of Interacting Genes, and hubs were selected. Support vector machine (SVM) model was built based on the signature genes identified from enrichment analysis and PPI network. Dataset GSE94349 was used for training and testing, and GSE68015 was used for validation. Besides, RT-qPCR analysis was performed to analyze the expression of signature genes in ACP samples compared with normal controls. Seven gene clusters were discovered in the differentially expressed genes identified from GSE94349 dataset. Enrichment analysis of each cluster identified 25 pathways that highly associated with ACP. PPI network was built and 46 hubs were determined. Twenty-five pathway-related genes that overlapped with the hubs in PPI network were used as signatures to establish the SVM diagnosis model for ACP. The prediction accuracy of SVM model for training, testing, and validation data were 94, 85, and 74%, respectively. The expression of CDH1, CCL2, ITGA2, COL8A1, COL6A2, and COL6A3 were significantly upregulated in ACP tumor samples, while CAMK2A, RIMS1, NEFL, SYT1, and STX1A were significantly downregulated, which were consistent with the differentially expressed gene analysis. SVM model is a promising classification tool for screening and early diagnosis of ACP. The ACP-related pathways and signature genes will advance our knowledge of ACP pathogenesis

  12. Different antipsychotics elicit different effects on magnocellular oxytocinergic and vasopressinergic neurons as revealed by Fos immunohistochemistry

    DEFF Research Database (Denmark)

    Kiss, A; Bundzikova, J; Pirnik, Z

    2010-01-01

    rats were injected intraperitoneally with haloperidol (1 mg/kg), clozapine (30 mg/kg), olanzapine (30 mg/kg), risperidone (2mg/kg), and vehicle (5% chremophor) and were sacrificed 60 min later by a fixative. Fos, Fos/OXY, and Fos/AVP labelings were visualized by immunohistochemistry in the SON, 5...... accessory (ACS) cell groups, and 4 distinct PVN subdivisions using a computerized light microscope. Most apparent activation of single Fos, Fos/OXY, and Fos/AVP cells was induced by clozapine and olanzapine; effects of risperidone and haloperidol were substantially lower; no colocalizations were revealed...... of risperidone and haloperidol. Variabilities in Fos distribution in the PVN, SON, and ACS induced by antipsychotics may be helpful to understand more precisely the extent of their extra-forebrain actions with possible presumption of their functional impact and side effect consequences....

  13. Co-culture microorganisms with different initial proportions reveal the mechanism of chalcopyrite bioleaching coupling with microbial community succession.

    Science.gov (United States)

    Ma, Liyuan; Wang, Xingjie; Feng, Xue; Liang, Yili; Xiao, Yunhua; Hao, Xiaodong; Yin, Huaqun; Liu, Hongwei; Liu, Xueduan

    2017-01-01

    The effect of co-culture microorganisms with different initial proportions on chalcopyrite bioleaching was investigated. Communities were rebuilt by six typical strains isolated from the same habitat. The results indicated, by community with more sulfur oxidizers at both 30 and 40°C, the final copper extraction rate was 19.8% and 6.5% higher, respectively, than that with more ferrous oxidizers. The variations of pH, redox potential, ferrous and copper ions in leachate also provided evidences that community with more sulfur oxidizers was more efficient. Community succession of free and attached cells revealed that initial proportions played decisive roles on community dynamics at 30°C, while communities shared similar structures, not relevant to initial proportions at 40°C. X-ray diffraction analysis confirmed different microbial functions on mineral surface. A mechanism model for chalcopyrite bioleaching was established coupling with community succession. This will provide theoretical basis for reconstructing an efficient community in industrial application. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Comparative Analysis of Membrane Vesicles from Three Piscirickettsia salmonis Isolates Reveals Differences in Vesicle Characteristics.

    Directory of Open Access Journals (Sweden)

    Julia I Tandberg

    Full Text Available Membrane vesicles (MVs are spherical particles naturally released from the membrane of Gram-negative bacteria. Bacterial MV production is associated with a range of phenotypes including biofilm formation, horizontal gene transfer, toxin delivery, modulation of host immune responses and virulence. This study reports comparative profiling of MVs from bacterial strains isolated from three widely disperse geographical areas. Mass spectrometry identified 119, 159 and 142 proteins in MVs from three different strains of Piscirickettsia salmonis isolated from salmonids in Chile (LF-89, Norway (NVI 5692 and Canada (NVI 5892, respectively. MV comparison revealed several strain-specific differences related to higher virulence capability for LF-89 MVs, both in vivo and in vitro, and stronger similarities between the NVI 5692 and NVI 5892 MV proteome. The MVs were similar in size and appearance as analyzed by electron microscopy and dynamic light scattering. The MVs from all three strains were internalized by both commercial and primary immune cell cultures, which suggest a potential role of the MVs in the bacterium's utilization of leukocytes. When MVs were injected into an adult zebrafish infection model, an upregulation of several pro-inflammatory genes were observed in spleen and kidney, indicating a modulating effect on the immune system. The present study is the first comparative analysis of P. salmonis derived MVs, highlighting strain-specific vesicle characteristics. The results further illustrate that the MV proteome from one bacterial strain is not representative of all bacterial strains within one species.

  15. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  16. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    Science.gov (United States)

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  17. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  18. Mechanical unfolding reveals stable 3-helix intermediates in talin and α-catenin.

    Directory of Open Access Journals (Sweden)

    Vasyl V Mykuliak

    2018-04-01

    Full Text Available Mechanical stability is a key feature in the regulation of structural scaffolding proteins and their functions. Despite the abundance of α-helical structures among the human proteome and their undisputed importance in health and disease, the fundamental principles of their behavior under mechanical load are poorly understood. Talin and α-catenin are two key molecules in focal adhesions and adherens junctions, respectively. In this study, we used a combination of atomistic steered molecular dynamics (SMD simulations, polyprotein engineering, and single-molecule atomic force microscopy (smAFM to investigate unfolding of these proteins. SMD simulations revealed that talin rod α-helix bundles as well as α-catenin α-helix domains unfold through stable 3-helix intermediates. While the 5-helix bundles were found to be mechanically stable, a second stable conformation corresponding to the 3-helix state was revealed. Mechanically weaker 4-helix bundles easily unfolded into a stable 3-helix conformation. The results of smAFM experiments were in agreement with the findings of the computational simulations. The disulfide clamp mutants, designed to protect the stable state, support the 3-helix intermediate model in both experimental and computational setups. As a result, multiple discrete unfolding intermediate states in the talin and α-catenin unfolding pathway were discovered. Better understanding of the mechanical unfolding mechanism of α-helix proteins is a key step towards comprehensive models describing the mechanoregulation of proteins.

  19. Randomness determines practical security of BB84 quantum key distribution

    Science.gov (United States)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  20. Ultrasonic vocalizations in golden hamsters (Mesocricetus auratus) reveal modest sex differences and nonlinear signals of sexual motivation.

    Science.gov (United States)

    Fernández-Vargas, Marcela; Johnston, Robert E

    2015-01-01

    Vocal signaling is one of many behaviors that animals perform during social interactions. Vocalizations produced by both sexes before mating can communicate sex, identity and condition of the caller. Adult golden hamsters produce ultrasonic vocalizations (USV) after intersexual contact. To determine whether these vocalizations are sexually dimorphic, we analyzed the vocal repertoire for sex differences in: 1) calling rates, 2) composition (structural complexity, call types and nonlinear phenomena) and 3) acoustic structure. In addition, we examined it for individual variation in the calls. The vocal repertoire was mainly composed of 1-note simple calls and at least half of them presented some degree of deterministic chaos. The prevalence of this nonlinear phenomenon was confirmed by low values of harmonic-to-noise ratio for most calls. We found modest sexual differences between repertoires. Males were more likely than females to produce tonal and less chaotic calls, as well as call types with frequency jumps. Multivariate analysis of the acoustic features of 1-note simple calls revealed significant sex differences in the second axis represented mostly by entropy and bandwidth parameters. Male calls showed lower entropy and inter-quartile bandwidth than female calls. Because the variation of acoustic structure within individuals was higher than among individuals, USV could not be reliably assigned to the correct individual. Interestingly, however, this high variability, augmented by the prevalence of chaos and frequency jumps, could be the result of increased vocal effort. Hamsters motivated to produce high calling rates also produced longer calls of broader bandwidth. Thus, the sex differences found could be the result of different sex preferences but also of a sex difference in calling motivation or condition. We suggest that variable and complex USV may have been selected to increase responsiveness of a potential mate by communicating sexual arousal and

  1. Ultrasonic vocalizations in golden hamsters (Mesocricetus auratus reveal modest sex differences and nonlinear signals of sexual motivation.

    Directory of Open Access Journals (Sweden)

    Marcela Fernández-Vargas

    Full Text Available Vocal signaling is one of many behaviors that animals perform during social interactions. Vocalizations produced by both sexes before mating can communicate sex, identity and condition of the caller. Adult golden hamsters produce ultrasonic vocalizations (USV after intersexual contact. To determine whether these vocalizations are sexually dimorphic, we analyzed the vocal repertoire for sex differences in: 1 calling rates, 2 composition (structural complexity, call types and nonlinear phenomena and 3 acoustic structure. In addition, we examined it for individual variation in the calls. The vocal repertoire was mainly composed of 1-note simple calls and at least half of them presented some degree of deterministic chaos. The prevalence of this nonlinear phenomenon was confirmed by low values of harmonic-to-noise ratio for most calls. We found modest sexual differences between repertoires. Males were more likely than females to produce tonal and less chaotic calls, as well as call types with frequency jumps. Multivariate analysis of the acoustic features of 1-note simple calls revealed significant sex differences in the second axis represented mostly by entropy and bandwidth parameters. Male calls showed lower entropy and inter-quartile bandwidth than female calls. Because the variation of acoustic structure within individuals was higher than among individuals, USV could not be reliably assigned to the correct individual. Interestingly, however, this high variability, augmented by the prevalence of chaos and frequency jumps, could be the result of increased vocal effort. Hamsters motivated to produce high calling rates also produced longer calls of broader bandwidth. Thus, the sex differences found could be the result of different sex preferences but also of a sex difference in calling motivation or condition. We suggest that variable and complex USV may have been selected to increase responsiveness of a potential mate by communicating sexual

  2. Approach for discrimination and quantification of electroactive species: kinetics difference revealed by higher harmonics of Fourier transformed sinusoidal voltammetry.

    Science.gov (United States)

    Fang, Yishan; Huang, Xinjian; Wang, Lishi

    2015-01-06

    Discrimination and quantification of electroactive species are traditionally realized by a potential difference which is mainly determined by thermodynamics. However, the resolution of this approach is limited to tens of millivolts. In this paper, we described an application of Fourier transformed sinusoidal voltammetry (FT-SV) that provides a new approach for discrimination and quantitative evaluation of electroactive species, especially thermodynamic similar ones. Numerical simulation indicates that electron transfer kinetics difference between electroactive species can be revealed by the phase angle of higher order harmonics of FT-SV, and the difference can be amplified order by order. Thus, even a very subtle kinetics difference can be amplified to be distinguishable at a certain order of harmonics. This method was verified with structurally similar ferrocene derivatives which were chosen as the model systems. Although these molecules have very close redox potential (harmonics. The results demonstrated the feasibility and reliability of the method. It was also implied that the combination of the traditional thermodynamic method and this kinetics method can form a two-dimension resolved detection method, and it has the potential to extend the resolution of voltammetric techniques to a new level.

  3. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  4. Uncovering SUMOylation Dynamics during Cell-Cycle Progression Reveals FoxM1 as a Key Mitotic SUMO Target Protein

    DEFF Research Database (Denmark)

    Schimmel, Joost; Eifler, Karolin; Sigurdsson, Jón Otti

    2014-01-01

    Loss of small ubiquitin-like modification (SUMOylation) in mice causes genomic instability due to the missegregation of chromosomes. Currently, little is known about the identity of relevant SUMO target proteins that are involved in this process and about global SUMOylation dynamics during cell......-cycle progression. We performed a large-scale quantitative proteomics screen to address this and identified 593 proteins to be SUMO-2 modified, including the Forkhead box transcription factor M1 (FoxM1), a key regulator of cell-cycle progression and chromosome segregation. SUMOylation of FoxM1 peaks during G2 and M...... relieving FoxM1 autorepression. Cells deficient for FoxM1 SUMOylation showed increased levels of polyploidy. Our findings contribute to understanding the role of SUMOylation during cell-cycle progression....

  5. Libraries and key performance indicators a framework for practitioners

    CERN Document Server

    Appleton, Leo

    2017-01-01

    Libraries and Key Performance Indicators: A Framework for Practitioners explores ways by which libraries across all sectors can demonstrate their value and impact to stakeholders through quality assurance and performance measurement platforms, including library assessment, evaluation methodologies, surveys, and annual reporting. Whilst several different performance measurement tools are considered, the book's main focus is on one tool in particular: Key Performance Indicators (KPIs). KPIs are increasingly being used to measure the performance of library and information services, however, linking KPIs to quality outcomes, such as impact and value can prove very difficult. This book discusses, in detail, the concept of KPIs in the broader context of library assessment and performance measurement. Through reviewing some of the applied theory around using KPIs, along with harvesting examples of current best practices in KPI usage from a variety of different libraries, the book demystifies library KPIs, providing ...

  6. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  7. Quantum key distribution using continuous-variable non-Gaussian states

    Science.gov (United States)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  8. Studies on the key aroma compounds in raw (unheated) and heated Japanese soy sauce.

    Science.gov (United States)

    Kaneko, Shu; Kumazawa, Kenji; Nishimura, Osamu

    2013-04-10

    An investigation using the aroma extract dilution analysis (AEDA) technique of the aroma concentrate from a raw Japanese soy sauce and the heated soy sauce revealed 40 key aroma compounds including 7 newly identified compounds. Among them, 5(or 2)-ethyl-4-hydroxy-2(or 5)-methyl-3(2H)-furanone and 3-hydroxy-4,5-dimethyl-2(5H)-furanone exhibited the highest flavor dilution (FD) factor of 2048, followed by 3-(methylthio)propanal, 4-ethyl-2-methoxyphenol, and 4-hydroxy-2,5-dimethyl-3(2H)-furanone having FD factors from 128 to 512 in the raw soy sauce. Furthermore, comparative AEDAs, a quantitative analysis, and a sensory analysis demonstrated that whereas most of the key aroma compounds in the raw soy sauce were common in the heated soy sauce, some of the Strecker aldehydes and 4-vinylphenols contributed less to the raw soy sauce aroma. The model decarboxylation reactions of the phenolic acids during heating of the raw soy sauce revealed that although all reactions resulted in low yields, the hydroxycinnamic acid derivatives were much more reactive than the hydroxybenzoic acid derivatives due to the stable reaction intermediates. Besides the quantitative analyses of the soy sauces, the estimation of the reaction yields of the phenolic compounds in the heated soy sauce revealed that although only the 4-vinylphenols increased during heating of the raw soy sauce, they might not mainly be formed as decarboxylation products from the corresponding hydroxycinnamic acids but from the other proposed precursors, such as lignin, shakuchirin, and esters with arabinoxylan.

  9. Different perspectives on the key challenges facing rural health: The challenges of power and knowledge.

    Science.gov (United States)

    Malatzky, Christina; Bourke, Lisa

    2018-05-25

    To examine the effects of dominant knowledge in rural health, including how they shape issues central to rural health. In particular, this article examines the roles of: (i) deficit knowledge of rural health workforce; (ii) dominant portrayals of generalism; and (iii) perceptions of inferiority about rural communities in maintaining health disparities between rural- and metropolitan-based Australians. A Foucauldian framework is applied to literature, evidence, case studies and key messages in rural health. Three scenarios are used to provide practical examples of specific knowledge that is prioritised or marginalised. The analysis of three areas in rural health identifies how deficit knowledge is privileged despite it undermining the purpose of rural health. First, deficit knowledge highlights the workforce shortage rather than the type of work in rural practice or the oversupply of workforce in metropolitan areas. Second, the construction of generalist practice as less skilled and more monotonous undermines other knowledge that it is diverse and challenging. Third, dominant negative stereotypes of rural communities discourage rural careers and highlight undesirable aspects of rural practice. The privileging of deficit knowledge pertaining to rural health workforce, broader dominant discourses of generalism and the nature of rural Australian communities reproduces many of the key challenges in rural health today, including persisting health disparities between rural- and metropolitan-based Australians. To disrupt the operations of power that highlight deficit knowledge and undermine other knowledge, we need to change the way in which rural health is currently constructed and understood. © 2018 National Rural Health Alliance Ltd.

  10. Automated decoding of facial expressions reveals marked differences in children when telling antisocial versus prosocial lies.

    Science.gov (United States)

    Zanette, Sarah; Gao, Xiaoqing; Brunet, Megan; Bartlett, Marian Stewart; Lee, Kang

    2016-10-01

    The current study used computer vision technology to examine the nonverbal facial expressions of children (6-11years old) telling antisocial and prosocial lies. Children in the antisocial lying group completed a temptation resistance paradigm where they were asked not to peek at a gift being wrapped for them. All children peeked at the gift and subsequently lied about their behavior. Children in the prosocial lying group were given an undesirable gift and asked if they liked it. All children lied about liking the gift. Nonverbal behavior was analyzed using the Computer Expression Recognition Toolbox (CERT), which employs the Facial Action Coding System (FACS), to automatically code children's facial expressions while lying. Using CERT, children's facial expressions during antisocial and prosocial lying were accurately and reliably differentiated significantly above chance-level accuracy. The basic expressions of emotion that distinguished antisocial lies from prosocial lies were joy and contempt. Children expressed joy more in prosocial lying than in antisocial lying. Girls showed more joy and less contempt compared with boys when they told prosocial lies. Boys showed more contempt when they told prosocial lies than when they told antisocial lies. The key action units (AUs) that differentiate children's antisocial and prosocial lies are blink/eye closure, lip pucker, and lip raise on the right side. Together, these findings indicate that children's facial expressions differ while telling antisocial versus prosocial lies. The reliability of CERT in detecting such differences in facial expression suggests the viability of using computer vision technology in deception research. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Non-resonant electromagnetic energy harvester for car-key applications

    Science.gov (United States)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  12. Time–energy high-dimensional one-side device-independent quantum key distribution

    International Nuclear Information System (INIS)

    Bao Hai-Ze; Bao Wan-Su; Wang Yang; Chen Rui-Ke; Ma Hong-Xin; Zhou Chun; Li Hong-Wei

    2017-01-01

    Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. (paper)

  13. Genome-wide functional analysis of plasmodium protein phosphatases reveals key regulators of parasite development and differentiation

    KAUST Repository

    Guttery, David  S.; Poulin, Benoit; Ramaprasad, Abhinay; Wall, Richard  J.; Ferguson, David  J.P.; Brady, Declan; Patzewitz, Eva-Maria; Whipple, Sarah; Straschil, Ursula; Wright, Megan  H.; Mohamed, Alyaa  M.A.H.; Radhakrishnan, Anand; Arold, Stefan T.; Tate, Edward  W.; Holder, Anthony  A.; Wickstead, Bill; Pain, Arnab; Tewari, Rita

    2014-01-01

    Reversible protein phosphorylation regulated by kinases and phosphatases controls many cellular processes. Although essential functions for the malaria parasite kinome have been reported, the roles of most protein phosphatases (PPs) during Plasmodium development are unknown. We report a functional analysis of the Plasmodium berghei protein phosphatome, which exhibits high conservation with the P. falciparum phosphatome and comprises 30 predicted PPs with differential and distinct expression patterns during various stages of the life cycle. Gene disruption analysis of P. berghei PPs reveals that half of the genes are likely essential for asexual blood stage development, whereas six are required for sexual development/sporogony in mosquitoes. Phenotypic screening coupled with transcriptome sequencing unveiled morphological changes and altered gene expression in deletion mutants of two N-myristoylated PPs. These findings provide systematic functional analyses of PPs in Plasmodium, identify how phosphatases regulate parasite development and differentiation, and can inform the identification of drug targets for malaria. © 2014 The Authors.

  14. Genome-wide functional analysis of plasmodium protein phosphatases reveals key regulators of parasite development and differentiation

    KAUST Repository

    Guttery, David S.

    2014-07-09

    Reversible protein phosphorylation regulated by kinases and phosphatases controls many cellular processes. Although essential functions for the malaria parasite kinome have been reported, the roles of most protein phosphatases (PPs) during Plasmodium development are unknown. We report a functional analysis of the Plasmodium berghei protein phosphatome, which exhibits high conservation with the P. falciparum phosphatome and comprises 30 predicted PPs with differential and distinct expression patterns during various stages of the life cycle. Gene disruption analysis of P. berghei PPs reveals that half of the genes are likely essential for asexual blood stage development, whereas six are required for sexual development/sporogony in mosquitoes. Phenotypic screening coupled with transcriptome sequencing unveiled morphological changes and altered gene expression in deletion mutants of two N-myristoylated PPs. These findings provide systematic functional analyses of PPs in Plasmodium, identify how phosphatases regulate parasite development and differentiation, and can inform the identification of drug targets for malaria. © 2014 The Authors.

  15. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  16. Metaproteomics reveals major microbial players and their biodegradation functions in a large-scale aerobic composting plant

    Science.gov (United States)

    Liu, Dongming; Li, Mingxiao; Xi, Beidou; Zhao, Yue; Wei, Zimin; Song, Caihong; Zhu, Chaowei

    2015-01-01

    Composting is an appropriate management alternative for municipal solid waste; however, our knowledge about the microbial regulation of this process is still scare. We employed metaproteomics to elucidate the main biodegradation pathways in municipal solid waste composting system across the main phases in a large-scale composting plant. The investigation of microbial succession revealed that Bacillales, Actinobacteria and Saccharomyces increased significantly with respect to abundance in composting process. The key microbiologic population for cellulose degradation in different composting stages was different. Fungi were found to be the main producers of cellulase in earlier phase. However, the cellulolytic fungal communities were gradually replaced by a purely bacterial one in active phase, which did not support the concept that the thermophilic fungi are active through the thermophilic phase. The effective decomposition of cellulose required the synergy between bacteria and fungi in the curing phase. PMID:25989417

  17. Omics strategies for revealing Yersinia pestis virulence

    Science.gov (United States)

    Yang, Ruifu; Du, Zongmin; Han, Yanping; Zhou, Lei; Song, Yajun; Zhou, Dongsheng; Cui, Yujun

    2012-01-01

    Omics has remarkably changed the way we investigate and understand life. Omics differs from traditional hypothesis-driven research because it is a discovery-driven approach. Mass datasets produced from omics-based studies require experts from different fields to reveal the salient features behind these data. In this review, we summarize omics-driven studies to reveal the virulence features of Yersinia pestis through genomics, trascriptomics, proteomics, interactomics, etc. These studies serve as foundations for further hypothesis-driven research and help us gain insight into Y. pestis pathogenesis. PMID:23248778

  18. Communication-oriented person-organization fit as a key factor of job-seeking behaviors: millennials' social media use and attitudes toward organizational social media policies.

    Science.gov (United States)

    Cho, Jaehee; Park, Dong Jin; Ordonez, Zoa

    2013-11-01

    The main goal of this study was to assess how the millennial generation perceives companies that have different social media policies and how such perception influences key variables for job-seeking behaviors, including perceived person-organization fit (POF), organizational attraction, and job pursuit intention. Results from a univariate general linear model and path analysis supported all of the established hypotheses. In particular, the results revealed that millennials perceived higher POF for a company with organizational policies supporting employees' social media use. Further, organizational attractiveness significantly mediated the relationship between communication-oriented POF and job pursuit intention.

  19. Revealing Bell's nonlocality for unstable systems in high energy physics

    International Nuclear Information System (INIS)

    Hiesmayr, Beatrix C.; Gabriel, Andreas; Huber, Marcus; Di Domenico, Antonio; Curceanu, Catalina; Larsson, Jan-Aake; Moskal, Pawel

    2012-01-01

    Entanglement and its consequences - in particular the violation of Bell inequalities, which defies our concepts of realism and locality - have been proven to play key roles in Nature by many experiments for various quantum systems. Entanglement can also be found in systems not consisting of ordinary matter and light, i.e. in massive meson-antimeson systems. Bell inequalities have been discussed for these systems, but up to date no direct experimental test to conclusively exclude local realism was found. This mainly stems from the fact that one only has access to a restricted class of observables and that these systems are also decaying. In this Letter we put forward a Bell inequality for unstable systems which can be tested at accelerator facilities with current technology. Herewith, the long awaited proof that such systems at different energy scales can reveal the sophisticated ''dynamical'' nonlocal feature of Nature in a direct experiment gets feasible. Moreover, the role of entanglement and CP violation, an asymmetry between matter and antimatter, is explored, a special feature offered only by these meson-antimeson systems. (orig.)

  20. NoSQL Key-Value DBs Riak and Redis

    Directory of Open Access Journals (Sweden)

    Cristian Andrei BARON

    2016-05-01

    Full Text Available In the context of today's business needs we must focus on the NoSQL databases because they are the only alternative to the RDBMS that can resolve the modern problems related to storing different data structures, processing continue flows of data and fault tolerance. The object of the paper is to explain the NoSQL databases, the needs behind their appearance, the different types of NoSQL databases that current exist and to focus on two key-value databases, Riak and Redis.

  1. The youth of Russia and Serbia: Social trust and key generational problems

    Directory of Open Access Journals (Sweden)

    U V Šuvaković

    2016-12-01

    Full Text Available The Sociological Laboratory of the Peoples’ Friendship University of Russia has conducted a number of comparative studies using the method of mass surveys on the representative samples of student youth in different countries and different regions within them. The results of these surveys were presented in the articles in both Russian and foreign scientific journals, and we hope to establish a kind of tradition to publish two types of articles based on the comparative research data: in 2015 we focused mainly on methodological and technical issues to identify key problems of the comparative analysis in cross-cultural studies that become evident only if you conduct an empirical research yourself - from the first step of setting the problem and approving it by all the sides involved to the last step of interpreting and comparing the data obtained. From 2016 to the end of the Russian Foundation for Humanities’ support in 2017 we will focus on the results of our comparative studies together with our colleagues that participate in the project and conduct surveys on the student samples in their countries using the same questionnaire (with the inevitable and predictable changes as we do. The authors present only a small part of the empirical data revealing the perception of the Serbian and Russian student youth of their own situation through the identification of the key problems of the younger generations and the trust to the basic social institutions. This is a deliberate decision of the authors - to leave other topics (and corresponding questions out in order to address them more thoroughly later in the further analysis and publications. The article considers the results of the empirical studies conducted on the representative samples of students of two Serbian universities - University of Belgrade and University of Pristina with the head-office in Kosovska Mitrovica, and on the representative sample of Moscow students (a part of the sample was

  2. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  3. REVEAL: Software Documentation and Platform Migration

    Science.gov (United States)

    Wilson, Michael A.; Veibell, Victoir T.; Freudinger, Lawrence C.

    2008-01-01

    The Research Environment for Vehicle Embedded Analysis on Linux (REVEAL) is reconfigurable data acquisition software designed for network-distributed test and measurement applications. In development since 2001, it has been successfully demonstrated in support of a number of actual missions within NASA s Suborbital Science Program. Improvements to software configuration control were needed to properly support both an ongoing transition to operational status and continued evolution of REVEAL capabilities. For this reason the project described in this report targets REVEAL software source documentation and deployment of the software on a small set of hardware platforms different from what is currently used in the baseline system implementation. This report specifically describes the actions taken over a ten week period by two undergraduate student interns and serves as a final report for that internship. The topics discussed include: the documentation of REVEAL source code; the migration of REVEAL to other platforms; and an end-to-end field test that successfully validates the efforts.

  4. Sustainability of the Tourism Industry, Based on Financial Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Adriana Dutescu

    2014-11-01

    Full Text Available Even if there is a real need of a set of key performance indicators for small and medium sized enterprises, this is not yet considered to be satisfied. Our research is focused on two main aspects, each of them individually important for the users of accounting information: the basic indicators specific for analysing operational performance and for decision making and the trend of the key performance indicators in the context of the economic crisis. The starting point of the study is a questionnaire addressed to small and medium sized enterprises activating in the tourism area, especially in the hotel industry. The respondents answered the questions in perfect anonymity by choosing one of the multiple choices for some of them and offering open answers to the others. Our analysis reveals a fair view of the dynamic of the most used key performance indicators in Romanian hotel industry, the limits of their interpretation and usage and the evolution of the financial and economic performance. The declared purpose of the research is to set the bases of a starting point in order to provide solutions for improving the relevance and the usage of these indicators in this domain, in the context of a sustainable business, taking into account the nowadays status of the economy in general and in particular the hotel industry.

  5. Application of the Value Optimization Model of Key Factors Based on DSEM

    Directory of Open Access Journals (Sweden)

    Chao Su

    2016-01-01

    Full Text Available The key factors of the damping solvent extraction method (DSEM for the analysis of the unbounded medium are the size of bounded domain, the artificial damping ratio, and the finite element mesh density. To control the simulation accuracy and computational efficiency of the soil-structure interaction, this study establishes a value optimization model of key factors that is composed of the design variables, the objective function, and the constraint function system. Then the optimum solutions of key factors are obtained by the optimization model. According to some comparisons of the results provided by the different initial conditions, the value optimization model of key factors is feasible to govern the simulation accuracy and computational efficiency and to analyze the practical unbounded medium-structure interaction.

  6. Whole-genome sequencing reveals mutational landscape underlying phenotypic differences between two widespread Chinese cattle breeds.

    Directory of Open Access Journals (Sweden)

    Yao Xu

    Full Text Available Whole-genome sequencing provides a powerful tool to obtain more genetic variability that could produce a range of benefits for cattle breeding industry. Nanyang (Bos indicus and Qinchuan (Bos taurus are two important Chinese indigenous cattle breeds with distinct phenotypes. To identify the genetic characteristics responsible for variation in phenotypes between the two breeds, in the present study, we for the first time sequenced the genomes of four Nanyang and four Qinchuan cattle with 10 to 12 fold on average of 97.86% and 98.98% coverage of genomes, respectively. Comparison with the Bos_taurus_UMD_3.1 reference assembly yielded 9,010,096 SNPs for Nanyang, and 6,965,062 for Qinchuan cattle, 51% and 29% of which were novel SNPs, respectively. A total of 154,934 and 115,032 small indels (1 to 3 bp were found in the Nanyang and Qinchuan genomes, respectively. The SNP and indel distribution revealed that Nanyang showed a genetically high diversity as compared to Qinchuan cattle. Furthermore, a total of 2,907 putative cases of copy number variation (CNV were identified by aligning Nanyang to Qinchuan genome, 783 of which (27% encompassed the coding regions of 495 functional genes. The gene ontology (GO analysis revealed that many CNV genes were enriched in the immune system and environment adaptability. Among several CNV genes related to lipid transport and fat metabolism, Lepin receptor gene (LEPR overlapping with CNV_1815 showed remarkably higher copy number in Qinchuan than Nanyang (log2 (ratio = -2.34988; P value = 1.53E-102. Further qPCR and association analysis investigated that the copy number of the LEPR gene presented positive correlations with transcriptional expression and phenotypic traits, suggesting the LEPR CNV may contribute to the higher fat deposition in muscles of Qinchuan cattle. Our findings provide evidence that the distinct phenotypes of Nanyang and Qinchuan breeds may be due to the different genetic variations including SNPs

  7. Transgenic zebrafish reveal tissue-specific differences in estrogen signaling in response to environmental water samples.

    Science.gov (United States)

    Gorelick, Daniel A; Iwanowicz, Luke R; Hung, Alice L; Blazer, Vicki S; Halpern, Marnie E

    2014-04-01

    Environmental endocrine disruptors (EEDs) are exogenous chemicals that mimic endogenous hormones such as estrogens. Previous studies using a zebrafish transgenic reporter demonstrated that the EEDs bisphenol A and genistein preferentially activate estrogen receptors (ERs) in the larval heart compared with the liver. However, it was not known whether the transgenic zebrafish reporter was sensitive enough to detect estrogens from environmental samples, whether environmental estrogens would exhibit tissue-specific effects similar to those of BPA and genistein, or why some compounds preferentially target receptors in the heart. We tested surface water samples using a transgenic zebrafish reporter with tandem estrogen response elements driving green fluorescent protein expression (5xERE:GFP). Reporter activation was colocalized with tissue-specific expression of ER genes by RNA in situ hybridization. We observed selective patterns of ER activation in transgenic fish exposed to river water samples from the Mid-Atlantic United States, with several samples preferentially activating receptors in embryonic and larval heart valves. We discovered that tissue specificity in ER activation was due to differences in the expression of ER subtypes. ERα was expressed in developing heart valves but not in the liver, whereas ERβ2 had the opposite profile. Accordingly, subtype-specific ER agonists activated the reporter in either the heart valves or the liver. The use of 5xERE:GFP transgenic zebrafish revealed an unexpected tissue-specific difference in the response to environmentally relevant estrogenic compounds. Exposure to estrogenic EEDs in utero was associated with adverse health effects, with the potentially unanticipated consequence of targeting developing heart valves.

  8. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  9. Key skills by design: adapting a central Web resource to departmental contexts

    Directory of Open Access Journals (Sweden)

    Claire McAvinia

    2002-12-01

    Full Text Available Web-based delivery of support materials for students has proved to be a popular way of helping small teams to implement key skills policies within universities. The development of 'key' or 'transferable' skills is now encouraged throughout education, but resources (both in terms of staffing and budget tend to be limited. It is difficult for key skills teams to see learners face to face, and not feasible to print or distribute large amounts of paper-based material. Web-based delivery presents a means of overcoming these problems but it can result in generic study skills material simply being published online without due consideration of the needs of different groups of learners within different subject disciplines. Therefore, although a centralized Website for skills provision can overcome logistical problems, it may be perceived as irrelevant or unusable by the student population. This paper presents a model for Web-based delivery of support for key skills which incorporates two separate approaches to the design of these resources. The model was implemented as part of a wider key skills pilot project at University College London, over a period of one year. It includes a 'core' Website, containing information and resources for staff and students. These can also be accessed via customized, departmental key skills homepages. This paper presents the basis for the design choices made in preparing these materials, and the evaluation of some of the pilot departments using them. It then draws some wider conclusions about the effectiveness of this design for supporting skills development.

  10. Metabolomics Analysis of Hormone-Responsive and Triple-Negative Breast Cancer Cell Responses to Paclitaxel Identify Key Metabolic Differences.

    Science.gov (United States)

    Stewart, Delisha A; Winnike, Jason H; McRitchie, Susan L; Clark, Robert F; Pathmasiri, Wimal W; Sumner, Susan J

    2016-09-02

    To date, no targeted therapies are available to treat triple negative breast cancer (TNBC), while other breast cancer subtypes are responsive to current therapeutic treatment. Metabolomics was conducted to reveal differences in two hormone receptor-negative TNBC cell lines and two hormone receptor-positive Luminal A cell lines. Studies were conducted in the presence and absence of paclitaxel (Taxol). TNBC cell lines had higher levels of amino acids, branched-chain amino acids, nucleotides, and nucleotide sugars and lower levels of proliferation-related metabolites like choline compared with Luminal A cell lines. In the presence of paclitaxel, each cell line showed unique metabolic responses, with some similarities by type. For example, in the Luminal A cell lines, levels of lactate and creatine decreased while certain choline metabolites and myo-inositol increased with paclitaxel. In the TNBC cell lines levels of glutamine, glutamate, and glutathione increased, whereas lysine, proline, and valine decreased in the presence of drug. Profiling secreted inflammatory cytokines in the conditioned media demonstrated a greater response to paclitaxel in the hormone-positive Luminal cells compared with a secretion profile that suggested greater drug resistance in the TNBC cells. The most significant differences distinguishing the cell types based on pathway enrichment analyses were related to amino acid, lipid and carbohydrate metabolism pathways, whereas several biological pathways were differentiated between the cell lines following treatment.

  11. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  12. Long-term monitoring reveals carbon-nitrogen metabolism key to microcystin production in eutrophic lakes

    Directory of Open Access Journals (Sweden)

    Lucas J Beversdorf

    2015-05-01

    Full Text Available The environmental drivers contributing to cyanobacterial dominance in aquatic systems have been extensively studied. However, understanding of toxic versus non-toxic cyanobacterial population dynamics and the mechanisms regulating cyanotoxin production remain elusive, both physiologically and ecologically. One reason is the disconnect between laboratory and field-based studies. Here, we combined three years of temporal data, including microcystin (MC concentrations, 16 years of long-term ecological research, and 10 years of molecular data to investigate the potential factors leading to the selection of toxic Microcystis and MC production. Our analysis revealed that nitrogen (N speciation and inorganic carbon (C availability might be important drivers of Microcystis population dynamics and that an imbalance in cellular C: N ratios may trigger MC production. More specifically, precipitous declines in ammonium concentrations lead to a transitional period of N stress, even in the presence of high nitrate concentrations, that we call the toxic phase. Following the toxic phase, temperature and cyanobacterial abundance remained elevated but MC concentrations drastically declined. Increases in ammonium due to lake turnover may have led to down regulation of MC synthesis or a shift in the community from toxic to non-toxic species. While total phosphorus (P to total N ratios were relatively low over the time-series, MC concentrations were highest when total N to total P ratios were also highest. Similarly, high C: N ratios were also strongly correlated to the toxic phase. We propose a metabolic model that corroborates molecular studies and reflects our ecological observations that C and N metabolism may regulate MC production physiologically and ecologically. In particular, we hypothesize that an imbalance between 2-oxoglutarate and ammonium in the cell regulates MC synthesis in the environment.

  13. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  14. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  15. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  16. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  17. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  18. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  19. Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

    OpenAIRE

    Fu, Yue

    2017-01-01

    In this paper a secure data-sharing protocol under blockchain-based decentralised storage architecture is proposed, which fulfils users who need to share their encrypted data on-cloud. It implements a remote data-sharing mechanism that enables data owners to share their encrypted data to other users without revealing the original key. Nor do they have to download on-cloud data with re-encryption and re-uploading. Data security as well as efficiency are ensured by symmetric encryption, whose k...

  20. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  1. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  2. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  3. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  4. Analysis of Secret Key Randomness Exploiting the Radio Channel Variability

    Directory of Open Access Journals (Sweden)

    Taghrid Mazloum

    2015-01-01

    Full Text Available A few years ago, physical layer based techniques have started to be considered as a way to improve security in wireless communications. A well known problem is the management of ciphering keys, both regarding the generation and distribution of these keys. A way to alleviate such difficulties is to use a common source of randomness for the legitimate terminals, not accessible to an eavesdropper. This is the case of the fading propagation channel, when exact or approximate reciprocity applies. Although this principle has been known for long, not so many works have evaluated the effect of radio channel properties in practical environments on the degree of randomness of the generated keys. To this end, we here investigate indoor radio channel measurements in different environments and settings at either 2.4625 GHz or 5.4 GHz band, of particular interest for WIFI related standards. Key bits are extracted by quantizing the complex channel coefficients and their randomness is evaluated using the NIST test suite. We then look at the impact of the carrier frequency, the channel variability in the space, time, and frequency degrees of freedom used to construct a long secret key, in relation to the nature of the radio environment such as the LOS/NLOS character.

  5. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  6. Spatial age-length key modelling using continuation ratio logits

    DEFF Research Database (Denmark)

    Berg, Casper W.; Kristensen, Kasper

    2012-01-01

    -called age-length key (ALK) is then used to obtain the age distribution. Regional differences in ALKs are not uncommon, but stratification is often problematic due to a small number of samples. Here, we combine generalized additive modelling with continuation ratio logits to model the probability of age...

  7. Ecological Understanding 2: Transformation--A Key to Ecological Understanding.

    Science.gov (United States)

    Carlsson, Britta

    2002-01-01

    Describes the structure and general features of the phenomenon of ecological understanding. Presents qualitatively different ways of experiencing cycling of matter and the flow of energy in the context of ecosystems. The idea of transformation is key to the development of ecological understanding. (Contains 17 references.) (Author/YDS)

  8. Microbiology Meets Archaeology: Soil Microbial Communities Reveal Different Human Activities at Archaic Monte Iato (Sixth Century BC).

    Science.gov (United States)

    Margesin, Rosa; Siles, José A; Cajthaml, Tomas; Öhlinger, Birgit; Kistler, Erich

    2017-05-01

    Microbial ecology has been recognized as useful in archaeological studies. At Archaic Monte Iato in Western Sicily, a native (indigenous) building was discovered. The objective of this study was the first examination of soil microbial communities related to this building. Soil samples were collected from archaeological layers at a ritual deposit (food waste disposal) in the main room and above the fireplace in the annex. Microbial soil characterization included abundance (cellular phospholipid fatty acids (PLFA), viable bacterial counts), activity (physiological profiles, enzyme activities of viable bacteria), diversity, and community structure (bacterial and fungal Illumina amplicon sequencing, identification of viable bacteria). PLFA-derived microbial abundance was lower in soils from the fireplace than in soils from the deposit; the opposite was observed with culturable bacteria. Microbial communities in soils from the fireplace had a higher ability to metabolize carboxylic and acetic acids, while those in soils from the deposit metabolized preferentially carbohydrates. The lower deposit layer was characterized by higher total microbial and bacterial abundance and bacterial richness and by a different carbohydrate metabolization profile compared to the upper deposit layer. Microbial community structures in the fireplace were similar and could be distinguished from those in the two deposit layers, which had different microbial communities. Our data confirmed our hypothesis that human consumption habits left traces on microbiota in the archaeological evidence; therefore, microbiological residues as part of the so-called ecofacts are, like artifacts, key indicators of consumer behavior in the past.

  9. Adaptation to climate change. Key terms

    International Nuclear Information System (INIS)

    Levina, E.; Tirpak, D.

    2006-05-01

    Adaptation has become an important issue in international and domestic discussions on climate change. Numerous terms and concepts have come into common usage as a result of IPCC reports, discussions in the context of the UNFCCC and dialogs by the climate community at large. This paper examines the key adaptation terms and concepts used by the climate change community and other institutions. Conflicts and contradictions are noted with the aim of sensitizing different bodies to the differences, but particularly the Parties to the Convention and experts participating in the IPCC. Given the need to promote a common understanding among various stakeholders and the potential financial implications of various definitions, it appears important for the IPCC and the UNFCCC to work toward common definitions, at least for a core set of terms and concepts

  10. The MycoKey 3.1 DVD. Included in Knudsen, H. & Vesterholt, J. (eds.). Funga Nordica

    DEFF Research Database (Denmark)

    2008-01-01

    . It is, of course, also possible to do a direct search on a name in MycoKey in order to find a genus or a particular species. MycoKey gives access to more than 4,000 illustrations of fungi and more than 17,000 links to references. From within the genera you can also open the Funga Nordica keys in a a pdf-viwer......MycoKey enables the user to identify fungal genera (fruitbody forming Basidiomycota and discomycetes) by means of a digital, synoptical key. This key offers a very different way of choosing between genera than the traditional analytical key and the the two approaches complete each other nicely...

  11. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    Science.gov (United States)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  12. Field test of a continuous-variable quantum key distribution prototype

    International Nuclear Information System (INIS)

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P

    2009-01-01

    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  13. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  14. Revealing metabolite biomarkers for acupuncture treatment by linear programming based feature selection.

    Science.gov (United States)

    Wang, Yong; Wu, Qiao-Feng; Chen, Chen; Wu, Ling-Yun; Yan, Xian-Zhong; Yu, Shu-Guang; Zhang, Xiang-Sun; Liang, Fan-Rong

    2012-01-01

    Acupuncture has been practiced in China for thousands of years as part of the Traditional Chinese Medicine (TCM) and has gradually accepted in western countries as an alternative or complementary treatment. However, the underlying mechanism of acupuncture, especially whether there exists any difference between varies acupoints, remains largely unknown, which hinders its widespread use. In this study, we develop a novel Linear Programming based Feature Selection method (LPFS) to understand the mechanism of acupuncture effect, at molecular level, by revealing the metabolite biomarkers for acupuncture treatment. Specifically, we generate and investigate the high-throughput metabolic profiles of acupuncture treatment at several acupoints in human. To select the subsets of metabolites that best characterize the acupuncture effect for each meridian point, an optimization model is proposed to identify biomarkers from high-dimensional metabolic data from case and control samples. Importantly, we use nearest centroid as the prototype to simultaneously minimize the number of selected features and the leave-one-out cross validation error of classifier. We compared the performance of LPFS to several state-of-the-art methods, such as SVM recursive feature elimination (SVM-RFE) and sparse multinomial logistic regression approach (SMLR). We find that our LPFS method tends to reveal a small set of metabolites with small standard deviation and large shifts, which exactly serves our requirement for good biomarker. Biologically, several metabolite biomarkers for acupuncture treatment are revealed and serve as the candidates for further mechanism investigation. Also biomakers derived from five meridian points, Zusanli (ST36), Liangmen (ST21), Juliao (ST3), Yanglingquan (GB34), and Weizhong (BL40), are compared for their similarity and difference, which provide evidence for the specificity of acupoints. Our result demonstrates that metabolic profiling might be a promising method to

  15. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    Science.gov (United States)

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  16. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    Science.gov (United States)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  17. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  18. Applying Statistical and Complex Network Methods to Explore the Key Signaling Molecules of Acupuncture Regulating Neuroendocrine-Immune Network

    Directory of Open Access Journals (Sweden)

    Kuo Zhang

    2018-01-01

    Full Text Available The mechanisms of acupuncture are still unclear. In order to reveal the regulatory effect of manual acupuncture (MA on the neuroendocrine-immune (NEI network and identify the key signaling molecules during MA modulating NEI network, we used a rat complete Freund’s adjuvant (CFA model to observe the analgesic and anti-inflammatory effect of MA, and, what is more, we used statistical and complex network methods to analyze the data about the expression of 55 common signaling molecules of NEI network in ST36 (Zusanli acupoint, and serum and hind foot pad tissue. The results indicate that MA had significant analgesic, anti-inflammatory effects on CFA rats; the key signaling molecules may play a key role during MA regulating NEI network, but further research is needed.

  19. Key KdSOC1 gene expression profiles during plantlet morphogenesis under hormone, photoperiod, and drought treatments.

    Science.gov (United States)

    Liu, C; Zhu, C; Zeng, H M

    2016-02-11

    Kalanchoe daigremontiana utilizes plantlet formation between its zigzag leaf margins as its method of asexual reproduction. In this study, K. daigremontiana SUPPRESSOR OF OVEREXPRESSION OF CONSTANS 1 (KdSOC1), a key intermediate in the transition from vegetative to asexual growth, was cloned. Furthermore, its expression profiles during plantlet formation under different environmental and hormone induction conditions were analyzed. The full-KdSOC1 cDNA sequence length was 1410 bp with 70% shared homology with Carya cathayensis SOC1. The conserved domain search of KdSOC1 showed the absence of I and C domains, which might indicate novel biological functions in K. daigremontiana. The full-KdSOC1 promoter sequence was 1401 bp long and contained multiple-hormone-responsive cis-acting elements. Hormone induction assays showed that gibberellins and salicylic acid mainly regulated KdSOC1 expression. The swift change from low to high KdSOC1 expression levels during long-day induction was accompanied by the rapid emergence of plantlets. Drought stress stimulated KdSOC1 expression in leaves both with and without plantlet formation. Together, the results suggested that KdSOC1 was closely involved in environmental stimulation signal perception and the transduction of K. daigremontiana plantlet formation. Therefore, future identification of KdSOC1 functions might reveal key information that will help elucidate the transition network between embryogenesis and organogenesis during plantlet formation.

  20. Characterization of Key Aroma Compounds in Raw and Thermally Processed Prawns and Thermally Processed Lobsters by Application of Aroma Extract Dilution Analysis.

    Science.gov (United States)

    Mall, Veronika; Schieberle, Peter

    2016-08-24

    Application of aroma extract dilution analysis (AEDA) to an aroma distillate of blanched prawn meat (Litopenaeus vannamei) (BPM) revealed 40 odorants in the flavor dilution (FD) factor range from 4 to 1024. The highest FD factors were assigned to 2-acetyl-1-pyrroline, 3-(methylthio)propanal, (Z)-1,5-octadien-3-one, trans-4,5-epoxy-(E)-2-decenal, (E)-3-heptenoic acid, and 2-aminoacetophenone. To understand the influence of different processing conditions on odorant formation, fried prawn meat was investigated by means of AEDA in the same way, revealing 31 odorants with FD factors between 4 and 2048. Also, the highest FD factors were determined for 2-acetyl-1-pyrroline, 3-(methylthio)propanal, and (Z)-1,5-octadien-3-one, followed by 4-hydroxy-2,5-dimethyl-3(2H)-furanone, (E)-3-heptenoic acid, and 2-aminoacetophenone. As a source of the typical marine, sea breeze-like odor attribute of the seafood, 2,4,6-tribromoanisole was identified in raw prawn meat as one of the contributors. Additionally, the aroma of blanched prawn meat was compared to that of blanched Norway and American lobster meat, respectively (Nephrops norvegicus and Homarus americanus). Identification experiments revealed the same set of odorants, however, with differing FD factors. In particular, 3-hydroxy-4,5-dimethyl-2(5H)-furanone was found as the key aroma compound in blanched Norway lobster, whereas American lobster contained 3-methylindole with a high FD factor.

  1. In vitro model of production of antibodies; a new approach to reveal the presence of key bacteria in polymicrobial environments.

    Science.gov (United States)

    Wu, Chongcong; Nakka, Sravya; Mansouri, Sepahdar; Bengtsson, Torbjörn; Nayeri, Tayeb; Nayeri, Fariba

    2016-09-09

    There is a rapid emergence of multiple resistant gram-negative bacteria due to overuse of antibiotics in the treatment of infections. Biofilms consist of polymicrobial communities that survive the host's defense system. The key bacteria in biofilms are slow growing and support an attachment and rapid growth of other microorganisms. Current antimicrobial strategies often fail due to poor diagnosis of key pathogens in biofilms. The study aims to develop anti-bacterial human antibodies in vitro from patients who had recently undergone a systemic infection by pathogenic bacteria and to use these antibodies as a tool for detecting bacteria in biofilms. Lymphocytes were separated from whole blood of patients (n = 10) and stimulated with heat-killed bacteria to produce antibodies in vitro. The specificity of antibodies in recognizing the bacteria against which they were directed was evaluated by surface plasmon resonance system (SPR) and electron microscopy. The ulcer secretions from patients with chronic and acute leg ulcers and healthy controls were analyzed by the SPR system and the results were compared with culture studies. The produced antibodies recognized bacteria with high sensitivity (SPR). The antibodies against Enterococcus fecalis bound specifically to the microorganism in a bacterial co-culture that was visualized by electron microscopy. In the present work, a method for producing specific antibodies against bacteria is introduced to recognize bacterial components in body fluids of patients suffering from pathogenic biofilms. This diagnostic technique may be most useful in clinical microbiology and in the choice of antibiotics in the treatment of serious infections.

  2. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  3. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  4. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen

    2015-10-26

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  5. No Child Left Behind in Art Education Policy: A Review of Key Recommendations for Arts Language Revisions

    Science.gov (United States)

    Grey, Anne C.

    2010-01-01

    From bipartisan origins and a laudable intent, the No Child Left Behind (Act) of 2001 has profoundly altered the condition of art education. A historical vantage point and review of literature reveals the current status of pending arts language revisions to the NCLB Act, as well as a pressing need to examine the key recommendations and to consider…

  6. Development and assessment of key skills in undergraduate students: An action-research experience

    Directory of Open Access Journals (Sweden)

    Ana Fernández-Santander

    2012-03-01

    Full Text Available Employers look for professionals able to work in a team, able to approach problems, with the capacity to analyze and resolve problems, under the constant renewal of knowledge and competencies. In this paper, a group of University teachers from different areas of knowledge presents an experience to introduce key employability skills in the higher education students’ curricula. This work has been developed under the action research scope. The first goal was to make an analysis of terms referred to key skills, generating an integrated denomination for each competency. The elaboration of general templates for key skills is proposed here as a useful tool that provides information about development, assessment and marking of each skill. Different types of rubrics and assessment templates, used during this experience, are presented. DOI: 10.18870/hlrc.v2i1.37

  7. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  8. Influence of postharvest processing and storage conditions on key antioxidants in pūhā (Sonchus oleraceus L.)

    DEFF Research Database (Denmark)

    Ou, Zong-Quan; Schmierer, David M; Strachan, Clare J

    2014-01-01

    To investigate effects of different postharvest drying processes and storage conditions on key antioxidants in Sonchus oleraceus L. leaves.......To investigate effects of different postharvest drying processes and storage conditions on key antioxidants in Sonchus oleraceus L. leaves....

  9. Nodal quasiparticle dynamics in the heavy fermion superconductor CeCoIn₅ revealed by precision microwave spectroscopy.

    Science.gov (United States)

    Truncik, C J S; Huttema, W A; Turner, P J; Ozcan, S; Murphy, N C; Carrière, P R; Thewalt, E; Morse, K J; Koenig, A J; Sarrao, J L; Broun, D M

    2013-01-01

    CeCoIn₅ is a heavy fermion superconductor with strong similarities to the high-Tc cuprates, including quasi-two-dimensionality, proximity to antiferromagnetism and probable d-wave pairing arising from a non-Fermi-liquid normal state. Experiments allowing detailed comparisons of their electronic properties are of particular interest, but in most cases are difficult to realize, due to their very different transition temperatures. Here we use low-temperature microwave spectroscopy to study the charge dynamics of the CeCoIn₅ superconducting state. The similarities to cuprates, in particular to ultra-clean YBa₂Cu₃O(y), are striking: the frequency and temperature dependence of the quasiparticle conductivity are instantly recognizable, a consequence of rapid suppression of quasiparticle scattering below T(c); and penetration-depth data, when properly treated, reveal a clean, linear temperature dependence of the quasiparticle contribution to superfluid density. The measurements also expose key differences, including prominent multiband effects and a temperature-dependent renormalization of the quasiparticle mass.

  10. Energy conservation in China: Key provincial sectors at two-digit level

    International Nuclear Information System (INIS)

    Liao, Hua; Du, Jian; Wei, Yi-Ming

    2013-01-01

    Highlights: ► We identify the keys for energy conversation across China’s 31 provinces × 65 sectors. ► The results are visualized in map and matrix tables, and easy for use. ► 39 Industrial sectors by province are classified into three categories for conservation. ► There is large energy wasting in the public management sector. ► There are both urban–rural gap and provincial inequality on electricity consumption. - Abstract: In March 2011, China’s central government set a new challenging target of reducing its energy intensity by 16% during 2011–2015, after it had achieved a reduction of 19.1% during 2006–2010. And this new target was assigned to provincial authorities in August 2011. However, China’s provincial energy-economic developments are unbalanced and different provinces have different key sectors for energy conservation. Most previous studies focused on provincial energy efficiency at the aggregate level, or the three-industry level (or one-digit level). However, whether for policy decision or academic research, it is necessary to further subdivide the sectors. In this paper, we use three indicators (Gini Coefficient, energy consumption share and energy intensity) to compare provincial energy conservation potentials at the two-digit sector level. To our knowledge, this paper is the first one to identify the keys for energy conversation across the 31 provinces × 65 sectors. And the results are shown in visualized maps and matrix tables to help identify the key province × sectors for energy conservation easier. This also helps the central and provincial governments to distinguish key sectors when they monitor the energy conservation progress

  11. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  12. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  13. In Situ Analysis of Metabolic Characteristics Reveals the Key Yeast in the Spontaneous and Solid-State Fermentation Process of Chinese Light-Style Liquor

    Science.gov (United States)

    Kong, Yu; Wu, Qun; Zhang, Yan

    2014-01-01

    The in situ metabolic characteristics of the yeasts involved in spontaneous fermentation process of Chinese light-style liquor are poorly understood. The covariation between metabolic profiles and yeast communities in Chinese light-style liquor was modeled using the partial least square (PLS) regression method. The diversity of yeast species was evaluated by sequence analysis of the 26S ribosomal DNA (rDNA) D1/D2 domains of cultivable yeasts, and the volatile compounds in fermented grains were analyzed by gas chromatography (GC)-mass spectrometry (MS). Eight yeast species and 58 volatile compounds were identified, respectively. The modulation of 16 of these volatile compounds was associated with variations in the yeast population (goodness of prediction [Q2] > 20%). The results showed that Pichia anomala was responsible for the characteristic aroma of Chinese liquor, through the regulation of several important volatile compounds, such as ethyl lactate, octanoic acid, and ethyl tetradecanoate. Correspondingly, almost all of the compounds associated with P. anomala were detected in a pure culture of this yeast. In contrast to the PLS regression results, however, ethyl lactate and ethyl isobutyrate were not detected in the same pure culture, which indicated that some metabolites could be generated by P. anomala only when it existed in a community with other yeast species. Furthermore, different yeast communities provided different volatile patterns in the fermented grains, which resulted in distinct flavor profiles in the resulting liquors. This study could help identify the key yeast species involved in spontaneous fermentation and provide a deeper understanding of the role of individual yeast species in the community. PMID:24727269

  14. Network theory inspired analysis of time-resolved expression data reveals key players guiding P. patens stem cell development.

    Science.gov (United States)

    Busch, Hauke; Boerries, Melanie; Bao, Jie; Hanke, Sebastian T; Hiss, Manuel; Tiko, Theodhor; Rensing, Stefan A

    2013-01-01

    Transcription factors (TFs) often trigger developmental decisions, yet, their transcripts are often only moderately regulated and thus not easily detected by conventional statistics on expression data. Here we present a method that allows to determine such genes based on trajectory analysis of time-resolved transcriptome data. As a proof of principle, we have analysed apical stem cells of filamentous moss (P. patens) protonemata that develop from leaflets upon their detachment from the plant. By our novel correlation analysis of the post detachment transcriptome kinetics we predict five out of 1,058 TFs to be involved in the signaling leading to the establishment of pluripotency. Among the predicted regulators is the basic helix loop helix TF PpRSL1, which we show to be involved in the establishment of apical stem cells in P. patens. Our methodology is expected to aid analysis of key players of developmental decisions in complex plant and animal systems.

  15. Cytogenetic analysis of the Amazon stingless bee Melipona seminigra merrillae reveals different chromosome number for the genus

    Directory of Open Access Journals (Sweden)

    Izaura Bezerra Francini

    2011-10-01

    Full Text Available Cytogenetic analysis of the Amazon stingless bee Melipona seminigra merrillae, by conventional Giemsa staining and C-banding, revealed a different chromosome number for Melipona: 2n = 22 for females and diploid drones while the haploid drones present n = 11. There is no evidence of B chromosomes. This result contrasts with previous studies, in which the chromosome number of 19 Melipona species was determined as 2n = 18 for females and n = 9 for haploid males. Based on cytogenetic information available for other Melipona species, we propose that M. s. merrillae has a more derived diploid number. This indicates that chromosome number is not a conservative characteristic within the genus as previously thought. Cytogenetic data for stingless bees are scarce, especially in Amazon region. Additional studies will be very important in order to promote Melipona karyoevolution discussion and consequently a taxonomy review.

  16. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  17. Mechanistic Insights on Human Phosphoglucomutase Revealed by Transition Path Sampling and Molecular Dynamics Calculations.

    Science.gov (United States)

    Brás, Natércia F; Fernandes, Pedro A; Ramos, Maria J; Schwartz, Steven D

    2018-02-06

    Human α-phosphoglucomutase 1 (α-PGM) catalyzes the isomerization of glucose-1-phosphate into glucose-6-phosphate (G6P) through two sequential phosphoryl transfer steps with a glucose-1,6-bisphosphate (G16P) intermediate. Given that the release of G6P in the gluconeogenesis raises the glucose output levels, α-PGM represents a tempting pharmacological target for type 2 diabetes. Here, we provide the first theoretical study of the catalytic mechanism of human α-PGM. We performed transition-path sampling simulations to unveil the atomic details of the two catalytic chemical steps, which could be key for developing transition state (TS) analogue molecules with inhibitory properties. Our calculations revealed that both steps proceed through a concerted S N 2-like mechanism, with a loose metaphosphate-like TS. Even though experimental data suggests that the two steps are identical, we observed noticeable differences: 1) the transition state ensemble has a well-defined TS region and a late TS for the second step, and 2) larger coordinated protein motions are required to reach the TS of the second step. We have identified key residues (Arg23, Ser117, His118, Lys389), and the Mg 2+ ion that contribute in different ways to the reaction coordinate. Accelerated molecular dynamics simulations suggest that the G16P intermediate may reorient without leaving the enzymatic binding pocket, through significant conformational rearrangements of the G16P and of specific loop regions of the human α-PGM. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Metabolic profiles of triple-negative and luminal A breast cancer subtypes in African-American identify key metabolic differences.

    Science.gov (United States)

    Tayyari, Fariba; Gowda, G A Nagana; Olopade, Olufunmilayo F; Berg, Richard; Yang, Howard H; Lee, Maxwell P; Ngwa, Wilfred F; Mittal, Suresh K; Raftery, Daniel; Mohammed, Sulma I

    2018-02-20

    Breast cancer, a heterogeneous disease with variable pathophysiology and biology, is classified into four major subtypes. While hormonal- and antibody-targeted therapies are effective in the patients with luminal and HER-2 subtypes, the patients with triple-negative breast cancer (TNBC) subtype do not benefit from these therapies. The incidence rates of TNBC subtype are higher in African-American women, and the evidence indicates that these women have worse prognosis compared to women of European descent. The reasons for this disparity remain unclear but are often attributed to TNBC biology. In this study, we performed metabolic analysis of breast tissues to identify how TNBC differs from luminal A breast cancer (LABC) subtypes within the African-American and Caucasian breast cancer patients, respectively. We used High-Resolution Magic Angle Spinning (HR-MAS) 1H Nuclear magnetic resonance (NMR) to perform the metabolomic analysis of breast cancer and adjacent normal tissues (total n=82 samples). TNBC and LABC subtypes in African American women exhibited different metabolic profiles. Metabolic profiles of these subtypes were also distinct from those revealed in Caucasian women. TNBC in African-American women expressed higher levels of glutathione, choline, and glutamine as well as profound metabolic alterations characterized by decreased mitochondrial respiration and increased glycolysis concomitant with decreased levels of ATP. TNBC in Caucasian women was associated with increased pyrimidine synthesis. These metabolic alterations could potentially be exploited as novel treatment targets for TNBC.

  19. Amygdala subnuclei connectivity in response to violence reveals unique influences of individual differences in psychopathic traits in a nonforensic sample.

    Science.gov (United States)

    Yoder, Keith J; Porges, Eric C; Decety, Jean

    2015-04-01

    Atypical amygdala function and connectivity have reliably been associated with psychopathy. However, the amygdala is not a unitary structure. To examine how psychopathic traits in a nonforensic sample are linked to amygdala response to violence, this study used probabilistic tractography to classify amygdala subnuclei based on anatomical projections to and from amygdala subnuclei in a group of 43 male participants. The segmentation identified the basolateral complex (BLA; lateral, basal, and accessory basal subnuclei) and the central subnucleus (CE), which were used as seeds in a functional connectivity analysis to identify differences in neuronal coupling specific to observed violence. While a full amygdala seed showed significant connectivity only to right middle occipital gyrus, subnuclei seeds revealed unique connectivity patterns. BLA showed enhanced coupling with anterior cingulate and prefrontal regions, while CE showed increased connectivity with the brainstem, but reduced connectivity with superior parietal and precentral gyrus. Further, psychopathic personality factors were related to specific patterns of connectivity. Fearless Dominance scores on the psychopathic personality inventory predicted increased coupling between the BLA seed and sensory integration cortices, and increased connectivity between the CE seed and posterior insula. Conversely, Self-Centered Impulsivity scores were negatively correlated with coupling between BLA and ventrolateral prefrontal cortex, and Coldheartedness scores predicted increased functional connectivity between BLA and dorsal anterior cingulate cortex. Taken together, these findings demonstrate how subnuclei segmentations reveal important functional connectivity differences that are otherwise inaccessible. Such an approach yields a better understanding of amygdala dysfunction in psychopathy. © 2014 Wiley Periodicals, Inc.

  20. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    Science.gov (United States)

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  1. Derivation of ozone flux-yield relationships for lettuce: A key horticultural crop

    Energy Technology Data Exchange (ETDEWEB)

    Goumenaki, Eleni [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom); School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Fernandez, Ignacio Gonzalez [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom); CIEMAT, Ecotoxicology of Air Pollution, Avda. Complutense 22, 28040 Madrid (Spain); Papanikolaou, Antigoni [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Papadopoulou, Despoina [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Askianakis, Christos [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Kouvarakis, George [Environmental and Chemical Processes Laboratory, Department of Chemistry, University of Crete, P.O. Box 1470, 71409 Heraklion (Greece); Barnes, Jeremy [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom)]. E-mail: j.d.barnes@ncl.ac.uk

    2007-04-15

    Ozone flux-response relationships were derived for lettuce, employing a multiplicative approach to model the manner in which stomatal conductance is influenced by key environmental variables, using a dataset collected during field experimentation in Crete and yield-response relationships derived from parallel open-top chamber experiments. Regional agronomic practices were adopted throughout. Computed versus measured data revealed that the derived model explained 51% (P < 0.001) of the observed variation in stomatal conductance. Concentration-based indices were compared with flux-based indices. Analyses revealed a significant relationship between accumulated stomatal ozone flux and yield employing flux threshold cut-offs up to 4 nmol m{sup -2} s{sup -1}. Regressions employing very low or zero flux thresholds resulted in the strongest yield-flux relationships (explaining {approx}80% (P < 0.05) of the variation in the dataset). - Establishment of ozone flux-yield relationships for a commercially-important horticultural crop grown widely in the Mediterranean.

  2. Structural differences between yeast and mammalian microtubules revealed by cryo-EM

    Energy Technology Data Exchange (ETDEWEB)

    Howes, Stuart C. [Univ. of California, Berkeley, CA (United States). Biophysics Graduate Group; Geyer, Elisabeth A. [Univ. of Texas Southwestern Medical Center, Dallas, TX (United States). Dept. of Biophysics; Univ. of Texas Southwestern Medical Center, Dallas, TX (United States). Dept. of Biochemistry; LaFrance, Benjamin [Univ. of California, Berkeley, CA (United States). Molecular and Cell Biology Graduate Program; Zhang, Rui [Univ. of California, Berkeley, CA (United States). Howard Hughes Medical Inst.; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Molecular Biophysics and Integrated Bioimaging Division; Kellogg, Elizabeth H. [Univ. of California, Berkeley, CA (United States). Howard Hughes Medical Inst.; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Molecular Biophysics and Integrated Bioimaging Division; Westermann, Stefan [Univ. of Duisburg-Essen, Essen (Germany). Dept. of Molecular Genetics, Center for Medical Biotechnology; Rice, Luke M. [Univ. of Texas Southwestern Medical Center, Dallas, TX (United States). Dept. of Biophysics; Univ. of Texas Southwestern Medical Center, Dallas, TX (United States). Dept. of Biochemistry; Nogales, Eva [Univ. of California, Berkeley, CA (United States). Howard Hughes Medical Inst.; Univ. of California, Berkeley, CA (United States). Dept. of Molecular Biology and California Inst. for Quantitative Biosciences; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Molecular Biophysics and Integrated Bioimaging Division

    2017-06-26

    Microtubules are polymers of αβ-tubulin heterodimers essential for all eukaryotes. Despite sequence conservation, there are significant structural differences between microtubules assembled in vitro from mammalian or budding yeast tubulin. Yeast MTs were not observed to undergo compaction at the interdimer interface as seen for mammalian microtubules upon GTP hydrolysis. Lack of compaction might reflect slower GTP hydrolysis or a different degree of allosteric coupling in the lattice. The microtubule plus end–tracking protein Bim1 binds yeast microtubules both between αβ-tubulin heterodimers, as seen for other organisms, and within tubulin dimers, but binds mammalian tubulin only at interdimer contacts. At the concentrations used in cryo-electron microscopy, Bim1 causes the compaction of yeast microtubules and induces their rapid disassembly. In conclusion, our studies demonstrate structural differences between yeast and mammalian microtubules that likely underlie their differing polymerization dynamics. These differences may reflect adaptations to the demands of different cell size or range of physiological growth temperatures.

  3. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  4. A population study of killer viruses reveals different evolutionary histories of two closely related Saccharomyces sensu stricto yeasts.

    Science.gov (United States)

    Chang, Shang-Lin; Leu, Jun-Yi; Chang, Tien-Hsien

    2015-08-01

    Microbes have evolved ways of interference competition to gain advantage over their ecological competitors. The use of secreted killer toxins by yeast cells through acquiring double-stranded RNA viruses is one such prominent example. Although the killer behaviour has been well studied in laboratory yeast strains, our knowledge regarding how killer viruses are spread and maintained in nature and how yeast cells co-evolve with viruses remains limited. We investigated these issues using a panel of 81 yeast populations belonging to three Saccharomyces sensu stricto species isolated from diverse ecological niches and geographic locations. We found that killer strains are rare among all three species. In contrast, killer toxin resistance is widespread in Saccharomyces paradoxus populations, but not in Saccharomyces cerevisiae or Saccharomyces eubayanus populations. Genetic analyses revealed that toxin resistance in S. paradoxus is often caused by dominant alleles that have independently evolved in different populations. Molecular typing identified one M28 and two types of M1 killer viruses in those killer strains. We further showed that killer viruses of the same type could lead to distinct killer phenotypes under different host backgrounds, suggesting co-evolution between the viruses and hosts in different populations. Taken together, our data suggest that killer viruses vary in their evolutionary histories even within closely related yeast species. © 2015 John Wiley & Sons Ltd.

  5. Investigating on the fermentation behavior of six lactic acid bacteria strains in barley malt wort reveals limitation in key amino acids and buffer capacity.

    Science.gov (United States)

    Nsogning, Sorelle Dongmo; Fischer, Susann; Becker, Thomas

    2018-08-01

    Understanding lactic acid bacteria (LAB) fermentation behavior in malt wort is a milestone towards flavor improvement of lactic acid fermented malt beverages. Therefore, this study aims to outline deficiencies that may exist in malt wort fermentation. First, based on six LAB strains, cell viability and vitality were evaluated. Second, sugars, organic acids, amino acids, pH value and buffering capacity (BC) were monitored. Finally, the implication of key amino acids, fructose and wort BC on LAB growth was determined. Short growth phase coupled with prompt cell death and a decrease in metabolic activity was observed. Low wort BC caused rapid pH drop with lactic acid accumulation, which conversely increased the BC leading to less pH change at late-stage fermentation. Lactic acid content (≤3.9 g/L) was higher than the reported inhibitory concentration (1.8 g/L). Furthermore, sugars were still available but fructose and key amino acids lysine, arginine and glutamic acid were considerably exhausted (≤98%). Wort supplementations improved cell growth and viability leading to conclude that key amino acid depletion coupled with low BC limits LAB growth in malt wort. Then, a further increase in organic acid reduces LAB viability. This knowledge opens doors for LAB fermentation process optimization in malt wort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Automatic generation of predictive dynamic models reveals nuclear phosphorylation as the key Msn2 control mechanism.

    Science.gov (United States)

    Sunnåker, Mikael; Zamora-Sillero, Elias; Dechant, Reinhard; Ludwig, Christina; Busetto, Alberto Giovanni; Wagner, Andreas; Stelling, Joerg

    2013-05-28

    Predictive dynamical models are critical for the analysis of complex biological systems. However, methods to systematically develop and discriminate among systems biology models are still lacking. We describe a computational method that incorporates all hypothetical mechanisms about the architecture of a biological system into a single model and automatically generates a set of simpler models compatible with observational data. As a proof of principle, we analyzed the dynamic control of the transcription factor Msn2 in Saccharomyces cerevisiae, specifically the short-term mechanisms mediating the cells' recovery after release from starvation stress. Our method determined that 12 of 192 possible models were compatible with available Msn2 localization data. Iterations between model predictions and rationally designed phosphoproteomics and imaging experiments identified a single-circuit topology with a relative probability of 99% among the 192 models. Model analysis revealed that the coupling of dynamic phenomena in Msn2 phosphorylation and transport could lead to efficient stress response signaling by establishing a rate-of-change sensor. Similar principles could apply to mammalian stress response pathways. Systematic construction of dynamic models may yield detailed insight into nonobvious molecular mechanisms.

  7. The Microbiome of Seriola lalandi of Wild and Aquaculture Origin Reveals Differences in Composition and Potential Function

    Directory of Open Access Journals (Sweden)

    Carolina Ramírez

    2017-09-01

    Full Text Available Seriola lalandi is an economically important species that is globally distributed in temperate and subtropical marine waters. Aquaculture production of this species has had problems associated with intensive fish farming, such as disease outbreaks or nutritional deficiencies causing high mortalities. Intestinal microbiota has been involved in many processes that benefit the host, such as disease control, stimulation of the immune response, and the promotion of nutrient metabolism, among others. However, little is known about the potential functionality of the microbiota and the differences in the composition between wild and aquacultured fish. Here, we assayed the V4-region of the 16S rRNA gene using high-throughput sequencing. Our results showed that there are significant differences between S. lalandi of wild and aquaculture origin (ANOSIM and PERMANOVA, P < 0.05. At the genus level, a total of 13 genera were differentially represented between the two groups, all of which have been described as beneficial microorganisms that have an antagonistic effect against pathogenic bacteria, improve immunological parameters and growth performance, and contribute to nutrition. Additionally, the changes in the presumptive functions of the intestinal microbiota of yellowtail were examined by predicting the metagenomes using PICRUSt. The most abundant functional categories were those corresponding to the metabolism of cofactors and vitamins, amino acid metabolism and carbohydrate metabolism, revealing differences in the contribution of the microbiota depending on the origin of the animals. To our knowledge, this is the first study to characterize and compare the intestinal microbiota of S. lalandi of wild and aquaculture origin using high-throughput sequencing.

  8. The Microbiome of Seriola lalandi of Wild and Aquaculture Origin Reveals Differences in Composition and Potential Function.

    Science.gov (United States)

    Ramírez, Carolina; Romero, Jaime

    2017-01-01

    Seriola lalandi is an economically important species that is globally distributed in temperate and subtropical marine waters. Aquaculture production of this species has had problems associated with intensive fish farming, such as disease outbreaks or nutritional deficiencies causing high mortalities. Intestinal microbiota has been involved in many processes that benefit the host, such as disease control, stimulation of the immune response, and the promotion of nutrient metabolism, among others. However, little is known about the potential functionality of the microbiota and the differences in the composition between wild and aquacultured fish. Here, we assayed the V4-region of the 16S rRNA gene using high-throughput sequencing. Our results showed that there are significant differences between S. lalandi of wild and aquaculture origin (ANOSIM and PERMANOVA, P < 0.05). At the genus level, a total of 13 genera were differentially represented between the two groups, all of which have been described as beneficial microorganisms that have an antagonistic effect against pathogenic bacteria, improve immunological parameters and growth performance, and contribute to nutrition. Additionally, the changes in the presumptive functions of the intestinal microbiota of yellowtail were examined by predicting the metagenomes using PICRUSt. The most abundant functional categories were those corresponding to the metabolism of cofactors and vitamins, amino acid metabolism and carbohydrate metabolism, revealing differences in the contribution of the microbiota depending on the origin of the animals. To our knowledge, this is the first study to characterize and compare the intestinal microbiota of S. lalandi of wild and aquaculture origin using high-throughput sequencing.

  9. Genomic Comparisons Reveal Microevolutionary Differences in Mycobacterium abscessus Subspecies

    Directory of Open Access Journals (Sweden)

    Joon L. Tan

    2017-10-01

    Full Text Available Mycobacterium abscessus, a rapid-growing non-tuberculous mycobacterium, has been the cause of sporadic and outbreak infections world-wide. The subspecies in M. abscessus complex (M. abscessus, M. massiliense, and M. bolletii are associated with different biologic and pathogenic characteristics and are known to be among the most frequently isolated opportunistic pathogens from clinical material. To date, the evolutionary forces that could have contributed to these biological and clinical differences are still unclear. We compared genome data from 243 M. abscessus strains downloaded from the NCBI ftp Refseq database to understand how the microevolutionary processes of homologous recombination and positive selection influenced the diversification of the M. abscessus complex at the subspecies level. The three subspecies are clearly separated in the Minimum Spanning Tree. Their MUMi-based genomic distances support the separation of M. massiliense and M. bolletii into two subspecies. Maximum Likelihood analysis through dN/dS (the ratio of number of non-synonymous substitutions per non-synonymous site, to the number of synonymous substitutions per synonymous site identified distinct genes in each subspecies that could have been affected by positive selection during evolution. The results of genome-wide alignment based on concatenated locally-collinear blocks suggest that (a recombination has affected the M. abscessus complex more than mutation and positive selection; (b recombination occurred more frequently in M. massiliense than in the other two subspecies; and (c the recombined segments in the three subspecies have come from different intra-species and inter-species origins. The results lead to the identification of possible gene sets that could have been responsible for the subspecies-specific features and suggest independent evolution among the three subspecies, with recombination playing a more significant role than positive selection in the

  10. Genomic Comparisons Reveal Microevolutionary Differences in Mycobacterium abscessus Subspecies

    Science.gov (United States)

    Tan, Joon L.; Ng, Kee P.; Ong, Chia S.; Ngeow, Yun F.

    2017-01-01

    Mycobacterium abscessus, a rapid-growing non-tuberculous mycobacterium, has been the cause of sporadic and outbreak infections world-wide. The subspecies in M. abscessus complex (M. abscessus, M. massiliense, and M. bolletii) are associated with different biologic and pathogenic characteristics and are known to be among the most frequently isolated opportunistic pathogens from clinical material. To date, the evolutionary forces that could have contributed to these biological and clinical differences are still unclear. We compared genome data from 243 M. abscessus strains downloaded from the NCBI ftp Refseq database to understand how the microevolutionary processes of homologous recombination and positive selection influenced the diversification of the M. abscessus complex at the subspecies level. The three subspecies are clearly separated in the Minimum Spanning Tree. Their MUMi-based genomic distances support the separation of M. massiliense and M. bolletii into two subspecies. Maximum Likelihood analysis through dN/dS (the ratio of number of non-synonymous substitutions per non-synonymous site, to the number of synonymous substitutions per synonymous site) identified distinct genes in each subspecies that could have been affected by positive selection during evolution. The results of genome-wide alignment based on concatenated locally-collinear blocks suggest that (a) recombination has affected the M. abscessus complex more than mutation and positive selection; (b) recombination occurred more frequently in M. massiliense than in the other two subspecies; and (c) the recombined segments in the three subspecies have come from different intra-species and inter-species origins. The results lead to the identification of possible gene sets that could have been responsible for the subspecies-specific features and suggest independent evolution among the three subspecies, with recombination playing a more significant role than positive selection in the diversification

  11. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  12. Individual structural differences in left inferior parietal area are associated with schoolchildrens’ arithmetic scores

    Directory of Open Access Journals (Sweden)

    Yongxin eLi

    2013-12-01

    Full Text Available Arithmetic skill is of critical importance for academic achievement, professional success and everyday life, and childhood is the key period to acquire this skill. Neuroimaging studies have identified that left parietal regions are a key neural substrate for representing arithmetic skill. Although the relationship between functional brain activity in left parietal regions and arithmetic skill has been studied in detail, it remains unclear about the relationship between arithmetic achievement and structural properties in left inferior parietal area in schoolchildren. The current study employed a combination of voxel-based morphometry (VBM for high-resolution T1-weighted images and fiber tracking on diffusion tensor imaging (DTI to examine the relationship between structural properties in the inferior parietal area and arithmetic achievement in 10-year-old schoolchildren. VBM of the T1-weighted images revealed that individual differences in arithmetic scores were significantly and positively correlated with the grey matter (GM volume in the left intraparietal sulcus (IPS. Fiber tracking analysis revealed that the forceps major, left superior longitudinal fasciculus (SLF, bilateral inferior longitudinal fasciculus (ILF and inferior fronto-occipital fasciculus (IFOF were the primary pathways connecting the left IPS with other brain areas. Furthermore, the regression analysis of the probabilistic pathways revealed a significant and positive correlation between the fractional anisotropy (FA values in the left SLF, ILF and bilateral IFOF and arithmetic scores. The brain structure-behavior correlation analyses indicated that the GM volumes in the left IPS and the FA values in the tract pathways connecting left IPS were both related to children’s arithmetic achievement. The present findings provide evidence that individual structural differences in the left IPS are associated with arithmetic scores in schoolchildren.

  13. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  14. Identification of the key ecological factors influencing vegetation degradation in semi-arid agro-pastoral ecotone considering spatial scales

    Science.gov (United States)

    Peng, Yu; Wang, Qinghui; Fan, Min

    2017-11-01

    When assessing re-vegetation project performance and optimizing land management, identification of the key ecological factors inducing vegetation degradation has crucial implications. Rainfall, temperature, elevation, slope, aspect, land use type, and human disturbance are ecological factors affecting the status of vegetation index. However, at different spatial scales, the key factors may vary. Using Helin County, Inner-Mongolia, China as the study site and combining remote sensing image interpretation, field surveying, and mathematical methods, this study assesses key ecological factors affecting vegetation degradation under different spatial scales in a semi-arid agro-pastoral ecotone. It indicates that the key factors are different at various spatial scales. Elevation, rainfall, and temperature are identified as crucial for all spatial extents. Elevation, rainfall and human disturbance are key factors for small-scale quadrats of 300 m × 300 m and 600 m × 600 m, temperature and land use type are key factors for a medium-scale quadrat of 1 km × 1 km, and rainfall, temperature, and land use are key factors for large-scale quadrats of 2 km × 2 km and 5 km × 5 km. For this region, human disturbance is not the key factor for vegetation degradation across spatial scales. It is necessary to consider spatial scale for the identification of key factors determining vegetation characteristics. The eco-restoration programs at various spatial scales should identify key influencing factors according their scales so as to take effective measurements. The new understanding obtained in this study may help to explore the forces which driving vegetation degradation in the degraded regions in the world.

  15. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  16. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  17. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  18. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  19. Systematic differences in signal emitting and receiving revealed by PageRank analysis of a human protein interactome.

    Directory of Open Access Journals (Sweden)

    Donglei Du

    Full Text Available Most protein PageRank studies do not use signal flow direction information in protein interactions because this information was not readily available in large protein databases until recently. Therefore, four questions have yet to be answered: A What is the general difference between signal emitting and receiving in a protein interactome? B Which proteins are among the top ranked in directional ranking? C Are high ranked proteins more evolutionarily conserved than low ranked ones? D Do proteins with similar ranking tend to have similar subcellular locations? In this study, we address these questions using the forward, reverse, and non-directional PageRank approaches to rank an information-directional network of human proteins and study their evolutionary conservation. The forward ranking gives credit to information receivers, reverse ranking to information emitters, and non-directional ranking mainly to the number of interactions. The protein lists generated by the forward and non-directional rankings are highly correlated, but those by the reverse and non-directional rankings are not. The results suggest that the signal emitting/receiving system is characterized by key-emittings and relatively even receivings in the human protein interactome. Signaling pathway proteins are frequent in top ranked ones. Eight proteins are both informational top emitters and top receivers. Top ranked proteins, except a few species-related novel-function ones, are evolutionarily well conserved. Protein-subunit ranking position reflects subunit function. These results demonstrate the usefulness of different PageRank approaches in characterizing protein networks and provide insights to protein interaction in the cell.

  20. Systematic differences in signal emitting and receiving revealed by PageRank analysis of a human protein interactome.

    Science.gov (United States)

    Du, Donglei; Lee, Connie F; Li, Xiu-Qing

    2012-01-01

    Most protein PageRank studies do not use signal flow direction information in protein interactions because this information was not readily available in large protein databases until recently. Therefore, four questions have yet to be answered: A) What is the general difference between signal emitting and receiving in a protein interactome? B) Which proteins are among the top ranked in directional ranking? C) Are high ranked proteins more evolutionarily conserved than low ranked ones? D) Do proteins with similar ranking tend to have similar subcellular locations? In this study, we address these questions using the forward, reverse, and non-directional PageRank approaches to rank an information-directional network of human proteins and study their evolutionary conservation. The forward ranking gives credit to information receivers, reverse ranking to information emitters, and non-directional ranking mainly to the number of interactions. The protein lists generated by the forward and non-directional rankings are highly correlated, but those by the reverse and non-directional rankings are not. The results suggest that the signal emitting/receiving system is characterized by key-emittings and relatively even receivings in the human protein interactome. Signaling pathway proteins are frequent in top ranked ones. Eight proteins are both informational top emitters and top receivers. Top ranked proteins, except a few species-related novel-function ones, are evolutionarily well conserved. Protein-subunit ranking position reflects subunit function. These results demonstrate the usefulness of different PageRank approaches in characterizing protein networks and provide insights to protein interaction in the cell.

  1. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  2. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  3. The Impact of Key Monetary Variables on the Economic Growth of the CEMAC Zone

    Directory of Open Access Journals (Sweden)

    Forgha Godfrey NJIMANTED

    2016-09-01

    Full Text Available This study seeks to empirically explore the impact of key monetary policy variables on the economic growth in the CEMAC zone from the period of 1981 to 2015. Carried out using the Ex post facto research design based on the principal components selection approach, the study interacts money supply, interest rate, economic growth, and inflation rate, among themselves and their lagged values using the Vector Auto-regressive (VAR analytical technique. The Classical quantity theory of money, the Cambridge Cash Balanced, the liquidity preference theory and the Monetarists as theoretical frameworks were explored to appreciate the time trends of the selected variables on the economic growth of the CEMAC zone. Based on the (VAR methodology, the study reveals that key monetary policy variables influence economic growth of the CEMAC zone in different ways with inflation rate as the impact factor. On the basis of the above findings and the evidence from other studies, lending and inflation rate generated substantial destabilizing impacts on the economic growth, suggesting that the monetary authorities should play a critical role in creating an enabling environment for growth. The determination of the optimal lending rate should reflect the overall internal rate of returns in the productive sectors with due attention to market fundamentals. In line with this, the Central Bank of CEMAC should be given complete instrumental autonomy to operate depending on a set of in-built targets by the individual countries of the zone. Effective monetary targeting and accommodating monetary policies should be designed and implemented as the need arises with little or no political motives.

  4. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  5. Resolving the infection process reveals striking differences in the contribution of environment, genetics and phylogeny to host-parasite interactions.

    Science.gov (United States)

    Duneau, David; Luijckx, Pepijn; Ben-Ami, Frida; Laforsch, Christian; Ebert, Dieter

    2011-02-22

    Infection processes consist of a sequence of steps, each critical for the interaction between host and parasite. Studies of host-parasite interactions rarely take into account the fact that different steps might be influenced by different factors and might, therefore, make different contributions to shaping coevolution. We designed a new method using the Daphnia magna - Pasteuria ramosa system, one of the rare examples where coevolution has been documented, in order to resolve the steps of the infection and analyse the factors that influence each of them. Using the transparent Daphnia hosts and fluorescently-labelled spores of the bacterium P. ramosa, we identified a sequence of infection steps: encounter between parasite and host; activation of parasite dormant spores; attachment of spores to the host; and parasite proliferation inside the host. The chances of encounter had been shown to depend on host genotype and environment. We tested the role of genetic and environmental factors in the newly described activation and attachment steps. Hosts of different genotypes, gender and species were all able to activate endospores of all parasite clones tested in different environments; suggesting that the activation cue is phylogenetically conserved. We next established that parasite attachment occurs onto the host oesophagus independently of host species, gender and environmental conditions. In contrast to spore activation, attachment depended strongly on the combination of host and parasite genotypes. Our results show that different steps are influenced by different factors. Host-type-independent spore activation suggests that this step can be ruled out as a major factor in Daphnia-Pasteuria coevolution. On the other hand, we show that the attachment step is crucial for the pronounced genetic specificities of this system. We suggest that this one step can explain host population structure and could be a key force behind coevolutionary cycles. We discuss how different

  6. Resolving the infection process reveals striking differences in the contribution of environment, genetics and phylogeny to host-parasite interactions

    Directory of Open Access Journals (Sweden)

    Laforsch Christian

    2011-02-01

    Full Text Available Abstract Background Infection processes consist of a sequence of steps, each critical for the interaction between host and parasite. Studies of host-parasite interactions rarely take into account the fact that different steps might be influenced by different factors and might, therefore, make different contributions to shaping coevolution. We designed a new method using the Daphnia magna - Pasteuria ramosa system, one of the rare examples where coevolution has been documented, in order to resolve the steps of the infection and analyse the factors that influence each of them. Results Using the transparent Daphnia hosts and fluorescently-labelled spores of the bacterium P. ramosa, we identified a sequence of infection steps: encounter between parasite and host; activation of parasite dormant spores; attachment of spores to the host; and parasite proliferation inside the host. The chances of encounter had been shown to depend on host genotype and environment. We tested the role of genetic and environmental factors in the newly described activation and attachment steps. Hosts of different genotypes, gender and species were all able to activate endospores of all parasite clones tested in different environments; suggesting that the activation cue is phylogenetically conserved. We next established that parasite attachment occurs onto the host oesophagus independently of host species, gender and environmental conditions. In contrast to spore activation, attachment depended strongly on the combination of host and parasite genotypes. Conclusions Our results show that different steps are influenced by different factors. Host-type-independent spore activation suggests that this step can be ruled out as a major factor in Daphnia-Pasteuria coevolution. On the other hand, we show that the attachment step is crucial for the pronounced genetic specificities of this system. We suggest that this one step can explain host population structure and could be a key

  7. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  8. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  9. Ways of making-sense: Local gamma synchronization reveals differences between semantic processing induced by music and language.

    Science.gov (United States)

    Barraza, Paulo; Chavez, Mario; Rodríguez, Eugenio

    2016-01-01

    Similar to linguistic stimuli, music can also prime the meaning of a subsequent word. However, it is so far unknown what is the brain dynamics underlying the semantic priming effect induced by music, and its relation to language. To elucidate these issues, we compare the brain oscillatory response to visual words that have been semantically primed either by a musical excerpt or by an auditory sentence. We found that semantic violation between music-word pairs triggers a classical ERP N400, and induces a sustained increase of long-distance theta phase synchrony, along with a transient increase of local gamma activity. Similar results were observed after linguistic semantic violation except for gamma activity, which increased after semantic congruence between sentence-word pairs. Our findings indicate that local gamma activity is a neural marker that signals different ways of semantic processing between music and language, revealing the dynamic and self-organized nature of the semantic processing. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    Science.gov (United States)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  11. Managing Water in the Rural-Urban Interface : the Key to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Water in the Rural-Urban Interface : the Key to Climate Change Resilient Cities ... cities - one in East and the other in West Africa - through better management ... Sustaining water use : stakeholders' strategies under different climate ...

  12. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  13. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  14. Measurements of salivary alpha amylase and salivary cortisol in hominoid primates reveal within-species consistency and between-species differences.

    Directory of Open Access Journals (Sweden)

    Verena Behringer

    Full Text Available Salivary alpha amylase (sAA is the most abundant enzyme in saliva. Studies in humans found variation in enzymatic activity of sAA across populations that could be linked to the copy number of loci for salivary amylase (AMY1, which was seen as an adaptive response to the intake of dietary starch. In addition to diet dependent variation, differences in sAA activity have been related to social stress. In a previous study, we found evidence for stress-induced variation in sAA activity in the bonobos, a hominoid primate that is closely related to humans. In this study, we explored patterns of variation in sAA activity in bonobos and three other hominoid primates, chimpanzee, gorilla, and orangutan to (a examine if within-species differences in sAA activity found in bonobos are characteristic for hominoids and (b assess the extent of variation in sAA activity between different species. The results revealed species-differences in sAA activity with gorillas and orangutans having higher basal sAA activity when compared to Pan. To assess the impact of stress, sAA values were related to cortisol levels measured in the same saliva samples. Gorillas and orangutans had low salivary cortisol concentrations and the highest cortisol concentration was found in samples from male bonobos, the group that also showed the highest sAA activity. Considering published information, the differences in sAA activity correspond with differences in AMY1 copy numbers and match with general features of natural diet. Studies on sAA activity have the potential to complement molecular studies and may contribute to research on feeding ecology and nutrition.

  15. Translation and Its Discontents: Key Concepts in English and German History Education

    Science.gov (United States)

    Seixas, Peter

    2016-01-01

    Key terms and concepts are crucial tools in teaching and learning in the disciplines. Different linguistic traditions approach such tools in diverse ways. This paper offers an initial contribution by a monolingual Anglophone history educator in dialogue with German history educators. It presents three different scenarios for the potential of…

  16. Decision Making and Revealed Preference

    DEFF Research Database (Denmark)

    de la Rosa, Leonidas Enrique

    If our decision-making processes are to some extent shaped by evolutionary pressures and our environment is different from that to which we adapted, some of our choices will not be in our best interest. But revealed preference is the only tool that we have so far to conduct a normative analysis...

  17. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    Science.gov (United States)

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  18. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  19. Identification of Key Residues for Enzymatic Carboxylate Reduction

    Directory of Open Access Journals (Sweden)

    Holly Stolterfoht

    2018-02-01

    Full Text Available Carboxylate reductases (CARs, E.C. 1.2.1.30 generate aldehydes from their corresponding carboxylic acid with high selectivity. Little is known about the structure of CARs and their catalytically important amino acid residues. The identification of key residues for carboxylate reduction provides a starting point to gain deeper understanding of enzymatic carboxylate reduction. A multiple sequence alignment of CARs with confirmed activity recently identified in our lab and from the literature revealed a fingerprint of conserved amino acids. We studied the function of conserved residues by multiple sequence alignments and mutational replacements of these residues. In this study, single-site alanine variants of Neurospora crassa CAR were investigated to determine the contribution of conserved residues to the function, expressability or stability of the enzyme. The effect of amino acid replacements was investigated by analyzing enzymatic activity of the variants in vivo and in vitro. Supported by molecular modeling, we interpreted that five of these residues are essential for catalytic activity, or substrate and co-substrate binding. We identified amino acid residues having significant impact on CAR activity. Replacement of His 237, Glu 433, Ser 595, Tyr 844, and Lys 848 by Ala abolish CAR activity, indicating their key role in acid reduction. These results may assist in the functional annotation of CAR coding genes in genomic databases. While some other conserved residues decreased activity or had no significant impact, four residues increased the specific activity of NcCAR variants when replaced by alanine. Finally, we showed that NcCAR wild-type and mutants efficiently reduce aliphatic acids.

  20. Social patterns revealed through random matrix theory

    Science.gov (United States)

    Sarkar, Camellia; Jalan, Sarika

    2014-11-01

    Despite the tremendous advancements in the field of network theory, very few studies have taken weights in the interactions into consideration that emerge naturally in all real-world systems. Using random matrix analysis of a weighted social network, we demonstrate the profound impact of weights in interactions on emerging structural properties. The analysis reveals that randomness existing in particular time frame affects the decisions of individuals rendering them more freedom of choice in situations of financial security. While the structural organization of networks remains the same throughout all datasets, random matrix theory provides insight into the interaction pattern of individuals of the society in situations of crisis. It has also been contemplated that individual accountability in terms of weighted interactions remains as a key to success unless segregation of tasks comes into play.

  1. Quantitative proteomic study of Aspergillus Fumigatus secretome revealed deamidation of secretory enzymes.

    Science.gov (United States)

    Adav, Sunil S; Ravindran, Anita; Sze, Siu Kwan

    2015-04-24

    Aspergillus sp. plays an essential role in lignocellulosic biomass recycling and is also exploited as cell factories for the production of industrial enzymes. This study profiled the secretome of Aspergillus fumigatus when grown with cellulose, xylan and starch by high throughput quantitative proteomics using isobaric tags for relative and absolute quantification (iTRAQ). Post translational modifications (PTMs) of proteins play a critical role in protein functions. However, our understanding of the PTMs in secretory proteins is limited. Here, we present the identification of PTMs such as deamidation of secreted proteins of A. fumigatus. This study quantified diverse groups of extracellular secreted enzymes and their functional classification revealed cellulases and glycoside hydrolases (32.9%), amylases (0.9%), hemicellulases (16.2%), lignin degrading enzymes (8.1%), peptidases and proteases (11.7%), chitinases, lipases and phosphatases (7.6%), and proteins with unknown function (22.5%). The comparison of quantitative iTRAQ results revealed that cellulose and xylan stimulates expression of specific cellulases and hemicellulases, and their abundance level as a function of substrate. In-depth data analysis revealed deamidation as a major PTM of key cellulose hydrolyzing enzymes like endoglucanases, cellobiohydrolases and glucosidases. Hemicellulose degrading endo-1,4-beta-xylanase, monosidases, xylosidases, lignin degrading laccase, isoamyl alcohol oxidase and oxidoreductases were also found to be deamidated. The filamentous fungi play an essential role in lignocellulosic biomass recycling and fungal strains belonging to Aspergillus were also exploited as cell factories for the production of organic acids, pharmaceuticals, and industrially important enzymes. In this study, extracellular proteins secreted by thermophilic A. fumigatus when grown with cellulose, xylan and starch were profiled using isobaric tags for relative and absolute quantification (iTRAQ) by

  2. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  3. INNOVATION LEADERSHIP AS A KEY SKILL IN BUSINESS

    OpenAIRE

    Teodora Lazarova

    2014-01-01

    Innovation leadership is a key concept in modern business world. It consists of different leadership styles which are useful to influence people to be more creative, productive and to work better in teams. Innovation leadership can be properly used to support organization vision and mission. The leaders need innovation leadership for themselves as they are managing in unpredictable and uncertain circumstances. The current paper underlies the importance of innovation leadership and innovative ...

  4. Adaptation to High Ethanol Reveals Complex Evolutionary Pathways.

    Directory of Open Access Journals (Sweden)

    Karin Voordeckers

    2015-11-01

    Full Text Available Tolerance to high levels of ethanol is an ecologically and industrially relevant phenotype of microbes, but the molecular mechanisms underlying this complex trait remain largely unknown. Here, we use long-term experimental evolution of isogenic yeast populations of different initial ploidy to study adaptation to increasing levels of ethanol. Whole-genome sequencing of more than 30 evolved populations and over 100 adapted clones isolated throughout this two-year evolution experiment revealed how a complex interplay of de novo single nucleotide mutations, copy number variation, ploidy changes, mutator phenotypes, and clonal interference led to a significant increase in ethanol tolerance. Although the specific mutations differ between different evolved lineages, application of a novel computational pipeline, PheNetic, revealed that many mutations target functional modules involved in stress response, cell cycle regulation, DNA repair and respiration. Measuring the fitness effects of selected mutations introduced in non-evolved ethanol-sensitive cells revealed several adaptive mutations that had previously not been implicated in ethanol tolerance, including mutations in PRT1, VPS70 and MEX67. Interestingly, variation in VPS70 was recently identified as a QTL for ethanol tolerance in an industrial bio-ethanol strain. Taken together, our results show how, in contrast to adaptation to some other stresses, adaptation to a continuous complex and severe stress involves interplay of different evolutionary mechanisms. In addition, our study reveals functional modules involved in ethanol resistance and identifies several mutations that could help to improve the ethanol tolerance of industrial yeasts.

  5. Random multiple key streams for encryption with added CBC mode of operation

    Directory of Open Access Journals (Sweden)

    P. Penchalaiah

    2016-09-01

    For the first time, in this paper, we present a construction method to generate multiple random keys from a core-key with highest possible immunity to crack. We are with a particular emphasis on novel technique to secure user data, we have designed a secure and cost effective new cryptosystem called Rbits (Random bits cypher. In different directions we identify that Rbits having highest immunity to crack and presenting various analysis tests in support from this viewpoint and the analyzed results are reported.

  6. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  7. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  8. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  9. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  10. Dynamic test of the ITER blanket key and ceramic insulated pad

    International Nuclear Information System (INIS)

    Khomyakov, S.; Sysoev, G.; Strebkov, Yu.; Kucherov, A.; Ioki, K.

    2010-01-01

    The dynamic testing of the blanket module's key integrated into ITER vacuum vessel portion has been performed in 2008 to investigate its capability to react the electro-magnetic (EM) loads. The preliminary analysis showed the large dynamic amplification factor (DAF) of the reactions because of technological gaps between the blanket module and key. Shock load may yield the bronze pads, which protect the blanket electrical insulation from damage. However the dynamic analysis of such particularly non-linear system needs an experimental ground and confirmation. Toward this end, as well as demonstration of the key reliability, the special test facility has been made, and the full-scale mock-up of the inboard intermodular key was tested. So as not to scale non-linear dynamic parameters, 1-ton mass was built on the single flexible support. The key was welded in a 60-mm thick steel plate modeled with a fragment of the VV. The different gaps were set in between the bronze pad of the key and the mass shock worker. This system (supplemented with some additional constraints) has natural oscillations like as the 4-ton module built on four flexible supports. Thus the most critical radial torque might be modeled with a straight force. The objectives of the test were as follows: dynamic response, DAF and damping factor determination; measurement of the strain oscillations in the key's base and in the weld seam; comparison of the measured data with computation results. The paper will present the analytical grounds of the testing conditions, test facility description, analytical adaptation of the facility, experimental results, its comparison with analysis and discussion, and guidelines for the next experimental phase.

  11. Sensitivity of probabilistic MCO water content estimates to key assumptions

    International Nuclear Information System (INIS)

    DUNCAN, D.R.

    1999-01-01

    Sensitivity of probabilistic multi-canister overpack (MCO) water content estimates to key assumptions is evaluated with emphasis on the largest non-cladding film-contributors, water borne by particulates adhering to damage sites, and water borne by canister particulate. Calculations considered different choices of damage state degree of independence, different choices of percentile for reference high inputs, three types of input probability density function (pdfs): triangular, log-normal, and Weibull, and the number of scrap baskets in an MCO

  12. Investigation of the key determinants of Asian nurses' quality of life.

    Science.gov (United States)

    Makabe, Sachiko; Kowitlawakul, Yanika; Nurumal, Mohd Said; Takagai, Junko; Wichaikhum, Orn-Anong; Wangmo, Neyzang; Yap, Suk Foon; Kunaviktikul, Wipada; Komatsu, Junko; Shirakawa, Hideko; Kimura, Yutaka; Asanuma, Yoshihiro

    2018-06-01

    The study aimed to compare nurses' quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were "stress coping ability," "life satisfaction," "Japan," "social support," "job stress," and "Singapore" (adjusted R 2 =0.46). In conclusion, nurses' quality of life differs across Asian countries and is not linked to the country's economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution' minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them.

  13. Derivation of ozone flux-yield relationships for lettuce: A key horticultural crop

    International Nuclear Information System (INIS)

    Goumenaki, Eleni; Fernandez, Ignacio Gonzalez; Papanikolaou, Antigoni; Papadopoulou, Despoina; Askianakis, Christos; Kouvarakis, George; Barnes, Jeremy

    2007-01-01

    Ozone flux-response relationships were derived for lettuce, employing a multiplicative approach to model the manner in which stomatal conductance is influenced by key environmental variables, using a dataset collected during field experimentation in Crete and yield-response relationships derived from parallel open-top chamber experiments. Regional agronomic practices were adopted throughout. Computed versus measured data revealed that the derived model explained 51% (P -2 s -1 . Regressions employing very low or zero flux thresholds resulted in the strongest yield-flux relationships (explaining ∼80% (P < 0.05) of the variation in the dataset). - Establishment of ozone flux-yield relationships for a commercially-important horticultural crop grown widely in the Mediterranean

  14. Expression Profiling of Mitogen-Activated Protein Kinase Genes Reveals Their Evolutionary and Functional Diversity in Different Rubber Tree (Hevea brasiliensis Cultivars

    Directory of Open Access Journals (Sweden)

    Xiang Jin

    2017-10-01

    Full Text Available Rubber tree (Hevea brasiliensis is the only commercially cultivated plant for producing natural rubber, one of the most essential industrial raw materials. Knowledge of the evolutionary and functional characteristics of kinases in H. brasiliensis is limited because of the long growth period and lack of well annotated genome information. Here, we reported mitogen-activated protein kinases in H. brasiliensis (HbMPKs by manually checking and correcting the rubber tree genome. Of the 20 identified HbMPKs, four members were validated by proteomic data. Protein motif and phylogenetic analyses classified these members into four known groups comprising Thr-Glu-Tyr (TEY and Thr-Asp-Tyr (TDY domains, respectively. Evolutionary and syntenic analyses suggested four duplication events: HbMPK3/HbMPK6, HbMPK8/HbMPK9/HbMPK15, HbMPK10/HbMPK12 and HbMPK11/HbMPK16/HbMPK19. Expression profiling of the identified HbMPKs in roots, stems, leaves and latex obtained from three cultivars with different latex yield ability revealed tissue- and variety-expression specificity of HbMPK paralogues. Gene expression patterns under osmotic, oxidative, salt and cold stresses, combined with cis-element distribution analyses, indicated different regulation patterns of HbMPK paralogues. Further, Ka/Ks and Tajima analyses suggested an accelerated evolutionary rate in paralogues HbMPK10/12. These results revealed HbMPKs have diverse functions in natural rubber biosynthesis, and highlighted the potential possibility of using MPKs to improve stress tolerance in future rubber tree breeding.

  15. Interpretation keys in the process of sensitization and education of the Chinese consumer as to the consumption of wine

    Directory of Open Access Journals (Sweden)

    Trotta Alessandro

    2015-01-01

    Full Text Available China’ wine consumption has ever and ever increased during the last decade but there are still difficulties in the communication of this product. This is caused by the great social, cultural and economical diversities among Chinese themselves and between eastern and western culture. In fact, the diversities between the population of urban areas of greater development and the rural ones and the differences between the profound and radical eastern culture and the western culture outline a very different consumer-type compared to the western one. For this reason, for years, the marketing strategies in the wine sector have not brought about the attended results. The Chinese wine consumer reveals much instability caused by cultural reasons, which have emerged in this work, joined by an experimental analysis that could bring into light reliable evaluative results. The output of the analysis of these results is a list of interpretation key points that can be used as a tool to improve the education and the communication towards Chinese wine consumer.

  16. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  17. Membrane Protein Properties Revealed through Data-Rich Electrostatics Calculations.

    Science.gov (United States)

    Marcoline, Frank V; Bethel, Neville; Guerriero, Christopher J; Brodsky, Jeffrey L; Grabe, Michael

    2015-08-04

    The electrostatic properties of membrane proteins often reveal many of their key biophysical characteristics, such as ion channel selectivity and the stability of charged membrane-spanning segments. The Poisson-Boltzmann (PB) equation is the gold standard for calculating protein electrostatics, and the software APBSmem enables the solution of the PB equation in the presence of a membrane. Here, we describe significant advances to APBSmem, including full automation of system setup, per-residue energy decomposition, incorporation of PDB2PQR, calculation of membrane-induced pKa shifts, calculation of non-polar energies, and command-line scripting for large-scale calculations. We highlight these new features with calculations carried out on a number of membrane proteins, including the recently solved structure of the ion channel TRPV1 and a large survey of 1,614 membrane proteins of known structure. This survey provides a comprehensive list of residues with large electrostatic penalties for being embedded in the membrane, potentially revealing interesting functional information. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. REVEAL: Software Documentation and Platform Migration

    Science.gov (United States)

    Wilson, Michael A.; Veibell, Victoir T.

    2011-01-01

    The Research Environment for Vehicle Embedded Analysis on Linux (REVEAL) is reconfigurable data acquisition software designed for network-distributed test and measurement applications. In development since 2001, it has been successfully demonstrated in support of a number of actual missions within NASA's Suborbital Science Program. Improvements to software configuration control were needed to properly support both an ongoing transition to operational status and continued evolution of REVEAL capabilities. For this reason the project described in this report targets REVEAL software source documentation and deployment of the software on a small set of hardware platforms different from what is currently used in the baseline system implementation. This presentation specifically describes the actions taken over a ten week period by two undergraduate student interns and serves as an overview of the content of the final report for that internship.

  19. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  20. Key issues regarding digital libraries evaluation and integration

    CERN Document Server

    Shen, Rao; Fox, Edward A

    2013-01-01

    This is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measures. Thus, for digital obj...

  1. Sonic Hedgehog (SHH) pathway in the adult brain: key signaling for astrocyte reactivation and brain repair

    OpenAIRE

    Bermúdez-Muñoz, Olga M

    2016-01-01

    While neurons play a key role in neurotransmission in the nervous central system (CNS) of animals, glial cells are crucial for neuron support and brain maintenance. Recent studies reveal that glial cells regulate the release and reuptake of neurotransmitters, pyruvate and glutathione metabolism, ion buffering, the organization of blood brain barrier and ensures the production of myelin and cerebrospinal fluid. The activity of glial cells is coordinated by the communication between neurons and...

  2. Revealing Bell's nonlocality for unstable systems in high energy physics

    Energy Technology Data Exchange (ETDEWEB)

    Hiesmayr, Beatrix C.; Gabriel, Andreas; Huber, Marcus [University of Vienna, Faculty of Physics, Vienna (Austria); Di Domenico, Antonio [Sapienza Universita di Roma (Italy); INFN Sezione di Roma, Rome (Italy); Curceanu, Catalina [Laboratori Nazionali di Frascati dell' INFN, Frascati (Italy); Larsson, Jan-Aake [Linkoepings Universitet, Institionen foer Systemteknik, Linkoeping (Sweden); Moskal, Pawel [Jagiellonian University, Institute of Physics, Cracow (Poland)

    2012-01-15

    Entanglement and its consequences - in particular the violation of Bell inequalities, which defies our concepts of realism and locality - have been proven to play key roles in Nature by many experiments for various quantum systems. Entanglement can also be found in systems not consisting of ordinary matter and light, i.e. in massive meson-antimeson systems. Bell inequalities have been discussed for these systems, but up to date no direct experimental test to conclusively exclude local realism was found. This mainly stems from the fact that one only has access to a restricted class of observables and that these systems are also decaying. In this Letter we put forward a Bell inequality for unstable systems which can be tested at accelerator facilities with current technology. Herewith, the long awaited proof that such systems at different energy scales can reveal the sophisticated ''dynamical'' nonlocal feature of Nature in a direct experiment gets feasible. Moreover, the role of entanglement and CP violation, an asymmetry between matter and antimatter, is explored, a special feature offered only by these meson-antimeson systems. (orig.)

  3. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  4. Application of Solid-State NMR to Reveal Structural Differences in Cefazolin Sodium Pentahydrate From Different Manufacturing Processes

    Directory of Open Access Journals (Sweden)

    Ye Tian

    2018-04-01

    Full Text Available Solid-state Nuclear magnetic resonance, thermogravimetric analysis, X-ray diffraction, and Fourier-transform infrared spectroscopy were combined with theoretical calculation to investigate different crystal packings of α-cefazolin sodium obtained from three different vendors and conformational polymorphism was identified to exist in α-cefazolin sodium. Marginal differences observed among cefazolin sodium pentahydrate 1, 2, and 3 were speculated as being caused by the proportion of conformation 2.

  5. DEVELOPMENT OF A NEW ALGORITHM FOR KEY AND S-BOX GENERATION IN BLOWFISH ALGORITHM

    Directory of Open Access Journals (Sweden)

    TAYSEER S. ATIA

    2014-08-01

    Full Text Available Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

  6. Practical Implementation of Various Public Key Infrastructure Models

    Directory of Open Access Journals (Sweden)

    Dmitriy Anatolievich Melnikov

    2016-03-01

    Full Text Available The paper proposes a short comparative analysis of the contemporary models of public key infrastructure (PKI and the issues of the PKI models real implementation. The Russian model of PKI is presented. Differences between the North American and West Europe models of PKI and Russian model of PKI are described. The problems of creation and main directions of further development and improvement of the Russian PKI and its integration into the global trust environment are defined.

  7. Going Global: Key Insights from Two Mexican Companies

    OpenAIRE

    Martha RIVERA; Silvia CACHO-ELIZONDO

    2015-01-01

    This paper explores how Mexican companies in different industries have achieved international expansion, while at the same time preserving local elements in executing their strategies. For this initial stage of research, the analysis focuses on two companies: a) Grupo Bimbo, the number one company in the bakery industry worldwide and b) KidZania, one of the world’s top indoor family entertainment centers. The research methodology is based on in-depth interviews with CEOs and key executives fr...

  8. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  9. Achieving organizational alignment - key to survival

    International Nuclear Information System (INIS)

    Allison, J.T.

    1997-01-01

    The restructuring of the gas and electric industry and the impact of the restructuring on organizational survival was discussed. The forces driving the trend to restructuring are commoditization of energy, demanding, fragmented customer needs, diverse, transforming technologies, and intense competition. Realigning a company to the changing marketplace is the key to survival with customers, financial markets, and with competition. This paper presented a reality-based, results oriented approach to strategy consulting. Four case studies - Telco, Natural gas holding company, Combined utility, and Duke/Louis Dreyfus - were used for illustrating different problems and different approaches to restructuring. In each case a comparison was made between the company's old organization in the early 1990's, the driving forces responsible for the change and the company's new organization in the mid 1990's. In all cases the predominance of the customer focus is quite apparent, as is the clear lines of demarcation between regulated and unregulated activities. The underlying theme in all restructuring is agility and striving for flexibility

  10. Revealing the functions of the transketolase enzyme isoforms in Rhodopseudomonas palustris using a systems biology approach.

    Directory of Open Access Journals (Sweden)

    Chia-Wei Hu

    Full Text Available BACKGROUND: Rhodopseudomonas palustris (R. palustris is a purple non-sulfur anoxygenic phototrophic bacterium that belongs to the class of proteobacteria. It is capable of absorbing atmospheric carbon dioxide and converting it to biomass via the process of photosynthesis and the Calvin-Benson-Bassham (CBB cycle. Transketolase is a key enzyme involved in the CBB cycle. Here, we reveal the functions of transketolase isoforms I and II in R. palustris using a systems biology approach. METHODOLOGY/PRINCIPAL FINDINGS: By measuring growth ability, we found that transketolase could enhance the autotrophic growth and biomass production of R. palustris. Microarray and real-time quantitative PCR revealed that transketolase isoforms I and II were involved in different carbon metabolic pathways. In addition, immunogold staining demonstrated that the two transketolase isoforms had different spatial localizations: transketolase I was primarily associated with the intracytoplasmic membrane (ICM but transketolase II was mostly distributed in the cytoplasm. Comparative proteomic analysis and network construction of transketolase over-expression and negative control (NC strains revealed that protein folding, transcriptional regulation, amino acid transport and CBB cycle-associated carbon metabolism were enriched in the transketolase I over-expressed strain. In contrast, ATP synthesis, carbohydrate transport, glycolysis-associated carbon metabolism and CBB cycle-associated carbon metabolism were enriched in the transketolase II over-expressed strain. Furthermore, ATP synthesis assays showed a significant increase in ATP synthesis in the transketolase II over-expressed strain. A PEPCK activity assay showed that PEPCK activity was higher in transketolase over-expressed strains than in the negative control strain. CONCLUSIONS/SIGNIFICANCE: Taken together, our results indicate that the two isoforms of transketolase in R. palustris could affect photoautotrophic growth

  11. Simulating fiction: individual differences in literature comprehension revealed with FMRI.

    Science.gov (United States)

    Nijhof, Annabel D; Willems, Roel M

    2015-01-01

    When we read literary fiction, we are transported to fictional places, and we feel and think along with the characters. Despite the importance of narrative in adult life and during development, the neurocognitive mechanisms underlying fiction comprehension are unclear. We used functional magnetic resonance imaging (fMRI) to investigate how individuals differently employ neural networks important for understanding others' beliefs and intentions (mentalizing), and for sensori-motor simulation while listening to excerpts from literary novels. Localizer tasks were used to localize both the cortical motor network and the mentalizing network in participants after they listened to excerpts from literary novels. Results show that participants who had high activation in anterior medial prefrontal cortex (aMPFC; part of the mentalizing network) when listening to mentalizing content of literary fiction, had lower motor cortex activity when they listened to action-related content of the story, and vice versa. This qualifies how people differ in their engagement with fiction: some people are mostly drawn into a story by mentalizing about the thoughts and beliefs of others, whereas others engage in literature by simulating more concrete events such as actions. This study provides on-line neural evidence for the existence of qualitatively different styles of moving into literary worlds, and adds to a growing body of literature showing the potential to study narrative comprehension with neuroimaging methods.

  12. Variability in the contribution of different life stages to population growth as a key factor in the invasion success of Pinus strobus.

    Directory of Open Access Journals (Sweden)

    Zuzana Münzbergová

    Full Text Available Despite the increasing number of studies attempting to model population growth in various organisms, we still know relatively little about the population dynamics of long-lived species that reproduce only in the later stages of their life cycle, such as trees. Predictions of the dynamics of these species are, however, urgently needed for planning management actions when species are either endangered or invasive. In long-lived species, a single management intervention may have consequences for several decades, and detailed knowledge of long-term performance can therefore elucidate possible outcomes during the management planning phase.We studied the population dynamics of an invasive tree species, Pinus strobus, in three habitat types represented by their position along the elevation gradient occupied by the species. In agreement with previous studies on the population dynamics of long-lived perennials, our results show that the survival of the largest trees exhibits the highest elasticity in all of the studied habitats. In contrast, life table response experiments (LTRE analysis showed that different stages contribute the most to population growth rates in different habitats, with generative reproduction being more important in lower slopes and valley bottoms and survival being more important on rock tops and upper slopes.The results indicate that P. strobus exhibits different growth strategies in different habitats that result in similar population growth rates. We propose that this plasticity in growth strategies is a key factor in the invasion success of the white pine. In all of the investigated habitats, the population growth rates are above 1, indicating that the population of the species is still increasing and has the ability to spread and occupy a wide range of habitats.

  13. Species difference in reactivity to lignin-like enzymatically polymerized polyphenols on interferon-γ synthesis and involvement of interleukin-2 production in mice.

    Science.gov (United States)

    Yamanaka, Daisuke; Ishibashi, Ken-Ichi; Adachi, Yoshiyuki; Ohno, Naohito

    2016-09-01

    Recent studies have revealed that lignin-like polymerized polyphenols can activate innate immune systems. In this study, we aimed to evaluate whether these polymerized polyphenols could activate leukocytes from different murine strains. Splenocytes from 12 mouse strains were investigated. Our results revealed species differences in reactivity to phenolic polymers on interferon-γ (IFN-γ) release. Mice that possessed the H2(a) or H2(k) haplotype antigens were the highly responsive strains. To clarify these different points in soluble factors, multiplex cytokine profiling analysis was carried out and we identified interleukin (IL)-2 as a key molecule for IFN-γ induction by polymerized polyphenols. Furthermore, inhibition of IL-2 and IL-2Rα by neutralizing antibodies significantly decreased cytokine production in the highly responsive mice strains. Our results indicate that species difference in reactivity to phenolic polymers is mediated by adequate release of IL-2 and its receptor, IL-2Rα. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Glycomics meets artificial intelligence - Potential of glycan analysis for identification of seropositive and seronegative rheumatoid arthritis patients revealed.

    Science.gov (United States)

    Chocholova, Erika; Bertok, Tomas; Jane, Eduard; Lorencova, Lenka; Holazova, Alena; Belicka, Ludmila; Belicky, Stefan; Mislovicova, Danica; Vikartovska, Alica; Imrich, Richard; Kasak, Peter; Tkac, Jan

    2018-06-01

    In this study, one hundred serum samples from healthy people and patients with rheumatoid arthritis (RA) were analyzed. Standard immunoassays for detection of 10 different RA markers and analysis of glycan markers on antibodies in 10 different assay formats with several lectins were applied for each serum sample. A dataset containing 2000 data points was data mined using artificial neural networks (ANN). We identified key RA markers, which can discriminate between healthy people and seropositive RA patients (serum containing autoantibodies) with accuracy of 83.3%. Combination of RA markers with glycan analysis provided much better discrimination accuracy of 92.5%. Immunoassays completely failed to identify seronegative RA patients (serum not containing autoantibodies), while glycan analysis correctly identified 43.8% of these patients. Further, we revealed other critical parameters for successful glycan analysis such as type of a sample, format of analysis and orientation of captured antibodies for glycan analysis. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Application of Solid-State NMR to Reveal Structural Differences in Cefazolin Sodium Pentahydrate from Different Manufacturing Processes

    Science.gov (United States)

    Tian, Ye; Wang, Wei D.; Zou, Wen-Bo; Qian, Jian-Qin; Hu, Chang-Qin

    2018-04-01

    The solid form of an active pharmaceutical ingredient is important when developing a new chemical entity. A solid understanding of the crystal structure and morphology that affect the mechanical and physical characteristics of pharmaceutical powders determines the manufacturing process. Solid-state NMR, thermogravimetric analysis, X-ray diffraction, and Fourier-transform infrared spectroscopy were combined with theoretical calculation to investigate different crystal packings of α-cefazolin sodium from three different vendors and conformational polymorphism was identified to exist in the α-cefazolin sodium. Marginal differences observed among CEZ-Na pentahydrate 1, 2, and 3 were speculated as the proportion of conformation 2. Understanding the differences in the polymorphic structure of α-cefazolin sodium may help with making modifications to incorporate new knowledge with a product’s development.

  16. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    Directory of Open Access Journals (Sweden)

    Amy J. Gerc

    2015-09-01

    Full Text Available The Type VI secretion system (T6SS is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches.

  17. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    Science.gov (United States)

    Gerc, Amy J.; Diepold, Andreas; Trunk, Katharina; Porter, Michael; Rickman, Colin; Armitage, Judith P.; Stanley-Wall, Nicola R.; Coulthurst, Sarah J.

    2015-01-01

    Summary The Type VI secretion system (T6SS) is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches. PMID:26387948

  18. Assessment of key transport parameters in a karst system under different dynamic conditions based on tracer experiments: the Jeita karst system, Lebanon

    Science.gov (United States)

    Doummar, Joanna; Margane, Armin; Geyer, Tobias; Sauter, Martin

    2018-03-01

    Artificial tracer experiments were conducted in the mature karst system of Jeita (Lebanon) under various flow conditions using surface and subsurface tracer injection points, to determine the variation of transport parameters (attenuation of peak concentration, velocity, transit times, dispersivity, and proportion of immobile and mobile regions) along fast and slow flow pathways. Tracer breakthrough curves (TBCs) observed at the karst spring were interpreted using a two-region nonequilibrium approach (2RNEM) to account for the skewness in the TBCs' long tailings. The conduit test results revealed a discharge threshold in the system dynamics, beyond which the transport parameters vary significantly. The polynomial relationship between transport velocity and discharge can be related to the variation of the conduit's cross-sectional area. Longitudinal dispersivity in the conduit system is not a constant value (α = 7-10 m) and decreases linearly with increasing flow rate because of dilution effects. Additionally, the proportion of immobile regions (arising from conduit irregularities) increases with decreasing water level in the conduit system. From tracer tests with injection at the surface, longitudinal dispersivity values are found to be large (8-27 m). The tailing observed in some TBCs is generated in the unsaturated zone before the tracer actually arrives at the major subsurface conduit draining the system. This work allows the estimation and prediction of the key transport parameters in karst aquifers. It shows that these parameters vary with time and flow dynamics, and they reflect the geometry of the flow pathway and the origin of infiltrating (potentially contaminated) recharge.

  19. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  20. Patch-reef morphology as a proxy for Holocene sea-level variability, Northern Florida Keys, USA

    Science.gov (United States)

    Brock, J.C.; Palaseanu-Lovejoy, M.; Wright, C.W.; Nayegandhi, A.

    2008-01-01

    A portion of the northern Florida Keys reef tract was mapped with the NASA Experimental Advanced Airborne Research Lidar (EAARL) and the morphology of patch reefs was related to variations in Holocene sea level. Following creation of a lidar digital elevation model (DEM), geospatial analyses delineated morphologic attributes of 1,034 patch reefs (reef depth, basal area, height, volume, and topographic complexity). Morphometric analysis revealed two morphologically different populations of patch reefs associated with two distinct depth intervals above and below a water depth of 7.7 m. Compared to shallow reefs, the deep reefs were smaller in area and volume and showed no trend in topographic complexity relative to water depth. Shallow reefs were more variable in area and volume and became flatter and less topographically complex with decreasing water depth. The knoll-like morphology of deep reefs was interpreted as consistent with steady and relatively rapidly rising early Holocene sea level that restricted the lateral growth of reefs. The morphology of shallow 'pancake-shaped' reefs at the highest platform elevations was interpreted as consistent with fluctuating sea level during the late Holocene. Although the ultimate cause for the morphometric depth trends remains open to interpretation, these interpretations are compatible with a recent eustatic sea-level curve that hindcasts fluctuating late Holocene sea level. Thus it is suggested that the morphologic differences represent two stages of reef accretion that occurred during different sea-level conditions. ?? 2008 Springer-Verlag.

  1. Multilocus Sequence Typing Reveals Relevant Genetic Variation and Different Evolutionary Dynamics among Strains of Xanthomonas arboricola pv. juglandis

    Directory of Open Access Journals (Sweden)

    Marco Scortichini

    2010-11-01

    Full Text Available Forty-five Xanthomonas arboricola pv. juglandis (Xaj strains originating from Juglans regia cultivation in different countries were molecularly typed by means of MultiLocus Sequence Typing (MLST, using acnB, gapA, gyrB and rpoD gene fragments. A total of 2.5 kilobases was used to infer the phylogenetic relationship among the strains and possible recombination events. Haplotype diversity, linkage disequilibrium analysis, selection tests, gene flow estimates and codon adaptation index were also assessed. The dendrograms built by maximum likelihood with concatenated nucleotide and amino acid sequences revealed two major and two minor phylotypes. The same haplotype was found in strains originating from different continents, and different haplotypes were found in strains isolated in the same year from the same location. A recombination breakpoint was detected within the rpoD gene fragment. At the pathovar level, the Xaj populations studied here are clonal and under neutral selection. However, four Xaj strains isolated from walnut fruits with apical necrosis are under diversifying selection, suggesting a possible new adaptation. Gene flow estimates do not support the hypothesis of geographic isolation of the strains, even though the genetic diversity between the strains increases as the geographic distance between them increases. A triplet deletion, causing the absence of valine, was found in the rpoD fragment of all 45 Xaj strains when compared with X. axonopodis pv. citri strain 306. The codon adaptation index was high in all four genes studied, indicating a relevant metabolic activity.

  2. A method that reveals the multi-level ultrametric tree hidden in p -spin-glass-like systems

    International Nuclear Information System (INIS)

    Baviera, R; Virasoro, M A

    2015-01-01

    In the study of disordered models like spin glasses the key object of interest is the rugged energy hypersurface defined in configuration space. The statistical mechanics calculation of the Gibbs–Boltzmann partition function gives the information necessary to understand the equilibrium behavior of the system as a function of the temperature but is not enough if we are interested in the more general aspects of the hypersurface: it does not give us, for instance, the different degrees of ruggedness at different scales. In the context of the replica symmetry breaking (RSB) approach we discuss here a rather simple extension that can provide a much more detailed picture. The attractiveness of the method relies on the fact that it is conceptually transparent and the additional calculations are rather straightforward. We think that this approach reveals an ultrametric organisation with many levels in models like p-spin glasses when we include saddle points. In this first paper we present detailed calculations for the spherical p-spin glass model where we discover that the corresponding decreasing Parisi function q(x) codes this hidden ultrametric organisation. (paper)

  3. Heisenberg Groups as Platform for the AAG key-exchange protocol

    OpenAIRE

    Kahrobaei, Delaram; Lam, Ha T.

    2014-01-01

    Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.

  4. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  5. Possible Different Rifting Mechanisms Between South and North Part of the Fenhe-Weihe Rift Zone Revealed by Shear Velocity Structures

    Science.gov (United States)

    Ai, S.; Zheng, Y.

    2017-12-01

    As an active intraplate continental rift, FWR plays an important role in accommodating the trans-tension in the Trans North China Craton (TNCO). Velocity field derived from GPS measurements reveals that the northern part of FWR is still under extension in N105°E direction at a rate of 4±2 mm/yr [Shen et al., 2000]. Actually, the FWR has been the most seismically active region in NCC. Bouguer gravity profile and seismic sounding lines [Xu and Ma, 1992] revealed a 2-3 km uplift of Moho depth beneath Taiyuan basin and 5-6 km beneath the Southwestern rift zone, those geophysical observations give clues to the un-evenly upwelling of the asthenosphere beneath the rift system and the different rifting process of the FWR. Therefore, studying the extension process of FWR is meaningful to understanding the NCC geodynamics associated with rifting tectonism. Using vertical continuous waveforms recorded during 2014 from CEarray, we construct a reliable and detailed 3-D crustal and uppermost mantle S-wave velocity structure of FWR, using a Bayesian Monte-Carlo method to jointly interpret teleseismic P-wave receiver functions and Rayleigh wave dispersions [Shen et al., 2013]. In the upmost crust, FWR appear as awful low velocity anomaly zone (LVZ), while the Taihang and Lvliang mountain ranges are imaged as strong high velocity anomaly zones(HVZ). In the middle crust, the low velocity zones still keep their LVZ features Additionally, nearly the whole FWR appears as a linearly LVZ line separating Taihang Uplift and Lvliang Uplift, except beneath Shilingguan and Linshi blocks that separate the Xinxian, Taiyuan and Linfen Basins, consisting with the high seismicity there. The velocity of the lower crust beneath Taiyuan and Weihe Basin are relatively higher than the rest rift regions, we interpret them as the limited mafic underplating beneath the TNCO. From the lower crust to upper mantle, the Datong volcanic zone display robust low velocity features, though the lowest velocity

  6. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  7. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  8. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  9. Analysis of Faraday Mirror in Auto-Compensating Quantum Key Distribution

    International Nuclear Information System (INIS)

    Wei Ke-Jin; Ma Hai-Qiang; Li Rui-Xue; Zhu Wu; Liu Hong-Wei; Zhang Yong; Jiao Rong-Zhen

    2015-01-01

    The ‘plug and play’ quantum key distribution system is the most stable and the earliest commercial system in the quantum communication field. Jones matrix and Jones calculus are widely used in the analysis of this system and the improved version, which is called the auto-compensating quantum key distribution system. Unfortunately, existing analysis has two drawbacks: only the auto-compensating process is analyzed and existing systems do not fully consider laser phase affected by a Faraday mirror (FM). In this work, we present a detailed analysis of the output of light pulse transmitting in a plug and play quantum key distribution system that contains only an FM, by Jones calculus. A similar analysis is made to a home-made auto-compensating system which contains two FMs to compensate for environmental effects. More importantly, we show that theoretical and experimental results are different in the plug and play interferometric setup due to the fact that a conventional Jones matrix of FM neglected an additional phase π on alternative polarization direction. To resolve the above problem, we give a new Jones matrix of an FM according to the coordinate rotation. This new Jones matrix not only resolves the above contradiction in the plug and play interferometric setup, but also is suitable for the previous analyses about auto-compensating quantum key distribution. (paper)

  10. Recognition of Bread Key Odorants by Using Polymer Coated QCMs

    Science.gov (United States)

    Nakai, Takashi; Kouno, Shinji; Hiruma, Naoya; Shuzo, Masaki; Delaunay, Jean-Jacques; Yamada, Ichiro

    Polyisobutylene (PIB) polymer and methylphenylsiloxane (25%) diphenylsiloxane (75%) copolymer (OV25) were coated on Quartz Crystal Microbalance (QCM) sensors and used in recognition of bread key odorants. Representative compounds of key roasty odorants of bread were taken as 3-acetylpyridine and benzaldehyde, and representative key fatty odorants were hexanal and (E)-2-nonenal. Both OV25- and PIB-coated QCM fabricated sensors could detect concentration as low as 0.9 ppm of 3-acetylpyridine and 1.2 ppm of (E)-2-nonenal. The sensitivity to 3-acetylpyridine of the OV25-coated QCM was about 1000 times higher than that of ethanol, the major interference compound in bread key odorant analysis. Further, the OV25-coated QCM response was 5-6 times and 2-3 times larger than that of the PIB-coated QCM when exposed to roasty odorants and to fatty odorants, respectively. The difference in sensitivity of the OV25- and PIB-coated QCMs we fabricated made possible to discriminate roasty from fatty odorants as was evidenced by the odor recognition map representing the frequency shifts of the OV25-coated QCM against the frequency shift of the PIB-coated QCM. In conclusion, we found that the combination of an OV25-coated QCM and a PIB-coated QCM was successful in discriminating roasty odorants from fatty odorants at the ppm level.

  11. Key methods for sustaining quality engineering data in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Cook, A [Canatom Ltd., Montreal, PQ (Canada)

    1996-12-31

    This paper discusses key methods for sustaining quality engineering data, the fundamental principles that these methods are based on, and the methods for supporting the performance of nuclear power plants by the provision of quality engineering data at all times. The concept of an `engineering data foundation`, and a Configuration Management data model are developed. The concepts and methods for managing the integrity of engineering data across many different databases and document systems are developed, including the key concepts of data-positions and data-values, Master Data and Copy Data, and the concept of a `partnership between people and technology`. (author). 7 refs., 1 tab., 2 figs.

  12. Key methods for sustaining quality engineering data in nuclear power plants

    International Nuclear Information System (INIS)

    Cook, A.

    1995-01-01

    This paper discusses key methods for sustaining quality engineering data, the fundamental principles that these methods are based on, and the methods for supporting the performance of nuclear power plants by the provision of quality engineering data at all times. The concept of an 'engineering data foundation', and a Configuration Management data model are developed. The concepts and methods for managing the integrity of engineering data across many different databases and document systems are developed, including the key concepts of data-positions and data-values, Master Data and Copy Data, and the concept of a 'partnership between people and technology'. (author). 7 refs., 1 tab., 2 figs

  13. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  14. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. Automatic morphological subtyping reveals new roles of caspases in mitochondrial dynamics.

    Directory of Open Access Journals (Sweden)

    Jyh-Ying Peng

    2011-10-01

    Full Text Available Morphological dynamics of mitochondria is associated with key cellular processes related to aging and neuronal degenerative diseases, but the lack of standard quantification of mitochondrial morphology impedes systematic investigation. This paper presents an automated system for the quantification and classification of mitochondrial morphology. We discovered six morphological subtypes of mitochondria for objective quantification of mitochondrial morphology. These six subtypes are small globules, swollen globules, straight tubules, twisted tubules, branched tubules and loops. The subtyping was derived by applying consensus clustering to a huge collection of more than 200 thousand mitochondrial images extracted from 1422 micrographs of Chinese hamster ovary (CHO cells treated with different drugs, and was validated by evidence of functional similarity reported in the literature. Quantitative statistics of subtype compositions in cells is useful for correlating drug response and mitochondrial dynamics. Combining the quantitative results with our biochemical studies about the effects of squamocin on CHO cells reveals new roles of Caspases in the regulatory mechanisms of mitochondrial dynamics. This system is not only of value to the mitochondrial field, but also applicable to the investigation of other subcellular organelle morphology.

  16. Ectomycorrhizal fungal diversity and community structure associated with cork oak in different landscapes.

    Science.gov (United States)

    Reis, Francisca; Valdiviesso, Teresa; Varela, Carolina; Tavares, Rui M; Baptista, Paula; Lino-Neto, Teresa

    2018-05-01

    Cork oak (Quercus suber L.) forests play an important ecological and economic role. Ectomycorrhizal fungi (ECMF) are key components for the sustainability and functioning of these ecosystems. The community structure and composition of ECMF associated with Q. suber in different landscapes of distinct Mediterranean bioclimate regions have not previously been compared. In this work, soil samples from cork oak forests residing in different bioclimates (arid, semi-arid, sub-humid, and humid) were collected and surveyed for ectomycorrhizal (ECM) root tips. A global analysis performed on 3565 ECM root tips revealed that the ECMF community is highly enriched in Russula, Tomentella, and Cenoccocum, which correspond to the ECMF genera that mainly contribute to community differences. The ECMF communities from the rainiest and the driest cork oak forests were distinct, with soils from the rainiest climates being more heterogeneous than those from the driest climates. The analyses of several abiotic factors on the ECMF communities revealed that bioclimate, precipitation, soil texture, and forest management strongly influenced ECMF structure. Shifts in ECMF with different hyphal exploration types were also detected among forests, with precipitation, forest system, and soil texture being the main drivers controlling their composition. Understanding the effects of environmental factors on the structuring of ECM communities could be the first step for promoting the sustainability of this threatened ecosystem.

  17. Site-Directed Mutagenesis Study Revealed Three Important Residues in Hc-DAF-22, a Key Enzyme Regulating Diapause of Haemonchus contortus

    Directory of Open Access Journals (Sweden)

    Yan Huang

    2017-11-01

    Full Text Available Haemonchus contortus (H. contortus is one of the most important parasites of small ruminants, especially goats and sheep. The complex life cycle of this nematode is a main obstacle for the control and prevention of haemonchosis. So far, a special form of arrested development called diapause different from the dauer stage in Caenorhabditis elegans (C. elegans has been found in many parasitic nematodes. In our previous study, we have characterized a novel gene Hc-daf-22 from H. contortus sharing high homology with Ce-daf-22 and functional analysis showed this gene has similar biological function with Ce-daf-22. In this study, Hc-daf-22 mutants were constructed using site-directed mutagenesis, and carried out rescue experiments, RNA interference (RNAi experiments and in vitro enzyme activity analysis with the mutants to further explore the precise function site of Hc-DAF-22. The results showed that Hc-daf-22 mutants could be expressed in the rescued ok693 worms and the expression positions were mainly in the intestine which was identical with that of Hc-daf-22 rescued worms. Through lipid staining we found that Hc-daf-22 could rescue daf-22 mutant (ok693 from the fatty acid metabolism deficiency while Hc-daf-22 mutants failed. Brood size and body length analyses in rescue experiment along with body length and life span analyses in RNAi experiment elucidated that Hc-daf-22 resembled Ce-daf-22 in effecting the development and capacity of C. elegans and mutants impaired the function of Hc-daf-22. Together with the protease activity assay, this research revealed three important active resides 84C/299H/349H in Hc-DAF-22 by site-directed mutagenesis.

  18. Site-Directed Mutagenesis Study Revealed Three Important Residues in Hc-DAF-22, a Key Enzyme Regulating Diapause of Haemonchus contortus.

    Science.gov (United States)

    Huang, Yan; Zheng, Xiuping; Zhang, Hongli; Ding, Haojie; Guo, Xiaolu; Yang, Yi; Chen, Xueqiu; Zhou, Qianjin; Du, Aifang

    2017-01-01

    Haemonchus contortus ( H. contortus ) is one of the most important parasites of small ruminants, especially goats and sheep. The complex life cycle of this nematode is a main obstacle for the control and prevention of haemonchosis. So far, a special form of arrested development called diapause different from the dauer stage in Caenorhabditis elegans ( C. elegans ) has been found in many parasitic nematodes. In our previous study, we have characterized a novel gene Hc-daf-22 from H. contortus sharing high homology with Ce-daf-22 and functional analysis showed this gene has similar biological function with Ce-daf-22 . In this study, Hc-daf-22 mutants were constructed using site-directed mutagenesis, and carried out rescue experiments, RNA interference (RNAi) experiments and in vitro enzyme activity analysis with the mutants to further explore the precise function site of Hc-DAF-22. The results showed that Hc-daf-22 mutants could be expressed in the rescued ok693 worms and the expression positions were mainly in the intestine which was identical with that of Hc-daf-22 rescued worms. Through lipid staining we found that Hc-daf-22 could rescue daf-22 mutant ( ok693 ) from the fatty acid metabolism deficiency while Hc-daf-22 mutants failed. Brood size and body length analyses in rescue experiment along with body length and life span analyses in RNAi experiment elucidated that Hc-daf-22 resembled Ce-daf-22 in effecting the development and capacity of C. elegans and mutants impaired the function of Hc-daf-22 . Together with the protease activity assay, this research revealed three important active resides 84C/299H/349H in Hc-DAF-22 by site-directed mutagenesis.

  19. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  20. Teachers' Explanations of a Key Developmental Understanding of Multiplicative Reasoning

    Science.gov (United States)

    Rhee, Katherine L.

    2012-01-01

    This qualitative research study explores teachers' understandings of multiplicative reasoning as a key developmental understanding (KDU). A KDU entails knowingly applying the same mathematical concepts within different contexts. A KDU supports an individual to build a connected understanding of mathematics as opposed to only understanding…