WorldWideScience

Sample records for sub-populations identify key

  1. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  2. A free-access online key to identify Amazonian ferns

    Directory of Open Access Journals (Sweden)

    Gabriela Zuquim

    2017-03-01

    Full Text Available There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  3. A free-access online key to identify Amazonian ferns.

    Science.gov (United States)

    Zuquim, Gabriela; Tuomisto, Hanna; Prado, Jefferson

    2017-01-01

    There is urgent need for more data on species distributions in order to improve conservation planning. A crucial but challenging aspect of producing high-quality data is the correct identification of organisms. Traditional printed floras and dichotomous keys are difficult to use for someone not familiar with the technical jargon. In poorly known areas, such as Amazonia, they also become quickly outdated as new species are described or ranges extended. Recently, online tools have allowed developing dynamic, interactive, and accessible keys that make species identification possible for a broader public. In order to facilitate identifying plants collected in field inventories, we developed an internet-based free-access tool to identify Amazonian fern species. We focused on ferns, because they are easy to collect and their edaphic affinities are relatively well known, so they can be used as an indicator group for habitat mapping. Our key includes 302 terrestrial and aquatic entities mainly from lowland Amazonian forests. It is a free-access key, so the user can freely choose which morphological features to use and in which order to assess them. All taxa are richly illustrated, so specimens can be identified by a combination of character choices, visual comparison, and written descriptions. The identification tool was developed in Lucid 3.5 software and it is available at http://keyserver.lucidcentral.org:8080/sandbox/keys.jsp.

  4. Aerokey II: a flexible key for identifying clinical Aeromonas species.

    Science.gov (United States)

    Carnahan, A M; Behram, S; Joseph, S W

    1991-12-01

    A small subset (n = 18) of highly discriminatory tests was derived from the feature frequency of 50 tests used in the study of 167 predominantly clinical Aeromonas strains. Seven of these eighteen tests were used to construct a flexible, dichotomous key, Aerokey II, for identifying clinical aerontonads: esculin hydrolysis, gas from glucose, acid from arabinose, indole production, acid from sucrose, Voges-Proskauer reaction, and resistance to cephalothin (30 micrograms). This schema was initially evaluated in a single-blind trial of 60 well-characterized clinical Aeromonas hydrophila (n = 21), A. caviae (n = 19), and A. veronii bv. sobria (n = 20) strains from an independent laboratory. Of the 60 strains tested, 58 (97%) were accurately identified to the species level. Aerokey II was further evaluated with 18 additional American Type Culture Collection and reference strains representing the more recently proposed taxa A. veronii bv. veronii, A. schubertii, A. jandaei, and A. trota and accurately identified all of these strains.

  5. Identifying the key predictors for retention in critical care nurses.

    Science.gov (United States)

    Sawatzky, Jo-Ann V; Enns, Carol L; Legare, Carol

    2015-10-01

    The aim of this study was to explore the key predictors of retention in nurses working in critical care areas. The shortage of critical care nurses is reaching crisis proportions in Canada and throughout the industrialized world. Identifying the key influencing (i.e. person and organizational) factors and intermediary factors (i.e. job satisfaction, engagement, professional quality of life and caring) that affect intent to leave is central to developing optimal retention strategies for critical care nurses. As part of a larger mixed-methods study, we used a quantitative, cross-sectional research design. A novel framework: the Conceptual Framework for Predicting Nurse Retention was used to guide this study. On-line survey data were collected from on a convenience sample of 188 registered nurses working in critical care areas of hospitals in the province of Manitoba, CANADA in 2011. Twenty-four per cent of the respondents reported that they would probably/definitely leave critical care in the next year. Based on bivariate and regression analyses, the key influencing factors that were significantly related to the intermediary factors and intent to leave critical care and nursing included: professional practice, management, physician/nurse collaboration, nurse competence, control/responsibility and autonomy. Of the intermediary factors, all but compassion satisfaction were related to intent to leave both critical care and nursing. This study highlights the importance of exploring multiple organizational and intermediary factors to determine strategies to retain critical care nurses. The findings also support the Conceptual Framework for Predicting Nurse Retention as a theoretical basis for further research. © 2015 John Wiley & Sons Ltd.

  6. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  7. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  8. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  9. Identifying the Key Concerns of Irish Persons with Intellectual Disability

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-01-01

    Background: Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. Aims: This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in…

  10. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  11. Scholars Identify 5 Keys to Urban School Success

    Science.gov (United States)

    Viadero, Debra

    2010-01-01

    Offering a counter-narrative to the school improvement prescriptions that dominate national education debates, a new book based on 15 years of data on public elementary schools in Chicago identifies five tried-and-true ingredients that work, in combination with one another, to spur success in urban schools. The authors liken their "essential…

  12. Identifying key nodes in multilayer networks based on tensor decomposition

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  13. Identifying Key Concepts and Student Misconceptions Related to the Cryosphere

    Science.gov (United States)

    Ferguson, J. E.

    2016-12-01

    The cryosphere is a vital part of the earth system which is undergoing very rapid change as a result of anthropogenic climate change. Melting ice and thawing permafrost have severe consequences for our society from dwindling freshwater supplies to accelerating sea level rise and climate change. It is therefore important that both geoscience majors and also the broader undergraduate population develop a better understanding of the cryosphere. However, in various locations around the world, students rarely encounter ice and snow in their everyday life and many undergraduate students have misconceptions about how the cryosphere functions. In several scientific fields the creation of concept inventories, including the geoscience concept inventory, has been extremely helpful in allowing instructors to assess student learning and the success of new instructional strategies. This project aims to take the first steps towards creating a cryosphere concept inventory by 1) reporting expert opinions about the key concepts related to the cryosphere, and 2) by examining undergraduate student understanding of the cryosphere using open-ended and multiple choice questions in large ( 350-450 student) general education classes at the University of California, Irvine.

  14. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  15. State-dependent propagation of neuronal sub-population in spontaneous synchronized bursts.

    Directory of Open Access Journals (Sweden)

    Yuichiro eYada

    2016-03-01

    Full Text Available Repeating stable spatiotemporal patterns emerge in synchronized spontaneous activity in neuronal networks. The repertoire of such patterns can serve as memory, or a reservoir of information, in a neuronal network; moreover, the variety of patterns may represent the network memory capacity. However, a neuronal substrate for producing a repertoire of patterns in synchronization remains elusive. We herein hypothesize that state-dependent propagation of a neuronal sub-population is the key mechanism. By combining high-resolution measurement with a 4,096-channel complementary metal-oxide semiconductor microelectrode array and dimensionality reduction with non-negative matrix factorization, we investigated synchronized bursts of dissociated rat cortical neurons at approximately three weeks in vitro. We found that bursts had a repertoire of repeating spatiotemporal patterns, and different patterns shared a partially similar sequence of sub-population, supporting the idea of sequential structure of neuronal sub-populations during synchronized activity. We additionally found that similar spatiotemporal patterns tended to appear successively and periodically, suggesting a state-dependent fluctuation of propagation, which has been overlooked in existing literature. Thus, such a state-dependent property within the sequential sub-population structure is a plausible neural substrate for performing a repertoire of stable patterns during synchronized activity.

  16. Identifying key nodes based on improved structural holes in complex networks

    Science.gov (United States)

    Yu, Hui; Cao, Xi; Liu, Zun; Li, Yongjun

    2017-11-01

    Identifying key nodes in complex networks is of theoretical and practical significance. Local metrics such as degree centrality is simplest but cannot effectively identify the important bridging nodes. Global metrics such as betweenness and closeness centrality can better identify important nodes, but they are often restricted by the unknown topology and cannot be conveniently applied in large-scale networks. In this paper, we propose an effective ranking method based on an Improved Structural Holes (ISH) to identify the important nodes. ISH method only uses the degree of nodes and the nearest neighborhood information rather than considering the global structure of a network. Our experimental results on five complex networks show that the proposed method can effectively identify the key nodes in complex networks and can also be applied in large-scale or unconnected networks.

  17. Identifying key genes in glaucoma based on a benchmarked dataset and the gene regulatory network.

    Science.gov (United States)

    Chen, Xi; Wang, Qiao-Ling; Zhang, Meng-Hui

    2017-10-01

    The current study aimed to identify key genes in glaucoma based on a benchmarked dataset and gene regulatory network (GRN). Local and global noise was added to the gene expression dataset to produce a benchmarked dataset. Differentially-expressed genes (DEGs) between patients with glaucoma and normal controls were identified utilizing the Linear Models for Microarray Data (Limma) package based on benchmarked dataset. A total of 5 GRN inference methods, including Zscore, GeneNet, context likelihood of relatedness (CLR) algorithm, Partial Correlation coefficient with Information Theory (PCIT) and GEne Network Inference with Ensemble of Trees (Genie3) were evaluated using receiver operating characteristic (ROC) and precision and recall (PR) curves. The interference method with the best performance was selected to construct the GRN. Subsequently, topological centrality (degree, closeness and betweenness) was conducted to identify key genes in the GRN of glaucoma. Finally, the key genes were validated by performing reverse transcription-quantitative polymerase chain reaction (RT-qPCR). A total of 176 DEGs were detected from the benchmarked dataset. The ROC and PR curves of the 5 methods were analyzed and it was determined that Genie3 had a clear advantage over the other methods; thus, Genie3 was used to construct the GRN. Following topological centrality analysis, 14 key genes for glaucoma were identified, including IL6, EPHA2 and GSTT1 and 5 of these 14 key genes were validated by RT-qPCR. Therefore, the current study identified 14 key genes in glaucoma, which may be potential biomarkers to use in the diagnosis of glaucoma and aid in identifying the molecular mechanism of this disease.

  18. Quantitative methods of identifying the key nodes in the illegal wildlife trade network.

    Science.gov (United States)

    Patel, Nikkita Gunvant; Rorres, Chris; Joly, Damien O; Brownstein, John S; Boston, Ray; Levy, Michael Z; Smith, Gary

    2015-06-30

    Innovative approaches are needed to combat the illegal trade in wildlife. Here, we used network analysis and a new database, HealthMap Wildlife Trade, to identify the key nodes (countries) that support the illegal wildlife trade. We identified key exporters and importers from the number of shipments a country sent and received and from the number of connections a country had to other countries over a given time period. We used flow betweenness centrality measurements to identify key intermediary countries. We found the set of nodes whose removal from the network would cause the maximum disruption to the network. Selecting six nodes would fragment 89.5% of the network for elephants, 92.3% for rhinoceros, and 98.1% for tigers. We then found sets of nodes that would best disseminate an educational message via direct connections through the network. We would need to select 18 nodes to reach 100% of the elephant trade network, 16 nodes for rhinoceros, and 10 for tigers. Although the choice of locations for interventions should be customized for the animal and the goal of the intervention, China was the most frequently selected country for network fragmentation and information dissemination. Identification of key countries will help strategize illegal wildlife trade interventions.

  19. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L.) from Photographs

    OpenAIRE

    Lloyd, Jane R.; Maldonado, Miguel Á.; Stafford, Richard

    2012-01-01

    Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a) minimise the length of the key, (b) present the most obvious differential characteristics first, and (c) remove the strict dichotomy from key b. Keys were capable of identify...

  20. Identifying Key Factors for Introducing GPS-Based Fleet Management Systems to the Logistics Industry

    Directory of Open Access Journals (Sweden)

    Yi-Chung Hu

    2015-01-01

    Full Text Available The rise of e-commerce and globalization has changed consumption patterns. Different industries have different logistical needs. In meeting needs with different schedules logistics play a key role. Delivering a seamless service becomes a source of competitive advantage for the logistics industry. Global positioning system-based fleet management system technology provides synergy to transport companies and achieves many management goals such as monitoring and tracking commodity distribution, energy saving, safety, and quality. A case company, which is a subsidiary of a very famous food and retail conglomerate and operates the largest shipping line in Taiwan, has suffered from the nonsmooth introduction of GPS-based fleet management systems in recent years. Therefore, this study aims to identify key factors for introducing related systems to the case company. By using DEMATEL and ANP, we can find not only key factors but also causes and effects among key factors. The results showed that support from executives was the most important criterion but it has the worst performance among key factors. It is found that adequate annual budget planning, enhancement of user intention, and collaboration with consultants with high specialty could be helpful to enhance the faith of top executives for successfully introducing the systems to the case company.

  1. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2014-01-01

    Full Text Available The existence of malicious participants is a major threat for authenticated group key exchange (AGKE protocols. Typically, there are two detecting ways (passive and active to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID- based public key system (R-IDPKS was proposed to solve the revocation problem in the ID-based public key system (IDPKS. Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

  2. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  3. Causes of blindness among children identified through village key informants in Malawi.

    Science.gov (United States)

    Kalua, Khumbo; Patel, Daksha; Muhit, Mohammad; Courtright, Paul

    2008-08-01

    To determine the causes of blindness among children in rural Malawi. This was a cross-sectional study of children in communities of Chikwawa district, Malawi. Children were identified through trained, community-based key informants. All identified children were examined by an ophthalmologist and the cause of blindness determined. In total, 151 children were identified, of whom 37 (25%) were blind. Among the blind, 21 (60%) were girls and 16 (40%) were boys. Cataract (congenital/developmental) was the leading cause of blindness (35%), followed by corneal conditions (22%). In an area once noted for vitamin A deficiency in children, cataract is now the leading cause of blindness in children, replacing cornea blindness. Priorities for early cataract detection and intervention need to be considered for restoration of sight in children.

  4. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  5. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Directory of Open Access Journals (Sweden)

    Fenghui Zhu

    Full Text Available Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  7. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  8. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  9. Identification of geographically distributed sub-populations of Leishmania (Leishmania major by microsatellite analysis

    Directory of Open Access Journals (Sweden)

    Schwenkenbecher Jan

    2008-06-01

    Full Text Available Abstract Background Leishmania (Leishmania major, one of the agents causing cutaneous leishmaniasis (CL in humans, is widely distributed in the Old World where different species of wild rodent and phlebotomine sand fly serve as animal reservoir hosts and vectors, respectively. Despite this, strains of L. (L. major isolated from many different sources over many years have proved to be relatively uniform. To investigate the population structure of the species highly polymorphic microsatellite markers were employed for greater discrimination among it's otherwise closely related strains, an approach applied successfully to other species of Leishmania. Results Multilocus Microsatellite Typing (MLMT based on 10 different microsatellite markers was applied to 106 strains of L. (L. major from different regions where it is endemic. On applying a Bayesian model-based approach, three main populations were identified, corresponding to three separate geographical regions: Central Asia (CA; the Middle East (ME; and Africa (AF. This was congruent with phylogenetic reconstructions based on genetic distances. Re-analysis separated each of the populations into two sub-populations. The two African sub-populations did not correlate well with strains' geographical origin. Strains falling into the sub-populations CA and ME did mostly group according to their place of isolation although some anomalies were seen, probably, owing to human migration. Conclusion The model- and distance-based analyses of the microsatellite data exposed three main populations of L. (L. major, Central Asia, the Middle East and Africa, each of which separated into two sub-populations. This probably correlates with the different species of rodent host.

  10. Identifying key metrics for reducing premature departure from the pediatric emergency department.

    Science.gov (United States)

    Cross, Keith P; Gracely, Edward; Stevenson, Michelle D; Woods, Charles R

    2010-11-01

    Approximately 2% to 5% of children presenting to pediatric emergency departments (PEDs) leave prior to a complete evaluation. This study assessed risk factors for premature departure (PD) from a PED to identify key metrics and cutoffs for reducing the PD rate. A 3-year cohort (June 2004-May 2007) of children presenting to a PED was evaluated. Children were excluded if they presented for psychiatric issues, were held awaiting hospital admission in the PED due to a lack of inpatient beds, were more than 21 years old, or died before disposition. Univariate analyses, multivariable logistic regression, and recursive partitioning were used to identify factors associated with PD. A fourth year of data (June 2007-May 2008) was used for validation and sensitivity analysis. There were 132,324 patient visits in the 3-year derivation data set with a 3.8% PD rate, and 45,001 visits in the fourth-year validation data set with a 4.3% PD rate. PDs were minimized when average wait time was below 110 minutes, concurrent PDs were fewer than two, and average length of stay (LOS) was less than 224 minutes in the derivation set, with similar results in the validation set. When these metrics were exceeded, PD rates were over 10% among low-acuity patients. These findings were robust across a broad range of assumptions during sensitivity analysis. The authors identified five key metrics associated with PD in the PED: average wait time, average LOS, acuity, concurrent PDs, and arrival rate. Operational cutoffs for these metrics, determined by recursive partitioning, may be useful to physicians and administrators when selecting specific interventions to address PDs from the PED. © 2010 by the Society for Academic Emergency Medicine.

  11. Identifying Important Plants Areas (Key Biodiversity Areas for Plants in northern Algeria

    Directory of Open Access Journals (Sweden)

    N. Yahi

    2012-08-01

    Full Text Available A study was undertaken in 2010 to identify Important Plant Areas (Key Biodiversity Areas for Plants in the south and east Mediterranean region, in order to prioritise the best sites for plant conservation action. It follows a first work of identification of Important Plant Areas (IPAs initiated for Algeria and relates exclusively to the flora of northern Algeria. These IPAs were delineated in northern Algeria for those sites harbouring a number of “IPA selection species” (threatened species and locally endemic or restricted range. Recent taxonomic revisions estimate the number of national endemics for the north of Algeria (excluding the Sahara to be over 300 taxa. In the present study, data were extracted from the global list of 22 IPAs identified for the north of Algeria. The species considered are i threatened species as defined by the 1997 IUCN global red list of plants, ii locally endemic species, iii nationally threatened species. Trigger species, identified by combining the criteria of endemism and rarity, are mainly Algerian national endemics but also include some Algerian-Moroccan and Algerian-Tunisian endemics. One hundred and fifty two (152 trigger species were identified and these species, which have high ecological value, can be used to characterize the particular floristic interest of a site and can therefore be a useful tool for conservation purposes. Important gaps in knowledge have been highlighted, in particular those relating to taxonomy and the lack of up-to-date field data. It is therefore essential to undertake in situ research in order to better understand the distribution and status of these species. A flexible approach to identifying and recognising priority sites for plants using surrogate criteria, supplemented by expert opinion, alongside existing globally standardised criteria, is therefore essential if the most important sites for plant diversity are to receive the conservation attention they deserve.

  12. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  13. Identifying regional key eco-space to maintain ecological security using GIS.

    Science.gov (United States)

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-02-28

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm(2), accounting for 40% of the region's total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  14. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Science.gov (United States)

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-01-01

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051

  15. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  16. Identifying the key factors that affect the formation of humic substance during different materials composting.

    Science.gov (United States)

    Wu, Junqiu; Zhao, Yue; Qi, Haishi; Zhao, Xinyu; Yang, Tianxue; Du, Yingqiu; Zhang, Hui; Wei, Zimin

    2017-11-01

    The aim of this work was to identify the factors which can affect humic substance (HS) formation. Composting periods, HS precursors, bacteria communities and environment factors were recognized as the key factors and few studies explored the potential relationships among them. During composting, HS precursors were mainly formed in the heating and thermophilic phases, but HS were polymerized in the cooling and mature phases. Moreover, bacterial species showed similar classification of community structure in the same composting period of different materials. Furthermore, structural equation model showed that NH4(-)-N and NO3(-)-N were the indirect environmental factors for regulating HS formation by the bacteria and precursors as the indirect and direct driver, respectively. Therefore, both environmental factors and HS precursors can be the regulating factors to promote HS formation. Given that, a new staging regulating method had been proposed to improve the amount of HS during different materials composting. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Identifying Key Steps for Developing Mobile Applications & Mobile Websites for Libraries

    Directory of Open Access Journals (Sweden)

    Devendra Dilip Potnis

    2016-09-01

    Full Text Available Mobile applications and mobile websites (MAMW represent information systems that are increasingly being developed by libraries to better serve their patrons. Due to a lack of in-house IT skills and the knowledge necessary to develop MAMW, a majority of libraries are forced to rely on external IT professionals, who may or may not help libraries meet patron needs but instead may deplete libraries’ scarce financial resources. This paper applies a system analysis and design perspective to analyze the experience and advice shared by librarians and IT professionals engaged in developing MAMW. This paper identifies key steps and precautions to take while developing MAMW for libraries. It also advises library and information science (LIS graduate programs to equip their students with the specific skills and knowledge needed to develop and implement MAMW.

  18. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  19. Identifying Key Structural Features of IrOx Water Splitting Catalysts.

    Science.gov (United States)

    Willinger, Elena; Massué, Cyriac; Schlögl, Robert; Willinger, Marc Georg

    2017-08-30

    Hydrogen production by electrocatalytic water splitting will play a key role in the realization of a sustainable energy supply. Owing to their relatively high stability and activity, iridium (hydr)oxides have been identified as the most promising catalysts for the oxidation of water. Comprehensive spectroscopic and theoretical studies on the basis of rutile IrO2 have provided insight about the electronic structure of the active X-ray amorphous phase. However, due to the absence of long-range order and missing information about the local arrangement of structural units, our present understanding of the active phase is very unsatisfying. In this work, using a combination of real-space atomic scale imaging with atomic pair distribution function analysis and local measurements of the electronic structure, we identify key structural motifs that are associated with high water splitting activity. Comparison of two X-ray amorphous phases with distinctively different electrocatalytic performance reveals that high activity is linked to the ratio between corner- and edge-sharing IrO6 octahedra. We show that the active and stable phase consists of single unit cell sized hollandite-like structural domains that are cross-linked through undercoordinated oxygen/iridium atoms. In the less active phase, the presence of the rutile phase structural motif results in a faster structural collapse and deactivation. The presented results provide insight into the structure-activity relationship and promote a rational synthesis of X-ray amorphous IrOx hydroxides that contain a favorable arrangement of structural units for improved performance in catalytic water splitting.

  20. Sensitivity analysis to identify key parameters influencing Salmonella infection dynamics in a pig batch.

    Science.gov (United States)

    Lurette, Amandine; Touzeau, Suzanne; Lamboni, Matieyendou; Monod, Hervé

    2009-05-07

    In the context of managed herds, epidemiological models usually take into account relatively complex interactions involving a high number of parameters. Some parameters may be uncertain and/or highly variable, especially epidemiological parameters. Their impact on the model outputs must then be assessed by a sensitivity analysis, allowing to identify key parameters. The prevalence over time is an output of particular interest in epidemiological models, so sensitivity analysis methods adapted to such dynamic output are needed. In this paper, such a sensitivity analysis method, based on a principal component analysis and on analysis of variance, is presented. It allows to compute a generalised sensitivity index for each parameter of a model representing Salmonella spread within a pig batch. The model is a stochastic discrete-time model describing the batch dynamics and movements between rearing rooms, from birth to slaughterhouse delivery. Four health states were introduced: Salmonella-free, seronegative shedder, seropositive shedder and seropositive carrier. The indirect transmission was modelled via an infection probability function depending on the quantity of Salmonella in the rearing room. Simulations were run according to a fractional factorial design enabling the estimation of main effects and two-factor interactions. For each of the 18 epidemiological parameters, four values were chosen, leading to 4096 scenarios. For each scenario, 15 replications were performed, leading to 61440 simulations. The sensitivity analysis was then conducted on the seroprevalence output. The parameters governing the infection probability function and residual room contaminations were identified as key parameters. To control the Salmonella seroprevalence, efficient measures should therefore aim at these parameters. Moreover, the shedding rate and maternal protective factor also had a major impact. Therefore, further investigation on the protective effect of maternal or post

  1. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publi......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed...

  2. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  3. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Huang, Jia

    2017-01-01

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that “accidents/adverse events”, “nosocomial infection”, ‘‘incidents/errors”, “number of operations/procedures” are significant influential indicators. Also, the indicators of “length of stay”, “bed occupancy” and “financial measures” play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions. PMID:28825613

  4. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  5. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  6. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  7. Genome-wide association analyses identify SPOCK as a key novel gene underlying age at menarche.

    Directory of Open Access Journals (Sweden)

    Yao-Zhong Liu

    2009-03-01

    Full Text Available For females, menarche is a most significant physiological event. Age at menarche (AAM is a trait with high genetic determination and is associated with major complex diseases in women. However, specific genes for AAM variation are largely unknown. To identify genetic factors underlying AAM variation, a genome-wide association study (GWAS examining about 380,000 SNPs was conducted in 477 Caucasian women. A follow-up replication study was performed to validate our major GWAS findings using two independent Caucasian cohorts with 854 siblings and 762 unrelated subjects, respectively, and one Chinese cohort of 1,387 unrelated subjects--all females. Our GWAS identified a novel gene, SPOCK (Sparc/Osteonectin, CWCV, and Kazal-like domains proteoglycan, which had seven SNPs associated with AAM with genome-wide false discovery rate (FDR q<0.05. Six most significant SNPs of the gene were selected for validation in three independent replication cohorts. All of the six SNPs were replicated in at least one cohort. In particular, SNPs rs13357391 and rs1859345 were replicated both within and across different ethnic groups in all three cohorts, with p values of 5.09 x 10(-3 and 4.37 x 10(-3, respectively, in the Chinese cohort and combined p values (obtained by Fisher's method of 5.19 x 10(-5 and 1.02 x 10(-4, respectively, in all three replication cohorts. Interestingly, SPOCK can inhibit activation of MMP-2 (matrix metalloproteinase-2, a key factor promoting endometrial menstrual breakdown and onset of menstrual bleeding. Our findings, together with the functional relevance, strongly supported that the SPOCK gene underlies variation of AAM.

  8. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  9. Experimental Infections with Mycoplasma agalactiae Identify Key Factors Involved in Host-Colonization

    Science.gov (United States)

    Baranowski, Eric; Bergonier, Dominique; Sagné, Eveline; Hygonenq, Marie-Claude; Ronsin, Patricia; Berthelot, Xavier; Citti, Christine

    2014-01-01

    Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i) the development of a specific antibody response and (ii) dynamic changes in expression of M. agalactiae surface variable proteins (Vpma), with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs. PMID:24699671

  10. An integrated analysis identifies STAT4 as a key regulator of ovarian cancer metastasis.

    Science.gov (United States)

    Zhao, L; Ji, G; Le, X; Luo, Z; Wang, C; Feng, M; Xu, L; Zhang, Y; Lau, W B; Lau, B; Yang, Y; Lei, L; Yang, H; Xuan, Y; Chen, Y; Deng, X; Yi, T; Yao, S; Zhao, X; Wei, Y; Zhou, S

    2017-06-15

    Epithelial ovarian cancer (EOC) is one of the most common gynecological cancers, with diagnosis often at a late stage. Metastasis is a major cause of death in patients with EOC, but the underlying molecular mechanisms remain obscure. Here, we utilized an integrated approach to find potential key transcription factors involved in ovarian cancer metastasis and identified STAT4 as a critical player in ovarian cancer metastasis. We found that activated STAT4 was overexpressed in epithelial cells of ovarian cancer and STAT4 overexpression was associated with poor outcome of ovarian cancer patients, which promoted metastasis of ovarian cancer in both in vivo and in vitro. Although STAT4 mediated EOC metastasis via inducing epithelial-to-mesenchymal transition (EMT) of ovarian cancer cells in vivo, STAT4 failed to induce EMT directly in vitro, suggesting that STAT4 might mediate EMT process via cancer-stroma interactions. Further functional analysis revealed that STAT4 overexpression induced normal omental fibroblasts and adipose- and bone marrow-derived mesenchymal stem cells to obtain cancer-associated fibroblasts (CAF)-like features via induction of tumor-derived Wnt7a. Reciprocally, increased production of CAF-induced CXCL12, IL6 and VEGFA within tumor microenvironment could enable peritoneal metastasis of ovarian cancer via induction of EMT program. In summary, our study established a model that STAT4 promotes ovarian cancer metastasis via tumor-derived Wnt7a-induced activation of CAFs.

  11. Emergent patterns in interacting neuronal sub-populations

    Science.gov (United States)

    Kamal, Neeraj Kumar; Sinha, Sudeshna

    2015-05-01

    We investigate an ensemble of coupled model neurons, consisting of groups of varying sizes and intrinsic dynamics, ranging from periodic to chaotic, where the inter-group coupling interaction is effectively like a dynamic signal from a different sub-population. We observe that the minority group can significantly influence the majority group. For instance, when a small chaotic group is coupled to a large periodic group, the chaotic group de-synchronizes. However, counter-intuitively, when a small periodic group couples strongly to a large chaotic group, it leads to complete synchronization in the majority chaotic population, which also spikes at the frequency of the small periodic group. It then appears that the small group of periodic neurons can act like a pacemaker for the whole network. Further, we report the existence of varied clustering patterns, ranging from sets of synchronized clusters to anti-phase clusters, governed by the interplay of the relative sizes and dynamics of the sub-populations. So these results have relevance in understanding how a group can influence the synchrony of another group of dynamically different elements, reminiscent of event-related synchronization/de-synchronization in complex networks.

  12. Emergence of bursting activity in connected neuronal sub-populations.

    Directory of Open Access Journals (Sweden)

    Marta Bisio

    Full Text Available Uniform and modular primary hippocampal cultures from embryonic rats were grown on commercially available micro-electrode arrays to investigate network activity with respect to development and integration of different neuronal populations. Modular networks consisting of two confined active and inter-connected sub-populations of neurons were realized by means of bi-compartmental polydimethylsiloxane structures. Spontaneous activity in both uniform and modular cultures was periodically monitored, from three up to eight weeks after plating. Compared to uniform cultures and despite lower cellular density, modular networks interestingly showed higher firing rates at earlier developmental stages, and network-wide firing and bursting statistics were less variable over time. Although globally less correlated than uniform cultures, modular networks exhibited also higher intra-cluster than inter-cluster correlations, thus demonstrating that segregation and integration of activity coexisted in this simple yet powerful in vitro model. Finally, the peculiar synchronized bursting activity shown by confined modular networks preferentially propagated within one of the two compartments ('dominant', even in cases of perfect balance of firing rate between the two sub-populations. This dominance was generally maintained during the entire monitored developmental frame, thus suggesting that the implementation of this hierarchy arose from early network development.

  13. Phagocytic amoebocyte sub populations in the perivisceral coelom of the sea urchin Lytechinus variegatus (Lamarck, 1816).

    Science.gov (United States)

    Borges, João Carlos Shimada; Jensch-Junior, Bernard Ernesto; Garrido, Paula Amaral Gurgel; Mangiaterra, Maria Bárbara Baptista Cepellos Daruiz; Silva, José Roberto Machado Cunha

    2005-03-01

    The echinoderms are deuterostomic animals with a nonspecific immune system similar to that of vertebrates. Among coelomocytes, phagocytic amoebocytes have a key role in the nonspecific immune response in sea urchin, being responsible for microorganisms elimination through phagocytosis and also for humoral secretions of a wide spectrum. Sub-populations of phagocytic amoebocytes (PA) have been previously described and two distinct sub populations in the oral (OR) and aboral (AB) regions of the perivisceral coelom of L.variegatus in the present study were found. In the OR there is a higher number of PA with higher phagocytic capacity after 30 minutes of incubation with yeast and higher percentage of intranuclear iron crystalloids. The germicide capacity under the fluorescence technique did not show any difference. SDS-PAGE analysis showed different protein patterns between coelomocytes of OR and AB. Gravitational force had no effect in PA distribution and no physical barrier was found in the perivisceral coelom. The other coelomocyte (vibratile cells, red spherulocytes and white spherulocytes) populations were not different in OR compared with AB in their distribution. Some aspects of the possible causes of the differences found for PA are discussed in the paper.

  14. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  15. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Linton, Debra L.; Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between…

  16. Identification of a sub-population of B cells that proliferates after infection with epstein-barr virus

    Directory of Open Access Journals (Sweden)

    Ye Jianjiang

    2011-02-01

    Full Text Available Abstract Background Epstein-Barr virus (EBV-driven B cell proliferation is critical to its subsequent persistence in the host and is a key event in the development of EBV-associated B cell diseases. Thus, inquiry into early cellular events that precede EBV-driven proliferation of B cells is essential for understanding the processes that can lead to EBV-associated B cell diseases. Methods Infection with high titers of EBV of mixed, primary B cells in different stages of differentiation occurs during primary EBV infection and in the setting of T cell-immunocompromise that predisposes to development of EBV-lymphoproliferative diseases. Using an ex vivo system that recapitulates these conditions of infection, we correlated expression of selected B cell-surface markers and intracellular cytokines with expression of EBV latency genes and cell proliferation. Results We identified CD23, CD58, and IL6, as molecules expressed at early times after EBV-infection. EBV differentially infected B cells into two distinct sub-populations of latently infected CD23+ cells: one fraction, marked as CD23hiCD58+IL6- by day 3, subsequently proliferated; another fraction, marked as CD23loCD58+, expressed IL6, a B cell growth factor, but failed to proliferate. High levels of LMP1, a critical viral oncoprotein, were expressed in individual CD23hiCD58+ and CD23loCD58+ cells, demonstrating that reduced levels of LMP1 did not explain the lack of proliferation of CD23loCD58+ cells. Differentiation stage of B cells did not appear to govern this dichotomy in outcome either. Memory or naïve B cells did not exclusively give rise to either CD23hi or IL6-expressing cells; rather memory B cells gave rise to both sub-populations of cells. Conclusions B cells are differentially susceptible to EBV-mediated proliferation despite expression of viral gene products known to be critical for continuous B cell growth. Cellular events, in addition to viral gene expression, likely play a

  17. Identifying Key Topics for the Description of Sexual Behavior in the Danish Population: A Qualitative Study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson

    abuse and internet dating to be triggers of unsafe sex. Conclusion According to Danish adolescents there were four important key topics which could lead to unsafe sex and these points differed slightly from our expectations. Those points of interest will be included in a sexual behavior questionnaire...... and often lead to unsafe sex. 3) Low self-esteem increases the risk of ignoring crossing of one’s personal boundaries and thereby resulting in promiscuous sexual behavior. 4) Increased sexual experience was found to be associated with lack of condom use. Surprisingly, the informants did not consider drug...

  18. A key for identifying faecal smears to detect domestic infestations of triatomine bugs

    Directory of Open Access Journals (Sweden)

    C.J. Schofield

    1986-03-01

    Full Text Available Early detection of residual populations of domestic triatomine bugs that survive insecticide treatment is a key component of successful evaluation and vigilance for Chagas disease control. We have recently demonstrated that sheets of paper, tacked on to the walls of infested houses, can become streaked with the faeces of triatomine bugs and thus reveal thepresence of an infestation. In thispaper, wepresent a simple key to differentiate the faecal streaks of triatomine bugs from those of other domestic arthropods such as cockroaches, ticks and cimicid bedbugs.Determinar as populações de barbeiros residuais nas casas depois de borrifação com inseticidas é um componente importante na vigilância e evolução do controle dos vetores da doença de Chagas. Recentemente, mostramos que folhas de papel, afixadas na parede das casas infestadas, podem ser manchadas com fezes dos triatomineos, assim revelando a infestação. Neste trabalho, apresentamos uma chave simples para diferenciar as fezes dos triatomineos de outros artropodos, como baratas, carrapatos e percevejos de cama.

  19. Identifying key topics for a description of sexual behavior among Danish adolescents: A qualitative study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson; Maindal, Helle Terkildsen; Olesen, Frede

    . Results: Four major categories of risk behavior were identified: Alcohol consumption is associated with “no condom use”, Nights on the town and meetings in foreign counties or at festivals are associated with one night stands and often lead to unsafe sex, Low self-esteem increases the risk of pushing one......Background: Surveying sexual behavior in the general population serves to identify critical points, monitor the effects, and interpret changes in the spread of sexually transmitted infection. Aim: The aim of this qualitative study was to identify points of particular importance to adolescents......’ sexual behavior in order to initiate and design a behavior surveillance programme in Denmark. Methods: We conducted four semi-structured focus group interviews with a total of 19 sexually experienced adolescents aged 18 to 23. Boys and girls were interviewed separately. Each group contained pupils from...

  20. Complementary RNA and Protein Profiling Identifies Iron as a Key Regulator of Mitochondrial Biogenesis

    Directory of Open Access Journals (Sweden)

    Jarred W. Rensvold

    2013-01-01

    Full Text Available Mitochondria are centers of metabolism and signaling whose content and function must adapt to changing cellular environments. The biological signals that initiate mitochondrial restructuring and the cellular processes that drive this adaptive response are largely obscure. To better define these systems, we performed matched quantitative genomic and proteomic analyses of mouse muscle cells as they performed mitochondrial biogenesis. We find that proteins involved in cellular iron homeostasis are highly coordinated with this process and that depletion of cellular iron results in a rapid, dose-dependent decrease of select mitochondrial protein levels and oxidative capacity. We further show that this process is universal across a broad range of cell types and fully reversed when iron is reintroduced. Collectively, our work reveals that cellular iron is a key regulator of mitochondrial biogenesis, and provides quantitative data sets that can be leveraged to explore posttranscriptional and posttranslational processes that are essential for mitochondrial adaptation.

  1. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  2. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  3. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  4. Identifying Key Priorities for Future Palliative Care Research Using an Innovative Analytic Approach

    Science.gov (United States)

    Pillemer, Karl; Chen, Emily K.; Warmington, Marcus; Adelman, Ronald D.; Reid, M. C.

    2015-01-01

    Using an innovative approach, we identified research priorities in palliative care to guide future research initiatives. We searched 7 databases (2005–2012) for review articles published on the topics of palliative and hospice–end-of-life care. The identified research recommendations (n = 648) fell into 2 distinct categories: (1) ways to improve methodological approaches and (2) specific topic areas in need of future study. The most commonly cited priority within the theme of methodological approaches was the need for enhanced rigor. Specific topics in need of future study included perspectives and needs of patients, relatives, and providers; underrepresented populations; decision-making; cost-effectiveness; provider education; spirituality; service use; and interdisciplinary approaches to delivering palliative care. This review underscores the need for additional research on specific topics and methodologically rigorous research to inform health policy and practice. PMID:25393169

  5. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p vs, 4.0, P < 0.001). We found no difference in faculty scores. The following areas were identified as most needing improvement: clearly state learning objectives, tie conclusions to learning objectives, and use appropriate amount of words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  6. A Systems Approach Identifies Essential FOXO3 Functions at Key Steps of Terminal Erythropoiesis.

    Directory of Open Access Journals (Sweden)

    Raymond Liang

    2015-10-01

    Full Text Available Circulating red blood cells (RBCs are essential for tissue oxygenation and homeostasis. Defective terminal erythropoiesis contributes to decreased generation of RBCs in many disorders. Specifically, ineffective nuclear expulsion (enucleation during terminal maturation is an obstacle to therapeutic RBC production in vitro. To obtain mechanistic insights into terminal erythropoiesis we focused on FOXO3, a transcription factor implicated in erythroid disorders. Using an integrated computational and experimental systems biology approach, we show that FOXO3 is essential for the correct temporal gene expression during terminal erythropoiesis. We demonstrate that the FOXO3-dependent genetic network has critical physiological functions at key steps of terminal erythropoiesis including enucleation and mitochondrial clearance processes. FOXO3 loss deregulated transcription of genes implicated in cell polarity, nucleosome assembly and DNA packaging-related processes and compromised erythroid enucleation. Using high-resolution confocal microscopy and imaging flow cytometry we show that cell polarization is impaired leading to multilobulated Foxo3-/- erythroblasts defective in nuclear expulsion. Ectopic FOXO3 expression rescued Foxo3-/- erythroblast enucleation-related gene transcription, enucleation defects and terminal maturation. Remarkably, FOXO3 ectopic expression increased wild type erythroblast maturation and enucleation suggesting that enhancing FOXO3 activity may improve RBCs production. Altogether these studies uncover FOXO3 as a novel regulator of erythroblast enucleation and terminal maturation suggesting FOXO3 modulation might be therapeutic in disorders with defective erythroid maturation.

  7. Defining hybrid poplar (Populus deltoides x Populus trichocarpa) tolerance to ozone: identifying key parameters.

    Science.gov (United States)

    Ryan, A; Cojocariu, C; Possell, M; Davies, W J; Hewitt, C N

    2009-01-01

    This study examined whether two genotypes of hybrid poplar (Populus deltoides x Populus trichocarpa), previously classified as ozone tolerant and ozone sensitive, had differing physiological and biochemical responses when fumigated with 120 nL L(-1) ozone for 6 h per day for eight consecutive days. Isoprene emission rate, ozone uptake and a number of physiological and biochemical parameters were investigated before, during and after fumigation with ozone. Previous studies have shown that isoprene protects plants against oxidative stress. Therefore, it was hypothesized that these two genotypes would differ in either their basal isoprene emission rates or in the response of isoprene to fumigation by ozone. Our results showed that the basal emission rates of isoprene, physiological responses and ozone uptake rates were all similar. However, significant differences were found in visible damage, carotenoids, hydrogen peroxide (H(2)O(2)), thiobarbituric acid reactions (TBARS) and post-fumigation isoprene emission rates. It is shown that, although the classification of ozone tolerance or sensitivity had been previously clearly and carefully defined using one particular set of parameters, assessment of other key variables does not necessarily lead to the same conclusions. Thus, it may be necessary to reconsider the way in which plants are classified as ozone tolerant or sensitive.

  8. Genomic Landscape Survey Identifies SRSF1 as a Key Oncodriver in Small Cell Lung Cancer.

    Directory of Open Access Journals (Sweden)

    Liyan Jiang

    2016-04-01

    Full Text Available Small cell lung cancer (SCLC is an aggressive disease with poor survival. A few sequencing studies performed on limited number of samples have revealed potential disease-driving genes in SCLC, however, much still remains unknown, particularly in the Asian patient population. Here we conducted whole exome sequencing (WES and transcriptomic sequencing of primary tumors from 99 Chinese SCLC patients. Dysregulation of tumor suppressor genes TP53 and RB1 was observed in 82% and 62% of SCLC patients, respectively, and more than half of the SCLC patients (62% harbored TP53 and RB1 mutation and/or copy number loss. Additionally, Serine/Arginine Splicing Factor 1 (SRSF1 DNA copy number gain and mRNA over-expression was strongly associated with poor survival using both discovery and validation patient cohorts. Functional studies in vitro and in vivo demonstrate that SRSF1 is important for tumorigenicity of SCLC and may play a key role in DNA repair and chemo-sensitivity. These results strongly support SRSF1 as a prognostic biomarker in SCLC and provide a rationale for personalized therapy in SCLC.

  9. RNA-Seq Identifies Key Reproductive Gene Expression Alterations in Response to Cadmium Exposure

    Directory of Open Access Journals (Sweden)

    Hanyang Hu

    2014-01-01

    Full Text Available Cadmium is a common toxicant that is detrimental to many tissues. Although a number of transcriptional signatures have been revealed in different tissues after cadmium treatment, the genes involved in the cadmium caused male reproductive toxicity, and the underlying molecular mechanism remains unclear. Here we observed that the mice treated with different amount of cadmium in their rodent chow for six months exhibited reduced serum testosterone. We then performed RNA-seq to comprehensively investigate the mice testicular transcriptome to further elucidate the mechanism. Our results showed that hundreds of genes expression altered significantly in response to cadmium treatment. In particular, we found several transcriptional signatures closely related to the biological processes of regulation of hormone, gamete generation, and sexual reproduction, respectively. The expression of several testosterone synthetic key enzyme genes, such as Star, Cyp11a1, and Cyp17a1, were inhibited by the cadmium exposure. For better understanding of the cadmium-mediated transcriptional regulatory mechanism of the genes, we computationally analyzed the transcription factors binding sites and the mircoRNAs targets of the differentially expressed genes. Our findings suggest that the reproductive toxicity by cadmium exposure is implicated in multiple layers of deregulation of several biological processes and transcriptional regulation in mice.

  10. RNA-Seq Identifies Key Reproductive Gene Expression Alterations in Response to Cadmium Exposure

    Science.gov (United States)

    Hu, Hanyang; Lu, Xing; Cen, Xiang; Chen, Xiaohua; Li, Feng; Zhong, Shan

    2014-01-01

    Cadmium is a common toxicant that is detrimental to many tissues. Although a number of transcriptional signatures have been revealed in different tissues after cadmium treatment, the genes involved in the cadmium caused male reproductive toxicity, and the underlying molecular mechanism remains unclear. Here we observed that the mice treated with different amount of cadmium in their rodent chow for six months exhibited reduced serum testosterone. We then performed RNA-seq to comprehensively investigate the mice testicular transcriptome to further elucidate the mechanism. Our results showed that hundreds of genes expression altered significantly in response to cadmium treatment. In particular, we found several transcriptional signatures closely related to the biological processes of regulation of hormone, gamete generation, and sexual reproduction, respectively. The expression of several testosterone synthetic key enzyme genes, such as Star, Cyp11a1, and Cyp17a1, were inhibited by the cadmium exposure. For better understanding of the cadmium-mediated transcriptional regulatory mechanism of the genes, we computationally analyzed the transcription factors binding sites and the mircoRNAs targets of the differentially expressed genes. Our findings suggest that the reproductive toxicity by cadmium exposure is implicated in multiple layers of deregulation of several biological processes and transcriptional regulation in mice. PMID:24982889

  11. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  12. Genome-wide association study of classical Hodgkin lymphoma identifies key regulators of disease susceptibility

    DEFF Research Database (Denmark)

    Sud, Amit; Thomsen, Hauke; Law, Philip J.

    2017-01-01

    ,749 controls. We identify risk loci for all classical Hodgkin lymphoma at 6q22.33 (rs9482849, P = 1.52 × 10-8) and for nodular sclerosis Hodgkin lymphoma at 3q28 (rs4459895, P = 9.43 × 10-17), 6q23.3 (rs6928977, P = 4.62 × 10-11), 10p14 (rs3781093, P = 9.49 × 10-13), 13q34 (rs112998813, P = 4.58 × 10-8) and 16...

  13. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  14. Identifying Key Proteins in Hg Methylation Pathways of Desulfovibrio by Global Proteomics, Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Summers, Anne O. [Univ. of Georgia, Athens, GA (United States). Dept. of Microbiology; Miller, Susan M. [Univ. of California, San Francisco, CA (United States). Dept. of Pharmaceutical Chemistry; Wall, Judy [Univ. of Missouri, Columbia, MO (United States). Dept. of Biochemistry; Lipton, Mary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-06-18

    Elemental mercury, Hg(0) is a contaminant at many DOE sites, especially at Oak Ridge National Laboratory (ORNL) where the spread of spilled Hg and its effects on microbial populations have been monitored for decades. To explore the microbial interactions with Hg, we have devised a global proteomic approach capable of directly detecting Hg-adducts of proteins. This technique developed in the facultative anaerobe, Escherichia coli, allows us to identify the proteins most vulnerable to acute exposure to organomercurials phenyl- and ethyl-mercury (as surrogates for the highly neurotoxic methyl-Hg) (Polacco, et al, 2011). We have found >300 such proteins in all metabolic functional groups and cellular compartments; most are highly conserved and can serve as markers for acute Hg exposure (Zink, et al. 2016, in preparation). We have also discovered that acute Hg exposure severely disrupts thiol, iron and redox homeostases, and electrolyte balance (LaVoie, et al., 2015) Thus, we proposed to bring these techniques to bear on the central problem of identifying the cellular proteins involved in bacterial uptake and methylation of mercury and its release from the cell.

  15. Urinary metabolomics analysis identifies key biomarkers of different stages of nonalcoholic fatty liver disease

    Science.gov (United States)

    Dong, Shu; Zhan, Zong-Ying; Cao, Hong-Yan; Wu, Chao; Bian, Yan-Qin; Li, Jian-Yuan; Cheng, Gen-Hong; Liu, Ping; Sun, Ming-Yu

    2017-01-01

    AIM To identify a panel of biomarkers that can distinguish between non-alcoholic fatty liver disease (NAFLD) and non-alcoholic steatohepatitis (NASH), and explore molecular mechanism involved in the process of developing NASH from NAFLD. METHODS Biomarkers may differ during stages of NAFLD. Urine and blood were obtained from non-diabetic subjects with NAFLD and steatosis, with normal liver function (n = 33), from patients with NASH, with abnormal liver function (n = 45), and from healthy age and sex-matched controls (n = 30). Samples were subjected to metabolomic analysis to identify potential non-invasive biomarkers. Differences in urinary metabolic profiles were analyzed using liquid chromatography tandem mass spectrometry with principal component analysis and partial least squares-discriminate analysis. RESULTS Compared with NAFLD patients, patients with NASH had abnormal liver function and high serum lipid concentrations. Urinary metabonomics found differences in 31 metabolites between these two groups, including differences in nucleic acids and amino acids. Pathway analysis based on overlapping metabolites showed that pathways of energy and amino acid metabolism, as well as the pentose phosphate pathway, were closely associated with pathological processes in NAFLD and NASH. CONCLUSION These findings suggested that a panel of biomarkers could distinguish between NAFLD and NASH, and could help to determine the molecular mechanism involved in the process of developing NASH from NAFLD. Urinary biomarkers may be diagnostic in these patients and could be used to assess responses to therapeutic interventions. PMID:28487615

  16. Identifying keys to success in clinical learning: a study of two interprofessional learning environments.

    Science.gov (United States)

    Laksov, Klara Bolander; Boman, Lena Engqvist; Liljedahl, Matilda; Björck, Erik

    2015-03-01

    The aim of this study was to study the intrinsic system behind interprofessional clinical learning environments. Two health care units were selected on the basis of having received a reward for best clinical learning organization. Interviews were carried out with health care staff/clinical supervisors from different professions. The interviews were transcribed and analysed according to qualitative content analysis, and categories and themes were identified. Analysis revealed two different systems of clinical learning environments. In one, the interplay between the structural aspects dominated, and in the other, the interplay between the cultural aspects dominated. An important similarity between the environments was that a defined role for students in the organization and interprofessional teamwork around supervision across professional borders was emphasized.

  17. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  18. Pan-genomic analyses identify key Helicobacter pylori pathogenic loci modified by carcinogenic host microenvironments.

    Science.gov (United States)

    Noto, Jennifer M; Chopra, Abha; Loh, John T; Romero-Gallo, Judith; Piazuelo, M Blanca; Watson, Mark; Leary, Shay; Beckett, Amber C; Wilson, Keith T; Cover, Timothy L; Mallal, Simon; Israel, Dawn A; Peek, Richard M

    2017-09-18

    Helicobacter pylori is the strongest risk factor for gastric cancer; however, the majority of infected individuals do not develop disease. Pathological outcomes are mediated by complex interactions among bacterial, host and environmental constituents, and two dietary factors linked with gastric cancer risk are iron deficiency and high salt. We hypothesised that prolonged adaptation of H. pylori to in vivo carcinogenic microenvironments results in genetic modification important for disease. Whole genome sequencing of genetically related H. pylori strains that differ in virulence and targeted H. pylori sequencing following prolonged exposure of bacteria to in vitro carcinogenic conditions were performed. A total of 180 unique single nucleotide polymorphisms (SNPs) were identified among the collective genomes when compared with a reference H. pylori genome. Importantly, common SNPs were identified in isolates harvested from iron-depleted and high salt carcinogenic microenvironments, including an SNP within fur (FurR88H). To investigate the direct role of low iron and/or high salt, H. pylori was continuously cultured in vitro under low iron or high salt conditions to assess fur genetic variation. Exposure to low iron or high salt selected for the FurR88H variant after only 5 days. To extend these results, fur was sequenced in 339 clinical H. pylori strains. Among the isolates examined, 17% (40/232) of strains isolated from patients with premalignant lesions harboured the FurR88H variant, compared with only 6% (6/107) of strains from patients with non-atrophic gastritis alone (p=0.0034). These results indicate that specific genetic variation arises within H. pylori strains during in vivo adaptation to conditions conducive for gastric carcinogenesis. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    Energy Technology Data Exchange (ETDEWEB)

    Brinkmann, Markus; Eichbaum, Kathrin [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Kammann, Ulrike [Thünen-Institute of Fisheries Ecology, Palmaille 9, 22767 Hamburg (Germany); Hudjetz, Sebastian [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Cofalla, Catrina [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Buchinger, Sebastian; Reifferscheid, Georg [Federal Institute of Hydrology (BFG), Department G3: Biochemistry, Ecotoxicology, Am Mainzer Tor 1, 56068 Koblenz (Germany); Schüttrumpf, Holger [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Preuss, Thomas [Department of Environmental Biology and Chemodynamics, Institute for Environmental Research,ABBt- Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); and others

    2014-07-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios.

  20. Pharmacy patronage: identifying key factors in the decision making process using the determinant attribute approach.

    Science.gov (United States)

    Franic, Duska M; Haddock, Sarah M; Tucker, Leslie Tootle; Wooten, Nathan

    2008-01-01

    To use the determinant attribute approach, a research method commonly used in marketing to identify the wants of various consumer groups, to evaluate consumer pharmacy choice when having a prescription order filled in different pharmacy settings. Cross sectional. Community independent, grocery store, community chain, and discount store pharmacies in Georgia between April 2005 and April 2006. Convenience sample of adult pharmacy consumers (n = 175). Survey measuring consumer preferences on 26 attributes encompassing general pharmacy site features (16 items), pharmacist characteristics (5 items), and pharmacy staff characteristics (5 items). 26 potential determinant attributes for pharmacy selection. 175 consumers were surveyed at community independent (n = 81), grocery store (n = 44), community chain (n = 27), or discount store (n = 23) pharmacy settings. The attributes of pharmacists and staff at all four pharmacy settings were shown to affect pharmacy patronage motives, although consumers frequenting non-community independent pharmacies were also motivated by secondary convenience factors, e.g., hours of operation, and prescription coverage. Most consumers do not perceive pharmacies as merely prescription-distribution centers that vary only by convenience. Prescriptions are not just another economic good. Pharmacy personnel influence pharmacy selection; therefore, optimal staff selection and training is likely the greatest asset and most important investment for ensuring pharmacy success.

  1. Identifying Key Factors in Homeowner's Adoption of Water Quality Best Management Practices

    Science.gov (United States)

    Brehm, Joan M.; Pasko, Danielle K.; Eisenhauer, Brian W.

    2013-07-01

    The recognition of the significance of the residential environment in contributing to non-point source (NPS) pollution and the inherently dispersed nature of NPS pollution itself that presents significant challenges to effective regulation has led to the creation and dissemination of best management practices (BMPs) that can reduce the impacts of NPS pollution (Environmental Protection Agency US, Protecting water quality from urban runoff, http://www.epa.gov/npdes/pubs/nps_urban-facts_final.pdf, 2003). However, very few studies have examined the factors that influence the adoption of BMPs by residential homeowners, despite the fact that residential environments have been identified as one of the most significant contributors to NPS pollution. Given this need, the purpose of this project was to explore how demographic and knowledge-based factors predict adoption of residential BMPs in an urbanizing watershed in Northern Illinois using statistical analyses of survey data collected as part of a watershed planning process. The findings indicate that broad knowledge of BMPs is the strongest predictor of use for a specific BMP. Knowledge of BMPs is strongly correlated with their use, which reinforces the need for educational programs, even among those assumed to be knowledgeable about BMPs.

  2. An evidence-based knowledgebase of metastasis suppressors to identify key pathways relevant to cancer metastasis.

    Science.gov (United States)

    Zhao, Min; Li, Zhe; Qu, Hong

    2015-10-21

    Metastasis suppressor genes (MS genes) are genes that play important roles in inhibiting the process of cancer metastasis without preventing growth of the primary tumor. Identification of these genes and understanding their functions are critical for investigation of cancer metastasis. Recent studies on cancer metastasis have identified many new susceptibility MS genes. However, the comprehensive illustration of diverse cellular processes regulated by metastasis suppressors during the metastasis cascade is lacking. Thus, the relationship between MS genes and cancer risk is still unclear. To unveil the cellular complexity of MS genes, we have constructed MSGene (http://MSGene.bioinfo-minzhao.org/), the first literature-based gene resource for exploring human MS genes. In total, we manually curated 194 experimentally verified MS genes and mapped to 1448 homologous genes from 17 model species. Follow-up functional analyses associated 194 human MS genes with epithelium/tissue morphogenesis and epithelia cell proliferation. In addition, pathway analysis highlights the prominent role of MS genes in activation of platelets and coagulation system in tumor metastatic cascade. Moreover, global mutation pattern of MS genes across multiple cancers may reveal common cancer metastasis mechanisms. All these results illustrate the importance of MSGene to our understanding on cell development and cancer metastasis.

  3. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Directory of Open Access Journals (Sweden)

    Nora Adriana Hernández-Cuevas

    Full Text Available Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron, low-iron medium (around 123 µM iron, iron-deficient medium (around 91 µM iron, and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  4. Gene Expression Profiling in Entamoeba histolytica Identifies Key Components in Iron Uptake and Metabolism

    Science.gov (United States)

    Hernández-Cuevas, Nora Adriana; Weber, Christian; Hon, Chung-Chau; Guillen, Nancy

    2014-01-01

    Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron), low-iron medium (around 123 µM iron), iron-deficient medium (around 91 µM iron), and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters) and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite. PMID:25210888

  5. Using the Delphi Technique to Identify Key Elements for Effective and Sustainable Visitor Use Planning Frameworks

    Directory of Open Access Journals (Sweden)

    Jessica P. Fefer

    2016-04-01

    Full Text Available Protected areas around the world receive nearly 800 billion visits/year, with international tourism continuing to increase. While protected areas provide necessary benefits to communities and visitors, the increased visitation may negatively impact the resource and the recreational experience, hence the need to manage visitor use in protected areas around the world. This research focused on obtaining information from experts to document their experiences utilizing one visitor use planning framework: Visitor Experience and Resource Protection (VERP. Using the Delphi Technique, 31 experts from seven regions around the world were asked to identify elements necessary for effective visitor management, as well as elements that facilitated or limited success when using VERP. Elements were categorized and rated in terms of importance. Scoring of the final categories was analyzed using Wilcoxon and Median non-parametric statistical tests. Results suggest that planning challenges stem from limitations in organizational capacity to support a long-term, adaptive management process, inferring that VERP may be sufficiently developed, but implementation capacity may not. The results can be used to refine existing frameworks, and to aid in the development of new recreation frameworks.

  6. Identifying Key Elements to Inform the Development of an HIV Health Behavior Maintenance Intervention.

    Science.gov (United States)

    Hile, Stephen J; Feldman, Matthew B; Raker, Amanda R; Irvine, Mary K

    2018-01-01

    To collect information that will inform the development of an intervention to support the maintenance of HIV-related health-promoting behaviors. Focused, in-depth individual and group interviews. The New York City (NYC) Department of Health and Mental Hygiene (DOHMH) and DOHMH-funded community-based organizations that primarily serve low-income people living with HIV within the five boroughs of NYC. A total of 42 individuals who had participated in The Positive Life Workshop-an HIV self-management intervention adapted and implemented by the NYC DOHMH. Purposive sampling was used to recruit study participants. Five 60- to 90-minute focus groups (n = 38) and 4 individual interviews were conducted to assess motivations for and barriers to maintaining HIV-related health-promoting behaviors and to elicit feedback on the content and format for the proposed maintenance intervention. Thematic analysis was used to summarize the data. Participants reported that relationships with family, a responsibility to protect others from HIV, and faith/spirituality supported the maintenance of health-promoting behaviors. Barriers to behavior maintenance included substance use and mental health issues. Meeting in small groups was also highlighted as a motivator to sustaining health behaviors, particularly in decreasing isolation and receiving affirmation from others. Participants identified several factors that could be incorporated into an intervention to support HIV-related health-promoting behavior maintenance that could supplement existing HIV self-management interventions.

  7. Integrative Analysis of DNA Methylation and Gene Expression Data Identifies EPAS1 as a Key Regulator of COPD

    Science.gov (United States)

    Yoo, Seungyeul; Takikawa, Sachiko; Geraghty, Patrick; Argmann, Carmen; Campbell, Joshua; Lin, Luan; Huang, Tao; Tu, Zhidong; Feronjy, Robert; Spira, Avrum; Schadt, Eric E.; Powell, Charles A.; Zhu, Jun

    2015-01-01

    Chronic Obstructive Pulmonary Disease (COPD) is a complex disease. Genetic, epigenetic, and environmental factors are known to contribute to COPD risk and disease progression. Therefore we developed a systematic approach to identify key regulators of COPD that integrates genome-wide DNA methylation, gene expression, and phenotype data in lung tissue from COPD and control samples. Our integrative analysis identified 126 key regulators of COPD. We identified EPAS1 as the only key regulator whose downstream genes significantly overlapped with multiple genes sets associated with COPD disease severity. EPAS1 is distinct in comparison with other key regulators in terms of methylation profile and downstream target genes. Genes predicted to be regulated by EPAS1 were enriched for biological processes including signaling, cell communications, and system development. We confirmed that EPAS1 protein levels are lower in human COPD lung tissue compared to non-disease controls and that Epas1 gene expression is reduced in mice chronically exposed to cigarette smoke. As EPAS1 downstream genes were significantly enriched for hypoxia responsive genes in endothelial cells, we tested EPAS1 function in human endothelial cells. EPAS1 knockdown by siRNA in endothelial cells impacted genes that significantly overlapped with EPAS1 downstream genes in lung tissue including hypoxia responsive genes, and genes associated with emphysema severity. Our first integrative analysis of genome-wide DNA methylation and gene expression profiles illustrates that not only does DNA methylation play a ‘causal’ role in the molecular pathophysiology of COPD, but it can be leveraged to directly identify novel key mediators of this pathophysiology. PMID:25569234

  8. Identifying key soil cyanobacteria easy to isolate and culture for arid soil restoration

    Science.gov (United States)

    Roncero-Ramos, Beatriz; Ángeles Muñoz-Martín, M.; Chamizo, Sonia; Román, Raúl; Rodriguez-Caballero, Emilio; Mateo, Pilar; Cantón, Yolanda

    2017-04-01

    Drylands represent an important fraction of the Earth land's surface. Low cover of vascular plants characterizes these regions, and the large open areas among plants are often colonized by cyanobacteria, mosses, lichens, algae, bryophytes, bacteria and fungi, known as biocrusts. Because these communities are on or within the soil surface, they contribute to improve physicochemical properties of the uppermost soil layers and have important effects on soil fertility and stability, so they could play an important role on soil restoration. Cyanobacteria appear to be a cross component of biocrusts and they have been demonstrated to enhance water availability, soil fertility (fixing atmospheric C and N), and soil aggregation (thanks to their filamentous morphology and the exopolysaccharides they excrete), and significantly reduce water and wind erosion. Besides, they are able to tolerate high temperatures and UV radiation. All these features convert cyanobacteria in pioneer organisms capable of colonizing degraded soils and may be crucial in facilitating the succession of more developed organisms such as vascular plants. Therefore, the use of native cyanobacteria, already adapted to site environmental conditions, could guarantee a successful restoration approach of degraded soils. However, previous to their application for soil restoration, the most representative species inhabiting these soils should be identified. The objective of this study was to identify (morphologically and genetically) and isolate representative native cyanobacteria species from arid soils in SE Spain, characterized for being easily isolated and cultured with the aim of using them to inoculate degraded arid soil. We selected two study areas in Almería, SE Spain, where biocrust cover most of the open spaces between plants: El Cautivo experimental site located in the Tabernas desert and a limestone quarry located at the southeastern edge of the Gádor massif. The first site is characterized by

  9. Identifying plant traits: a key aspect for suitable species selection in ecological restoration of semiarid slopes

    Science.gov (United States)

    Bochet, Esther; García-Fayos, Patricio

    2017-04-01

    In the context of ecological restoration, one of the greatest challenges for practitioners and scientists is to select suitable species for revegetation purposes. In semiarid environments where restoration projects often fail, little attention has been paid so far to the contribution of plant traits to species success. The objective of this study was to (1) identify plant traits associated with species success on four roadside situations along an erosion-productivity gradient, and (2) to provide an ecological framework for selecting suitable species on the basis of their morphological and functional traits, applied to semiarid environments. We analyzed the association of 10 different plant traits with species success of 296 species surveyed on the four roadside situations in a semiarid region (Valencia, Spain). Plant traits included general plant traits (longevity, woodiness) and more specific root-, seed- and leaf-related traits (root type, sprouting ability, seed mucilage, seed mass, seed susceptibility to removal, specific leaf area and leaf dry matter content). All of them were selected according to the prevailing limiting ecogeomorphological processes acting along the erosion-productivity gradient. We observed strong shifts along the erosion-productivity gradient in the traits associated to species success. At the harshest end of the gradient, the most intensely eroded and driest one, species success was mainly associated to seed resistance to removal by runoff and to resistance to drought. At the opposite end of the gradient, the most productive one, species success was associated to a competitive-ruderal plant strategy (herbaceous successful species with high specific leaf area and low leaf dry matter content). Our study provides an ecologically-based approach for selecting suitable native species on the basis or their morphological and functional traits and supports a differential trait-based selection of species as regards roadslope type and aspect. In

  10. Probing molecular mechanisms of the Hsp90 chaperone: biophysical modeling identifies key regulators of functional dynamics.

    Directory of Open Access Journals (Sweden)

    Anshuman Dixit

    Full Text Available Deciphering functional mechanisms of the Hsp90 chaperone machinery is an important objective in cancer biology aiming to facilitate discovery of targeted anti-cancer therapies. Despite significant advances in understanding structure and function of molecular chaperones, organizing molecular principles that control the relationship between conformational diversity and functional mechanisms of the Hsp90 activity lack a sufficient quantitative characterization. We combined molecular dynamics simulations, principal component analysis, the energy landscape model and structure-functional analysis of Hsp90 regulatory interactions to systematically investigate functional dynamics of the molecular chaperone. This approach has identified a network of conserved regions common to the Hsp90 chaperones that could play a universal role in coordinating functional dynamics, principal collective motions and allosteric signaling of Hsp90. We have found that these functional motifs may be utilized by the molecular chaperone machinery to act collectively as central regulators of Hsp90 dynamics and activity, including the inter-domain communications, control of ATP hydrolysis, and protein client binding. These findings have provided support to a long-standing assertion that allosteric regulation and catalysis may have emerged via common evolutionary routes. The interaction networks regulating functional motions of Hsp90 may be determined by the inherent structural architecture of the molecular chaperone. At the same time, the thermodynamics-based "conformational selection" of functional states is likely to be activated based on the nature of the binding partner. This mechanistic model of Hsp90 dynamics and function is consistent with the notion that allosteric networks orchestrating cooperative protein motions can be formed by evolutionary conserved and sparsely connected residue clusters. Hence, allosteric signaling through a small network of distantly connected

  11. Probing molecular mechanisms of the Hsp90 chaperone: biophysical modeling identifies key regulators of functional dynamics.

    Science.gov (United States)

    Dixit, Anshuman; Verkhivker, Gennady M

    2012-01-01

    Deciphering functional mechanisms of the Hsp90 chaperone machinery is an important objective in cancer biology aiming to facilitate discovery of targeted anti-cancer therapies. Despite significant advances in understanding structure and function of molecular chaperones, organizing molecular principles that control the relationship between conformational diversity and functional mechanisms of the Hsp90 activity lack a sufficient quantitative characterization. We combined molecular dynamics simulations, principal component analysis, the energy landscape model and structure-functional analysis of Hsp90 regulatory interactions to systematically investigate functional dynamics of the molecular chaperone. This approach has identified a network of conserved regions common to the Hsp90 chaperones that could play a universal role in coordinating functional dynamics, principal collective motions and allosteric signaling of Hsp90. We have found that these functional motifs may be utilized by the molecular chaperone machinery to act collectively as central regulators of Hsp90 dynamics and activity, including the inter-domain communications, control of ATP hydrolysis, and protein client binding. These findings have provided support to a long-standing assertion that allosteric regulation and catalysis may have emerged via common evolutionary routes. The interaction networks regulating functional motions of Hsp90 may be determined by the inherent structural architecture of the molecular chaperone. At the same time, the thermodynamics-based "conformational selection" of functional states is likely to be activated based on the nature of the binding partner. This mechanistic model of Hsp90 dynamics and function is consistent with the notion that allosteric networks orchestrating cooperative protein motions can be formed by evolutionary conserved and sparsely connected residue clusters. Hence, allosteric signaling through a small network of distantly connected residue clusters may be

  12. A multivariate and stochastic approach to identify key variables to rank dairy farms on profitability.

    Science.gov (United States)

    Atzori, A S; Tedeschi, L O; Cannas, A

    2013-05-01

    The economic efficiency of dairy farms is the main goal of farmers. The objective of this work was to use routinely available information at the dairy farm level to develop an index of profitability to rank dairy farms and to assist the decision-making process of farmers to increase the economic efficiency of the entire system. A stochastic modeling approach was used to study the relationships between inputs and profitability (i.e., income over feed cost; IOFC) of dairy cattle farms. The IOFC was calculated as: milk revenue + value of male calves + culling revenue - herd feed costs. Two databases were created. The first one was a development database, which was created from technical and economic variables collected in 135 dairy farms. The second one was a synthetic database (sDB) created from 5,000 synthetic dairy farms using the Monte Carlo technique and based on the characteristics of the development database data. The sDB was used to develop a ranking index as follows: (1) principal component analysis (PCA), excluding IOFC, was used to identify principal components (sPC); and (2) coefficient estimates of a multiple regression of the IOFC on the sPC were obtained. Then, the eigenvectors of the sPC were used to compute the principal component values for the original 135 dairy farms that were used with the multiple regression coefficient estimates to predict IOFC (dRI; ranking index from development database). The dRI was used to rank the original 135 dairy farms. The PCA explained 77.6% of the sDB variability and 4 sPC were selected. The sPC were associated with herd profile, milk quality and payment, poor management, and reproduction based on the significant variables of the sPC. The mean IOFC in the sDB was 0.1377 ± 0.0162 euros per liter of milk (€/L). The dRI explained 81% of the variability of the IOFC calculated for the 135 original farms. When the number of farms below and above 1 standard deviation (SD) of the dRI were calculated, we found that 21

  13. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  14. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  15. Using Social Network Analysis to Identify Key Child Care Center Staff for Obesity Prevention Interventions: A Pilot Study

    Directory of Open Access Journals (Sweden)

    Jennifer Marks

    2013-01-01

    Full Text Available Introduction. Interest has grown in how systems thinking could be used in obesity prevention. Relationships between key actors, represented by social networks, are an important focus for considering intervention in systems. Method. Two long day care centers were selected in which previous obesity prevention programs had been implemented. Measures showed ways in which physical activity and dietary policy are conversations and actions transacted through social networks (interrelationships within centers, via an eight item closed-ended social network questionnaire. Questionnaire data were collected from (17/20; response rate 85% long day care center staff. Social network density and centrality statistics were calculated, using UCINET social network software, to examine the role of networks in obesity prevention. Results. “Degree” (influence and “betweeness” (gatekeeper centrality measures of staff inter-relationships about physical activity, dietary, and policy information identified key players in each center. Network density was similar and high on some relationship networks in both centers but markedly different in others, suggesting that the network tool identified unique center social dynamics. These differences could potentially be the focus of future team capacity building. Conclusion. Social network analysis is a feasible and useful method to identify existing obesity prevention networks and key personnel in long day care centers.

  16. Differential impact of tobacco control policies on youth sub-populations

    National Research Council Canada - National Science Library

    Tauras, John A; Huang, Jidong; Chaloupka, Frank J

    2013-01-01

    ...), race/ethnicity, and gender. We examined the relationship between state-level cigarette prices and smoke-free air laws and youth smoking prevalence and intensity for various youth sub-populations in the United States...

  17. Identifying sub-populations via unsupervised cluster analysis on multi-edge similarity graphs.

    Science.gov (United States)

    Ingalhalikar, Madhura; Smith, Alex R; Bloy, Luke; Gur, Ruben; Roberts, Timothy P L; Verma, Ragini

    2012-01-01

    Pathologies like autism and schizophrenia are a broad set of disorders with multiple etiologies in the same diagnostic category. This paper presents a method for unsupervised cluster analysis using multi-edge similarity graphs that combine information from different modalities. The method alleviates the issues with traditional supervised classification methods that use diagnostic labels and are therefore unable to exploit or elucidate the underlying heterogeneity of the dataset under analysis. The framework introduced in this paper has the ability to employ diverse features that define different aspects of pathology obtained from different modalities to create a multi-edged graph on which clustering is performed. The weights on the multiple edges are optimized using a novel concept of 'holding power' that describes the certainty with which a subject belongs to a cluster. We apply the technique to two separate clinical populations of autism spectrum disorder (ASD) and schizophrenia (SCZ), where the multi-edged graph for each population is created by combining information from structural networks and cognitive scores. For the ASD-control population the method clusters the data into two classes and the SCZ-control population is clustered into four. The two classes in ASD agree with underlying diagnostic labels with 92% accuracy and the SCZ clustering agrees with 78% accuracy, indicating a greater heterogeneity in the SCZ population.

  18. A Mitochondrial RNAi Screen Defines Cellular Bioenergetic Determinants and Identifies an Adenylate Kinase as a Key Regulator of ATP Levels

    Directory of Open Access Journals (Sweden)

    Nathan J. Lanning

    2014-05-01

    Full Text Available Altered cellular bioenergetics and mitochondrial function are major features of several diseases, including cancer, diabetes, and neurodegenerative disorders. Given this important link to human health, we sought to define proteins within mitochondria that are critical for maintaining homeostatic ATP levels. We screened an RNAi library targeting >1,000 nuclear-encoded genes whose protein products localize to the mitochondria in multiple metabolic conditions in order to examine their effects on cellular ATP levels. We identified a mechanism by which electron transport chain (ETC perturbation under glycolytic conditions increased ATP production through enhanced glycolytic flux, thereby highlighting the cellular potential for metabolic plasticity. Additionally, we identified a mitochondrial adenylate kinase (AK4 that regulates cellular ATP levels and AMPK signaling and whose expression significantly correlates with glioma patient survival. This study maps the bioenergetic landscape of >1,000 mitochondrial proteins in the context of varied metabolic substrates and begins to link key metabolic genes with clinical outcome.

  19. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  20. The use of social networking platforms for sexual health promotion: identifying key strategies for successful user engagement.

    Science.gov (United States)

    Veale, Hilary J; Sacks-Davis, Rachel; Weaver, Emma Rn; Pedrana, Alisa E; Stoové, Mark A; Hellard, Margaret E

    2015-02-06

    Online social networking platforms such as Facebook and Twitter have grown rapidly in popularity, with opportunities for interaction enhancing their health promotion potential. Such platforms are being used for sexual health promotion but with varying success in reaching and engaging users. We aimed to identify Facebook and Twitter profiles that were able to engage large numbers of users, and to identify strategies used to successfully attract and engage users in sexual health promotion on these platforms. We identified active Facebook (n = 60) and Twitter (n = 40) profiles undertaking sexual health promotion through a previous systematic review, and assessed profile activity over a one-month period. Quantitative measures of numbers of friends and followers (reach) and social media interactions were assessed, and composite scores used to give profiles an 'engagement success' ranking. Associations between host activity, reach and interaction metrics were explored. Content of the top ten ranked Facebook and Twitter profiles was analysed using a thematic framework and compared with five poorly performing profiles to identify strategies for successful user engagement. Profiles that were able to successfully engage large numbers of users were more active and had higher levels of interaction per user than lower-ranked profiles. Strategies used by the top ten ranked profiles included: making regular posts/tweets (median 46 posts or 124 tweets/month for top-ranked profiles versus six posts or six tweets for poorly-performing profiles); individualised interaction with users (85% of top-ranked profiles versus 0% for poorly-performing profiles); and encouraging interaction and conversation by posing questions (100% versus 40%). Uploading multimedia material (80% versus 30%) and highlighting celebrity involvement (70% versus 10%) were also key strategies. Successful online engagement on social networking platforms can be measured through quantitative (user numbers and

  1. A global in vivo Drosophila RNAi screen identifies a key role of ceramide phosphoethanolamine for glial ensheathment of axons.

    Directory of Open Access Journals (Sweden)

    Aniket Ghosh

    Full Text Available Glia are of vital importance for all complex nervous system. One of the many functions of glia is to insulate and provide trophic and metabolic support to axons. Here, using glial-specific RNAi knockdown in Drosophila, we silenced 6930 conserved genes in adult flies to identify essential genes and pathways. Among our screening hits, metabolic processes were highly represented, and genes involved in carbohydrate and lipid metabolic pathways appeared to be essential in glia. One critical pathway identified was de novo ceramide synthesis. Glial knockdown of lace, a subunit of the serine palmitoyltransferase associated with hereditary sensory and autonomic neuropathies in humans, resulted in ensheathment defects of peripheral nerves in Drosophila. A genetic dissection study combined with shotgun high-resolution mass spectrometry of lipids showed that levels of ceramide phosphoethanolamine are crucial for axonal ensheathment by glia. A detailed morphological and functional analysis demonstrated that the depletion of ceramide phosphoethanolamine resulted in axonal defasciculation, slowed spike propagation, and failure of wrapping glia to enwrap peripheral axons. Supplementing sphingosine into the diet rescued the neuropathy in flies. Thus, our RNAi study in Drosophila identifies a key role of ceramide phosphoethanolamine in wrapping of axons by glia.

  2. Mapping of transcription factor motifs in active chromatin identifies IRF5 as key regulator in classical Hodgkin lymphoma.

    Science.gov (United States)

    Kreher, Stephan; Bouhlel, M Amine; Cauchy, Pierre; Lamprecht, Björn; Li, Shuang; Grau, Michael; Hummel, Franziska; Köchert, Karl; Anagnostopoulos, Ioannis; Jöhrens, Korinna; Hummel, Michael; Hiscott, John; Wenzel, Sören-Sebastian; Lenz, Peter; Schneider, Markus; Küppers, Ralf; Scheidereit, Claus; Giefing, Maciej; Siebert, Reiner; Rajewsky, Klaus; Lenz, Georg; Cockerill, Peter N; Janz, Martin; Dörken, Bernd; Bonifer, Constanze; Mathas, Stephan

    2014-10-21

    Deregulated transcription factor (TF) activities are commonly observed in hematopoietic malignancies. Understanding tumorigenesis therefore requires determining the function and hierarchical role of individual TFs. To identify TFs central to lymphomagenesis, we identified lymphoma type-specific accessible chromatin by global mapping of DNaseI hypersensitive sites and analyzed enriched TF-binding motifs in these regions. Applying this unbiased approach to classical Hodgkin lymphoma (HL), a common B-cell-derived lymphoma with a complex pattern of deregulated TFs, we discovered interferon regulatory factor (IRF) sites among the top enriched motifs. High-level expression of the proinflammatory TF IRF5 was specific to HL cells and crucial for their survival. Furthermore, IRF5 initiated a regulatory cascade in human non-Hodgkin B-cell lines and primary murine B cells by inducing the TF AP-1 and cooperating with NF-κB to activate essential characteristic features of HL. Our strategy efficiently identified a lymphoma type-specific key regulator and uncovered a tumor promoting role of IRF5.

  3. Integrated genome-wide chromatin occupancy and expression analyses identify key myeloid pro-differentiation transcription factors repressed by Myb

    Science.gov (United States)

    Zhao, Liang; Glazov, Evgeny A.; Pattabiraman, Diwakar R.; Al-Owaidi, Faisal; Zhang, Ping; Brown, Matthew A.; Leo, Paul J.; Gonda, Thomas J.

    2011-01-01

    To gain insight into the mechanisms by which the Myb transcription factor controls normal hematopoiesis and particularly, how it contributes to leukemogenesis, we mapped the genome-wide occupancy of Myb by chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) in ERMYB myeloid progenitor cells. By integrating the genome occupancy data with whole genome expression profiling data, we identified a Myb-regulated transcriptional program. Gene signatures for leukemia stem cells, normal hematopoietic stem/progenitor cells and myeloid development were overrepresented in 2368 Myb regulated genes. Of these, Myb bound directly near or within 793 genes. Myb directly activates some genes known critical in maintaining hematopoietic stem cells, such as Gfi1 and Cited2. Importantly, we also show that, despite being usually considered as a transactivator, Myb also functions to repress approximately half of its direct targets, including several key regulators of myeloid differentiation, such as Sfpi1 (also known as Pu.1), Runx1, Junb and Cebpb. Furthermore, our results demonstrate that interaction with p300, an established coactivator for Myb, is unexpectedly required for Myb-mediated transcriptional repression. We propose that the repression of the above mentioned key pro-differentiation factors may contribute essentially to Myb’s ability to suppress differentiation and promote self-renewal, thus maintaining progenitor cells in an undifferentiated state and promoting leukemic transformation. PMID:21317192

  4. A genome-wide regulatory network identifies key transcription factors for memory CD8⁺ T-cell development

    National Research Council Canada - National Science Library

    Hu, Guangan; Chen, Jianzhu

    2013-01-01

    .... To identify transcription factors and their interactions in memory CD8⁺ T-cell development, we construct a genome-wide regulatory network and apply it to identify key transcription factors that regulate memory signature genes...

  5. Using important plant areas and important bird areas to identify Key Biodiversity Areas in the Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    L. Melovski

    2012-08-01

    Full Text Available An attempt is made to identify Key Biodiversity Areas in the Republic of Macedonia through the identification of internationally recognized important areas for biodiversity: Important Plant Areas (IPAs and Important Bird Areas (IBAs. Forty two IPAs covering 6,495km2 and 24 IBAs covering 6,907km2 have been identified in Macedonia. Thirty seven IPAs (6,152km2 or 24% of the country’s territory and 15 IBAs (4,821km2 or 18.75% of the national territory, meet KBA criteria, between them yielding 42 KBAs. The remaining five IPAs and nine IBAs do not meet KBA criteria although have international significance. Together IPAs and IBAs total 10,698km2; those meeting the KBA criteria total 9,670km2. In total, 73% and 65% of the entire national protected areas (PAs surface overlaps with IPAs and IBAs respectively. This proportion is 81% for the 42 KBAs. However, only 25% of the total size of protected areas overlaps with IPAs, only 21% overlap with IBAs, and only 19% with the combined 42 KBAs. This means that Macedonia’s protected areas system is not yet representative and comprehensive for safeguarding its botanical and avian diversity.

  6. Microarray identifies ADAM family members as key responders to TGF-β1 in alveolar epithelial cells

    Directory of Open Access Journals (Sweden)

    Walls Dermot

    2006-09-01

    Full Text Available Abstract The molecular mechanisms of Idiopathic Pulmonary Fibrosis (IPF remain elusive. Transforming Growth Factor beta 1(TGF-β1 is a key effector cytokine in the development of lung fibrosis. We used microarray and computational biology strategies to identify genes whose expression is significantly altered in alveolar epithelial cells (A549 in response to TGF-β1, IL-4 and IL-13 and Epstein Barr virus. A549 cells were exposed to 10 ng/ml TGF-β1, IL-4 and IL-13 at serial time points. Total RNA was used for hybridisation to Affymetrix Human Genome U133A microarrays. Each in vitro time-point was studied in duplicate and an average RMA value computed. Expression data for each time point was compared to control and a signal log ratio of 0.6 or greater taken to identify significant differential regulation. Using normalised RMA values and unsupervised Average Linkage Hierarchical Cluster Analysis, a list of 312 extracellular matrix (ECM proteins or modulators of matrix turnover was curated via Onto-Compare and Gene-Ontology (GO databases for baited cluster analysis of ECM associated genes. Interrogation of the dataset using ontological classification focused cluster analysis revealed coordinate differential expression of a large cohort of extracellular matrix associated genes. Of this grouping members of the ADAM (A disintegrin and Metalloproteinase domain containing family of genes were differentially expressed. ADAM gene expression was also identified in EBV infected A549 cells as well as IL-13 and IL-4 stimulated cells. We probed pathologenomic activities (activation and functional activity of ADAM19 and ADAMTS9 using siRNA and collagen assays. Knockdown of these genes resulted in diminished production of collagen in A549 cells exposed to TGF-β1, suggesting a potential role for these molecules in ECM accumulation in IPF.

  7. Key influences identified by first year undergraduate nursing students as impacting on the quality of clinical placement: A qualitative study.

    Science.gov (United States)

    Cooper, John; Courtney-Pratt, Helen; Fitzgerald, Mary

    2015-09-01

    Despite the fact that high quality clinical placement is an integral component of pre-registration nursing education for the development of the future nursing workforce, the literature identifies an ongoing struggle to 'get it right'. To examine qualitative data gathered through the Quality Clinical Placements Evaluation project to identify what pre-registration nursing students deemed helpful and not helpful influences on their first year Professional Experience Placement. A total of 553 first year undergraduate nursing students from 2010 to 2012 were enrolled in the programme and all were invited to complete a validated survey to measure the quality of their first clinical placement. A total of 361 completed surveys were returned. This paper examines the data provided through open-ended questions within the survey related to most helpful and least helpful aspects of their clinical experience. An inductive analysis approach using NVIVO allowed inherent areas to emerge from the raw data forming three key themes that influenced the experience of students. Feeling welcomed, individual versus team attitudes, and student expectations of supervising ward nurses were the themes identified that were perceived by the student as important to the success of learning and the quality of the experience overall. The findings echo previous research into the student experience of clinical placement; however the focus regarding the need for students to have a quality relationship with the supervising nurse is an area that warrants further exploration. Furthermore, we argue that students should be purposely engaged in the tertiary sector and provided guidance and strategies related to forming and maintaining relationships with those that supervise their clinical placement, in order to ensure consistent positive experiences. The outcomes from this study suggest that a missing component is teaching undergraduates how to manage relationships in clinical settings. Copyright © 2015

  8. Integrating transcriptome and genome re-sequencing data to identify key genes and mutations affecting chicken eggshell qualities.

    Directory of Open Access Journals (Sweden)

    Quan Zhang

    Full Text Available Eggshell damages lead to economic losses in the egg production industry and are a threat to human health. We examined 49-wk-old Rhode Island White hens (Gallus gallus that laid eggs having shells with significantly different strengths and thicknesses. We used HiSeq 2000 (Illumina sequencing to characterize the chicken transcriptome and whole genome to identify the key genes and genetic mutations associated with eggshell calcification. We identified a total of 14,234 genes expressed in the chicken uterus, representing 89% of all annotated chicken genes. A total of 889 differentially expressed genes were identified by comparing low eggshell strength (LES and normal eggshell strength (NES genomes. The DEGs are enriched in calcification-related processes, including calcium ion transport and calcium signaling pathways as revealed by gene ontology (GO and Kyoto encyclopedia of genes and genomes (KEGG pathway analysis. Some important matrix proteins, such as OC-116, LTF and SPP1, were also expressed differentially between two groups. A total of 3,671,919 single-nucleotide polymorphisms (SNPs and 508,035 Indels were detected in protein coding genes by whole-genome re-sequencing, including 1775 non-synonymous variations and 19 frame-shift Indels in DEGs. SNPs and Indels found in this study could be further investigated for eggshell traits. This is the first report to integrate the transcriptome and genome re-sequencing to target the genetic variations which decreased the eggshell qualities. These findings further advance our understanding of eggshell calcification in the chicken uterus.

  9. Heteroresistance to colistin in Klebsiella pneumoniae is triggered by small colony variants sub-populations within biofilms.

    Science.gov (United States)

    Silva, Ana; Sousa, Ana Margarida; Alves, Diana; Lourenço, Anália; Pereira, Maria Olívia

    2016-07-01

    The emergence of Klebsiella pneumoniae multidrug-resistant strains paves the way to the re-introduction of colistin as a salvage therapy. However, recent planktonic studies have reported several cases of heteroresistance to this antimicrobial agent. The aim of this present work was to gain better understanding about the response of K. pneumoniae biofilms to colistin antibiotherapy and inspect the occurrence of heteroresistance in biofilm-derived cells. Biofilm formation and its susceptibility to colistin were evaluated through the determination of biofilm-cells viability. The profiling of planktonic and biofilm cell populations was conducted to assess the occurrence of heteroresistance. Colony morphology was further characterized in order to inspect the potential role of colistin in K. pneumoniae phenotypic differentiation. Results show that K. pneumoniae was susceptible to colistin in its planktonic form, but biofilms presented enhanced resistance. Population analysis profiles pointed out that K. pneumoniae manifest heteroresistance to colistin only when grown in biofilm arrangements, and it was possible to identify a resistant sub-population presenting a small colony morphology (diameter around 5 mm). To the best of our knowledge, this is the first report linking heteroresistance to biofilm formation and a morphological distinctive sub-population. Moreover, this is the first evidence that biofilm formation can trigger the emergence of heteroresistance in an apparently susceptible strain. © FEMS 2016. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Common genes associated with antidepressant response in mouse and man identify key role of glucocorticoid receptor sensitivity.

    Directory of Open Access Journals (Sweden)

    Tania Carrillo-Roa

    2017-12-01

    Full Text Available Response to antidepressant treatment in major depressive disorder (MDD cannot be predicted currently, leading to uncertainty in medication selection, increasing costs, and prolonged suffering for many patients. Despite tremendous efforts in identifying response-associated genes in large genome-wide association studies, the results have been fairly modest, underlining the need to establish conceptually novel strategies. For the identification of transcriptome signatures that can distinguish between treatment responders and nonresponders, we herein submit a novel animal experimental approach focusing on extreme phenotypes. We utilized the large variance in response to antidepressant treatment occurring in DBA/2J mice, enabling sample stratification into subpopulations of good and poor treatment responders to delineate response-associated signature transcript profiles in peripheral blood samples. As a proof of concept, we translated our murine data to the transcriptome data of a clinically relevant human cohort. A cluster of 259 differentially regulated genes was identified when peripheral transcriptome profiles of good and poor treatment responders were compared in the murine model. Differences in expression profiles from baseline to week 12 of the human orthologues selected on the basis of the murine transcript signature allowed prediction of response status with an accuracy of 76% in the patient population. Finally, we show that glucocorticoid receptor (GR-regulated genes are significantly enriched in this cluster of antidepressant-response genes. Our findings point to the involvement of GR sensitivity as a potential key mechanism shaping response to antidepressant treatment and support the hypothesis that antidepressants could stimulate resilience-promoting molecular mechanisms. Our data highlight the suitability of an appropriate animal experimental approach for the discovery of treatment response-associated pathways across species.

  11. Perceptions of graduating students from eight medical schools in Vietnam on acquisition of key skills identified by teachers

    Directory of Open Access Journals (Sweden)

    Son Nguyen

    2008-01-01

    Full Text Available Abstract Background The eight main Vietnamese medical schools recently cooperated to produce a book listing the knowledge, attitudes and skills expected of a graduate, including specification of the required level for each skill. The teaching program should ensure that students can reach that level. The objective of this study was to determine the perception of graduating students on whether they had achieved the level set for a selection of clinical and public health skills as a guide for the schools to adjust either the levels or the teaching. Methods From all eight schools, 1136 of the 1528 final year students completed questionnaires just before completed all the requirements for graduation, a response rate of 87% overall (ranging from 74–99% per school. They rated their own competence on a scale of 0–5 for 129 skills selected from the 557 skills listed in the book, and reported where they thought they had learned them. The scores that the students gave themselves were then compared to the levels proposed by the teachers for each skill. The proportions of the self-assessed achievement to the levels expected by the teachers, means self-assessed scores and the coefficients of variation were calculated to make comparisons among disciplines, among schools and among learning sites. Results Most students felt they had learned most of the skills for key clinical departments to the required level; this varied little among the schools. Self-assessed skill acquisition in public health and minor clinical disciplines was lower and varied more. Sites outside the classroom were especially important for learning skills. The results revealed key similarities and differences between the teachers and the students in their perception about what could be learned and where Conclusion Revising a curriculum for medical schools demands inputs from all stakeholders. Graduating class students can provide valuable feedback on what they have learned in the existing

  12. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  13. Molecular characterization of six sub population Indonesian local goats based on mitochondrial DNA D-loop

    Directory of Open Access Journals (Sweden)

    Aron Batubara

    2013-03-01

    Full Text Available Indonesian local goats were spread in some region, but there was still limited data’s known about the characteristics of its genetic diversity and origin. The Mitochondrial DNA D-loop sequences were used to study the genetic diversity and relationships of six sub population Indonesian local goats, namely, Kacang, Marica, Samosir, Jawarandu, Muara and Bengali goats. From 539 blood samples and DNA extraction collections were selected about 60 samples (10 samples each sub populations analyzed by PCR-RFLP methods, followed sequence analyzed about 5 PCR products each sub population. The results of the sequence analyses were edited and acquired about 957 bp of nucleotides length. After the alignment analyses were found 50 polymorphic sites which divided into 19 haplotype groups of mtDNA D-loop region. The value of nucleotide diversity was 0.014 ± 0.002. Analysis of Neighbour Joining with Kimura 2 Parameter methods and bootstrap test with 1000 replication indicated that each sub population groups was significantly different between one groups to the others. The maternal lineages origin of six breeds of Indonesian local goats was included to the group of lineage B. The Lineage B was the maternal origin of the haplogroup of goats in the region of East Asia, South Asia, China, Mongolia, North and South Africa, Malaysia, Indonesia, Pakistan and India.

  14. Haploid Mammalian Genetic Screen Identifies UBXD8 as a Key Determinant of HMGCR Degradation and Cholesterol Biosynthesis

    NARCIS (Netherlands)

    Loregger, Anke; Raaben, Matthijs; Tan, Josephine; Scheij, Saskia; Moeton, Martina; van den Berg, Marlene; Gelberg-Etel, Hila; Stickel, Elmer; Roitelman, Joseph; Brummelkamp, Thijn; Zelcer, Noam

    2017-01-01

    Objective-The cellular demand for cholesterol requires control of its biosynthesis by the mevalonate pathway. Regulation of HMGCR (3-hydroxy-3-methylglutaryl coenzyme A reductase), a rate-limiting enzyme in this pathway and the target of statins, is a key control point herein. Accordingly, HMGCR is

  15. Swift residue-screening identifies key N-glycosylated asparagines sufficient for surface expression of neuroglycoprotein Lingo-1.

    Science.gov (United States)

    Zhong, Xiaotian; Pocas, Jennifer; Liu, Yan; Wu, Paul W; Mosyak, Lidia; Somers, Will; Kriz, Ron

    2009-03-18

    Advances in genomics and proteomics have generated the needs for the efficient identification of key residues for structure and function of target proteins. Here we report the utilization of a new residue-screening approach, which combines a mammalian high-throughput transient expression system with a PCR-based expression cassette, for the study of the post-translational modification. Applying this approach results in a quick identification of essential N-glycosylation sites of a heavily glycosylated neuroglycoprotein Lingo-1, which are sufficient for the support of its surface expression. These key N-glycosylated sites uniquely locate on the concave surface of the elongated arc-shape structure of the leucine-rich repeat domain. The swift residue-screening approach may provide a new strategy for structural and functional analysis.

  16. Using Social Network Analysis to Identify Key Child Care Center Staff for Obesity Prevention Interventions: A Pilot Study

    OpenAIRE

    Jennifer Marks; Barnett, Lisa M.; Chad Foulkes; Penelope Hawe; Steven Allender

    2013-01-01

    Introduction. Interest has grown in how systems thinking could be used in obesity prevention. Relationships between key actors, represented by social networks, are an important focus for considering intervention in systems. Method. Two long day care centers were selected in which previous obesity prevention programs had been implemented. Measures showed ways in which physical activity and dietary policy are conversations and actions transacted through social networks (interrelationships) with...

  17. Differential impact of tobacco control policies on youth sub-populations.

    Science.gov (United States)

    Tauras, John A; Huang, Jidong; Chaloupka, Frank J

    2013-09-12

    While previous studies have demonstrated the efficacy of tobacco control interventions in reducing tobacco use among youth overall, there have been very few studies that examine the potential differential impact of tobacco control policies on various youth subgroups, defined by socio-economic status (SES), race/ethnicity, and gender. We examined the relationship between state-level cigarette prices and smoke-free air laws and youth smoking prevalence and intensity for various youth sub-populations in the United States. We estimated a 2-part model of cigarette demand using data from the 1991 through 2010 nationally representative surveys of 8th-, 10th-, and 12th-grade students as part of the Monitoring the Future project. We found that real cigarette prices are strong determinants of youth smoking. Blacks, females, Hispanics, and low-SES subpopulations are found to have a larger price response with respect to smoking prevalence than the full sample. Smoke-free air laws are found to have a negative effect on smoking prevalence for the full sample and for the male, white, and high-SES sub-populations. This research concludes that higher cigarette prices will reduce smoking prevalence rates of Blacks, Hispanics, females, and low-SES subpopulations faster than the overall youth population and other youth sub-populations. Moreover, this research concludes that smoke-free air laws will reduce smoking prevalence for the overall youth population with the largest reductions in high SES and male subpopulations.

  18. Identifying psychological distress at key stages of the cancer illness trajectory: a systematic review of validated self-report measures.

    Science.gov (United States)

    Ziegler, Lucy; Hill, Kate; Neilly, Liz; Bennett, Michael I; Higginson, Irene J; Murray, Scott A; Stark, Dan

    2011-03-01

    To enable study of psychological distress along the cancer journey, we need to be able to select and map validated measures through the cancer trajectory. To examine the performance of self-report measures for identifying clinically significant levels of psychological distress across the cancer patient trajectory. Electronic searches of Medline, PsychInfo, CINAHL, EmBase, The Cochrane Library, AMED, BNI, ASSIA, and Web of Science were undertaken. Only studies of self-report measures that used validated diagnostic tools for psychiatric diagnosis as the criterion measure were included. We then further limited our focus to those papers that specified a trajectory stage. Forty-eight different self-report measures were reported in the 85 papers identified. The Hospital Anxiety and Depression Scale (HADS) was the most frequently reported measure (23 times). Several other measures were reported between two and four times, but most (37) measures were reported only once. Twenty-two of the 85 included papers reported measure performance by trajectory stage. Best performing measures based on validation data available could be identified for each trajectory stage: for pretreatment, the HADS for identifying depression; during treatment, the HADS and Mental Health Inventory-5 (MHI-5) together for identifying clinically significant distress; post-treatment, the HADS for identifying depression; and at recurrence and during the palliative phase, the Brief Edinburgh Depression Scale (BEDS) for identifying depression. No single measure had evidence to support use throughout the illness trajectory in a longitudinal study, but the HADS, in combination with the MHI-5, was supported during the cancer treatment phase, and BEDS in the palliative care phase. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  19. USING THE PARETO DIAGRAM AND FMEA (FAILURE MODE AND EFFECTS ANALYSIS TO IDENTIFY KEY DEFECTS IN A PRODUCT

    Directory of Open Access Journals (Sweden)

    Michał ZASADZIEŃ

    2014-10-01

    Full Text Available The article presents the results of studies conducted in a company manufacturing aluminium forgings for the automotive industry. The aim of the research was to identify the defects which form during the production process as well as the locations and causes of their occurrence. Selected quality management tools were used in the process. Based on the FMEA and the costs generated by the identified defects, a hierarchy of them was created for the company along with a proposal of improvements in case of the most significant ones in order to reduce their number and increase the detection efficiency.

  20. A comparison of the performance of seven key bibliographic databases in identifying all relevant systematic reviews of interventions for hypertension.

    Science.gov (United States)

    Rathbone, John; Carter, Matt; Hoffmann, Tammy; Glasziou, Paul

    2016-02-09

    Bibliographic databases are the primary resource for identifying systematic reviews of health care interventions. Reliable retrieval of systematic reviews depends on the scope of indexing used by database providers. Therefore, searching one database may be insufficient, but it is unclear how many need to be searched. We sought to evaluate the performance of seven major bibliographic databases for the identification of systematic reviews for hypertension. We searched seven databases (Cochrane library, Database of Abstracts of Reviews of Effects (DARE), Excerpta Medica Database (EMBASE), Epistemonikos, Medical Literature Analysis and Retrieval System Online (MEDLINE), PubMed Health and Turning Research Into Practice (TRIP)) from 2003 to 2015 for systematic reviews of any intervention for hypertension. Citations retrieved were screened for relevance, coded and checked for screening consistency using a fuzzy text matching query. The performance of each database was assessed by calculating its sensitivity, precision, the number of missed reviews and the number of unique records retrieved. Four hundred systematic reviews were identified for inclusion from 11,381 citations retrieved from seven databases. No single database identified all the retrieved systematic reviews for hypertension. EMBASE identified the most reviews (sensitivity 69 %) but also retrieved the most irrelevant citations with 7.2 % precision (Pr). The sensitivity of the Cochrane library was 60 %, DARE 57 %, MEDLINE 57 %, PubMed Health 53 %, Epistemonikos 49 % and TRIP 33 %. EMBASE contained the highest number of unique records (n = 43). The Cochrane library identified seven unique records and had the highest precision (Pr = 30 %), followed by Epistemonikos (n = 2, Pr = 19 %). No unique records were found in PubMed Health (Pr = 24 %) DARE (Pr = 21 %), TRIP (Pr = 10 %) or MEDLINE (Pr = 10 %). Searching EMBASE and the Cochrane library identified 88 % of all systematic reviews in the reference set, and

  1. Identifying potential strategies in the key sectors of China’s food chain to implement sustainable phosphorus management

    NARCIS (Netherlands)

    Li, Guohua; Huang, Gaoqiang; Li, Haigang; Ittersum, van M.K.; Leffelaar, P.A.; Zhang, Fusuo

    2016-01-01

    High extraction of phosphate reserves and low phosphorus utilization efficiency in the food chain in China result in large P losses and serious environmental pollution. The P fertilizer industry, soil P surplus, livestock manure P and wastewater P recycling have been identified as the priority

  2. Toxicogenomic and bioinformatics platforms to identify key molecular mechanisms of a curcumin-analogue DM-1 toxicity in melanoma cells.

    Science.gov (United States)

    Oliveira, Érica Aparecida de; Lima, Diogenes Saulo de; Cardozo, Lucas Esteves; Souza, Garcia Ferreira de; de Souza, Nayane; Alves-Fernandes, Debora Kristina; Faião-Flores, Fernanda; Quincoces, José Agustín Pablo; Barros, Silvia Berlanga de Moraes; Nakaya, Helder I; Monteiro, Gisele; Maria-Engler, Silvya Stuchi

    2017-11-01

    Melanoma is a highly invasive and metastatic cancer with high mortality rates and chemoresistance. Around 50% of melanomas are driven by activating mutations in BRAF that has led to the development of potent anti-BRAF inhibitors. However resistance to anti-BRAF therapy usually develops within a few months and consequently there is a need to identify alternative therapies that will bypass BRAF inhibitor resistance. The curcumin analogue DM-1 (sodium 4-[5-(4-hydroxy-3-methoxy-phenyl)-3-oxo-penta-1,4-dienyl]-2-methoxy-phenolate) has substantial anti-tumor activity in melanoma, but its mechanism of action remains unclear. Here we use a synthetic lethal genetic screen in Saccharomyces cerevisiae to identify 211 genes implicated in sensitivity to DM-1 toxicity. From these 211 genes, 74 had close human orthologues implicated in oxidative phosphorylation, insulin signaling and iron and RNA metabolism. Further analysis identified 7 target genes (ADK, ATP6V0B, PEMT, TOP1, ZFP36, ZFP36L1, ZFP36L2) with differential expression during melanoma progression implicated in regulation of tumor progression, cell differentiation, and epithelial-mesenchymal transition. Of these TOP1 and ADK were regulated by DM-1 in treatment-naïve and vemurafenib-resistant melanoma cells respectively. These data reveal that the anticancer effect of curcumin analogues is likely to be mediated via multiple targets and identify several genes that represent candidates for combinatorial targeting in melanoma. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Science.gov (United States)

    Ariani, Andrea; Di Baccio, Daniela; Romeo, Stefania; Lombardi, Lara; Andreucci, Andrea; Lux, Alexander; Horner, David Stephen; Sebastiani, Luca

    2015-01-01

    Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE) genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated) and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO) terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1) probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS) that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  4. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  5. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; van der Veen, JP Wietze; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A; Spritz, Richard A

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from destruction of melanocytes1, with epidemiologic association with other autoimmune diseases2. In previous linkage and genome-wide association studies (GWAS1, GWAS2), we identified 27 vitiligo susceptibility loci in patients of European (EUR) ancestry. We carried out a third GWAS (GWAS3) in EUR subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new loci and 7 suggestive loci, most encoding immune and apoptotic regulators, some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some corresponding to eQTL at these loci. Together, the identified genes provide a framework for vitiligo genetic architecture and pathobiology, highlight relationships to other autoimmune diseases and melanoma, and offer potential targets for treatment. PMID:27723757

  6. Identifying a key physical factor sensitive to the performance of Madden-Julian oscillation simulation in climate models

    Science.gov (United States)

    Kim, Go-Un; Seo, Kyong-Hwan

    2018-01-01

    A key physical factor in regulating the performance of Madden-Julian oscillation (MJO) simulation is examined by using 26 climate model simulations from the World Meteorological Organization's Working Group for Numerical Experimentation/Global Energy and Water Cycle Experiment Atmospheric System Study (WGNE and MJO-Task Force/GASS) global model comparison project. For this, intraseasonal moisture budget equation is analyzed and a simple, efficient physical quantity is developed. The result shows that MJO skill is most sensitive to vertically integrated intraseasonal zonal wind convergence (ZC). In particular, a specific threshold value of the strength of the ZC can be used as distinguishing between good and poor models. An additional finding is that good models exhibit the correct simultaneous convection and large-scale circulation phase relationship. In poor models, however, the peak circulation response appears 3 days after peak rainfall, suggesting unfavorable coupling between convection and circulation. For an improving simulation of the MJO in climate models, we propose that this delay of circulation in response to convection needs to be corrected in the cumulus parameterization scheme.

  7. Haploid Mammalian Genetic Screen Identifies UBXD8 as a Key Determinant of HMGCR Degradation and Cholesterol Biosynthesis.

    Science.gov (United States)

    Loregger, Anke; Raaben, Matthijs; Tan, Josephine; Scheij, Saskia; Moeton, Martina; van den Berg, Marlene; Gelberg-Etel, Hila; Stickel, Elmer; Roitelman, Joseph; Brummelkamp, Thijn; Zelcer, Noam

    2017-11-01

    The cellular demand for cholesterol requires control of its biosynthesis by the mevalonate pathway. Regulation of HMGCR (3-hydroxy-3-methylglutaryl coenzyme A reductase), a rate-limiting enzyme in this pathway and the target of statins, is a key control point herein. Accordingly, HMGCR is subject to negative and positive regulation. In particular, the ability of oxysterols and intermediates of the mevalonate pathway to stimulate its proteasomal degradation is an exquisite example of metabolically controlled feedback regulation. To define the genetic determinants that govern this process, we conducted an unbiased haploid mammalian genetic screen. We generated human haploid cells with mNeon fused to endogenous HMGCR using CRISPR/Cas9 and used these cells to interrogate regulation of HMGCR abundance in live cells. This resulted in identification of known and new regulators of HMGCR, and among the latter, UBXD8 (ubiquitin regulatory X domain-containing protein 8), a gene that has not been previously implicated in this process. We demonstrate that UBXD8 is an essential determinant of metabolically stimulated degradation of HMGCR and of cholesterol biosynthesis in multiple cell types. Accordingly, UBXD8 ablation leads to aberrant cholesterol synthesis due to loss of feedback control. Mechanistically, we show that UBXD8 is necessary for sterol-stimulated dislocation of ubiquitylated HMGCR from the endoplasmic reticulum membrane en route to proteasomal degradation, a function dependent on its UBX domain. We establish UBXD8 as a previously unrecognized determinant that couples flux across the mevalonate pathway to control of cholesterol synthesis and demonstrate the feasibility of applying mammalian haploid genetics to study metabolic traits. © 2017 The Authors.

  8. Genomics and relative expression analysis identifies key genes associated with high female to male flower ratio in Jatropha curcas L.

    Science.gov (United States)

    Gangwar, Manali; Sood, Hemant; Chauhan, Rajinder Singh

    2016-04-01

    Jatropha curcas, has been projected as a major source of biodiesel due to high seed oil content (42 %). A major roadblock for commercialization of Jatropha-based biodiesel is low seed yield per inflorescence, which is affected by low female to male flower ratio (1:25-30). Molecular dissection of female flower development by analyzing genes involved in phase transitions and floral organ development is, therefore, crucial for increasing seed yield. Expression analysis of 42 genes implicated in floral organ development and sex determination was done at six floral developmental stages of a J. curcas genotype (IC561235) with inherently higher female to male flower ratio (1:8-10). Relative expression analysis of these genes was done on low ratio genotype. Genes TFL1, SUP, AP1, CRY2, CUC2, CKX1, TAA1 and PIN1 were associated with reproductive phase transition. Further, genes CUC2, TAA1, CKX1 and PIN1 were associated with female flowering while SUP and CRY2 in female flower transition. Relative expression of these genes with respect to low female flower ratio genotype showed up to ~7 folds increase in transcript abundance of SUP, TAA1, CRY2 and CKX1 genes in intermediate buds but not a significant increase (~1.25 folds) in female flowers, thereby suggesting that these genes possibly play a significant role in increased transition towards female flowering by promoting abortion of male flower primordia. The outcome of study has implications in feedstock improvement of J. curcas through functional validation and eventual utilization of key genes associated with female flowering.

  9. Key cofactors of photosystem II cores from four organisms identified by 1.7-K absorption, CD and MCD.

    Science.gov (United States)

    Arsköld, Sindra Peterson; Smith, Paul J; Shen, Jian-Ren; Pace, Ron J; Krausz, Elmars

    2005-06-01

    Active Photosystem II (PS II) cores were prepared from spinach, pea, Synechocystis PCC 6803, and Thermosynechococcus vulcanus, the latter of which has been structurally determined [Kamiya and Shen (2003) Proc Natl Acad Sci USA 100: 98-103]. Electrochromic shifts resulting from QA reduction by 1.7-K illumination were recorded, and the Qx and Qy absorption bands of the redox-active pheophytin a thus identified in the different organisms. The Qx transition is approximately 3 nm (100 cm-1) to higher energy in cyanobacteria than in the plants. The predominant Qy shift appears in the range 683-686 nm depending on species, and does not appear to have a systematic shift. Low-temperature absorption, circular dichroism (CD) and magnetic circular dichroism (MCD) spectra of the chlorophyll Qy region are very similar in spinach and pea, but vary in cyanobacteria. We assigned CP43 and CP47 trap-chlorophyll absorption features in all species, as well as a P680 transition. Each absorption identified has an area of one chlorophyll a. The MCD deficit, introduced previously for spinach as an indicator of P680 activity, occurs in the same spectral region and has the same area in all species, pointing to a robustness of this as a signature for P680. MCD and CD characteristics point towards a significant variance in P680 structure between cyanobacteria, thermophilic cyanobacteria, and higher plants.

  10. Integrated Analysis of DNA Methylation and mRNA Expression Profiles to Identify Key Genes in Severe Oligozoospermia

    Directory of Open Access Journals (Sweden)

    Zhiming Li

    2017-05-01

    Full Text Available Severe oligozoospermia (SO is a complex disorder, whose etiology is the combined effect of genetic factors and epigenetic conditions. In this study, we examined DNA methylation and mRNA expression status in a set of testicular tissues of SO patients (n = 3, and compared methylated data with those derived from obstructive azoospermia (OA patients (n = 3 with normal spermatogenesis phenotype. We identified 1,960 differentially methylated CpG sites showing significant alterations in SO vs. OA using the Illumina Infinium HumanMethylation450 bead array. By integrating above DNA methylation data and mRNA expression results, we totally identified 72 methylated CpG sites located in 65 genes with anti-correlation between DNA methylation and mRNA expression. Integrated pathways analysis indicates that these genes are involved in response to hormone stimulus, activation of protein kinase activity, and apoptotic process, among others. We also observed some genes with inversely correlated difference is novel in male infertility field, including PTPRN2, EPHX1, SERPINB9, SLIT3, etc. Our results lay a groundwork for further biological study of SO. Moreover, we generated a workflow for integrated analysis of DNA methylation and mRNA expression, which is expandable to other study types.

  11. RNA-Seq analysis identifies key genes associated with haustorial development in the root hemiparasite Santalum album

    Directory of Open Access Journals (Sweden)

    Xinhua eZhang

    2015-09-01

    Full Text Available Santalum album (sandalwood is one of the economically important plant species in the Santalaceae for its production of highly valued perfume oils. Sandalwood is also a hemiparasitic tree that obtains some of its water and simple nutrients by tapping into other plants through haustoria which are highly specialized organs in parasitic angiosperms. However, an understanding of the molecular mechanisms involved in haustorium development is limited. In this study, RNA sequencing (RNA-seq analyses were performed to identify changes in gene expression and metabolic pathways associated with the development of the S. album haustorium. A total of 56,011 non-redundant contigs with a mean contig size of 618 bp were obtained by de novo assembly of the transcriptome of haustoria and non-haustorial seedling roots. A substantial number of the identified differentially expressed genes were involved in cell wall metabolism and protein metabolism, as well as mitochondrial electron transport functions. Phytohormone-mediated regulation might play an important role during haustorial development. Especially, auxin signaling is likely to be essential for haustorial initiation, and genes related to cytokinin and gibberellin biosynthesis and metabolism are involved in haustorial development. Our results suggest that genes encoding nodulin-like proteins may be important for haustorial morphogenesis in S. album. The obtained sequence data will become a rich resource for future research in this interesting species. This information improves our understanding of haustorium development in root hemiparasitic species and will allow further exploration of the detailed molecular mechanisms underlying plant parasitism.

  12. Differential Impact of Tobacco Control Policies on Youth Sub-Populations

    Directory of Open Access Journals (Sweden)

    John A. Tauras

    2013-09-01

    Full Text Available Background: While previous studies have demonstrated the efficacy of tobacco control interventions in reducing tobacco use among youth overall, there have been very few studies that examine the potential differential impact of tobacco control policies on various youth subgroups, defined by socio-economic status (SES, race/ethnicity, and gender. Objective: We examined the relationship between state-level cigarette prices and smoke-free air laws and youth smoking prevalence and intensity for various youth sub-populations in the United States. Methods: We estimated a 2-part model of cigarette demand using data from the 1991 through 2010 nationally representative surveys of 8th-, 10th-, and 12th-grade students as part of the Monitoring the Future project. Findings: We found that real cigarette prices are strong determinants of youth smoking. Blacks, females, Hispanics, and low-SES subpopulations are found to have a larger price response with respect to smoking prevalence than the full sample. Smoke-free air laws are found to have a negative effect on smoking prevalence for the full sample and for the male, white, and high-SES sub-populations. Conclusions: This research concludes that higher cigarette prices will reduce smoking prevalence rates of Blacks, Hispanics, females, and low-SES subpopulations faster than the overall youth population and other youth sub-populations. Moreover, this research concludes that smoke-free air laws will reduce smoking prevalence for the overall youth population with the largest reductions in high SES and male subpopulations.

  13. Solution scanning as a key policy tool: identifying management interventions to help maintain and enhance regulating ecosystem services

    Directory of Open Access Journals (Sweden)

    William J. Sutherland

    2014-06-01

    Full Text Available The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We

  14. A Video Analysis of Intra- and Interprofessional Leadership Behaviors Within "The Burns Suite": Identifying Key Leadership Models.

    Science.gov (United States)

    Sadideen, Hazim; Weldon, Sharon-Marie; Saadeddin, Munir; Loon, Mark; Kneebone, Roger

    2016-01-01

    Leadership is particularly important in complex highly interprofessional health care contexts involving a number of staff, some from the same specialty (intraprofessional), and others from different specialties (interprofessional). The authors recently published the concept of "The Burns Suite" (TBS) as a novel simulation tool to deliver interprofessional and teamwork training. It is unclear which leadership behaviors are the most important in an interprofessional burns resuscitation scenario, and whether they can be modeled on to current leadership theory. The purpose of this study was to perform a comprehensive video analysis of leadership behaviors within TBS. A total of 3 burns resuscitation simulations within TBS were recorded. The video analysis was grounded-theory inspired. Using predefined criteria, actions/interactions deemed as leadership behaviors were identified. Using an inductive iterative process, 8 main leadership behaviors were identified. Cohen's κ coefficient was used to measure inter-rater agreement and calculated as κ = 0.7 (substantial agreement). Each video was watched 4 times, focusing on 1 of the 4 team members per viewing (senior surgeon, senior nurse, trainee surgeon, and trainee nurse). The frequency and types of leadership behavior of each of the 4 team members were recorded. Statistical significance to assess any differences was assessed using analysis of variance, whereby a p Leadership behaviors were triangulated with verbal cues and actions from the videos. All 3 scenarios were successfully completed. The mean scenario length was 22 minutes. A total of 362 leadership behaviors were recorded from the 12 participants. The most evident leadership behaviors of all team members were adhering to guidelines (which effectively equates to following Advanced Trauma and Life Support/Emergency Management of Severe Burns resuscitation guidelines and hence "maintaining standards"), followed by making decisions. Although in terms of total

  15. Comparative and functional genomics of Legionella identified eukaryotic like proteins as key players in host-pathogen interactions

    Directory of Open Access Journals (Sweden)

    Laura eGomez-Valero

    2011-10-01

    Full Text Available Although best known for its ability to cause severe pneumonia in people whose immune defenses are weakened, Legionella pneumophila and Legionella longbeachae are two species of a large genus of bacteria that are ubiquitous in nature, where they parasitize protozoa. Adaptation to the host environment and exploitation of host cell functions are critical for the success of these intracellular pathogens. The establishment and publication of the complete genome sequences of L. pneumophila and L. longbeachae isolates paved the way for major breakthroughs in understanding the biology of these organisms. In this review we present the knowledge gained from the analyses and comparison of the complete genome sequences of different L. pneumophila and L. longbeachae strains. Emphasis is given on putative virulence and Legionella life cycle related functions, such as the identification of an extended array of eukaryotic-like proteins, many of which have been shown to modulate host cell functions to the pathogen's advantage. Surprisingly, many of the eukaryotic domain proteins identified in L. pneumophila as well as many substrates of the Dot/Icm type IV secretion system essential for intracellular replication are different between these two species, although they cause the same disease. Finally, evolutionary aspects regarding the eukaryotic like proteins in Legionella are discussed.

  16. Statistical study to identify the key factors governing ground water recharge in the watersheds of the arid Central Asia.

    Science.gov (United States)

    Zhu, Binq-Qi; Wang, Yue-Ling

    2016-01-01

    Understanding the source and recharge of ground waters is of great significance to our knowledge in hydrological cycles in arid environments over the world. Northern Xinjiang in northwestern China is a significant repository of information relating to the hydrological evolution and climatic changes in central Asia. In this study, two multivariate statistical techniques, hierarchical cluster analysis (HCA) and principal component analysis (PCA), were used to assess the ground water recharge and its governing factors, with the principal idea of exploring the above techniques to utilize all available hydrogeochemical variables in the quality assessment, which are not considered in the conventional techniques like Stiff and Piper diagrams. Q-mode HCA and R-mode PCA were combined to partition the water samples into seven major water clusters (C1-C7) and three principal components (PC1-PC3, PC1 salinity, PC2 hydroclimate, PC3 contaminant). The water samples C1 + C4 were classified as recharge area waters (Ca-HCO3 water), C2 + C3 as transitional zone waters (Ca-Mg-HCO3-SO4 water), and C5 + C6 + C7 as discharge area waters (Na-SO4 water). Based on the Q-mode PCA scores, three groups of geochemical processes influencing recharge regimes were identified: geogenic (i.e., caused by natural geochemical processes), geomorphoclimatic (caused by topography and climate), and anthropogenic (caused by ground water contamination). It is proposed that differences in recharge mechanism and ground water evolution, and possible bedrock composition difference, are responsible for the chemical genesis of these waters. These will continue to influence the geochemistry of the northern Xinjiang drainage system for a long time due to its steady tectonics and arid climate. This study proved that the chemistry differentiation of ground water can effectively support the identification of ground water recharge and evolution patterns.

  17. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  18. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  19. Radiographic investigation of in vivo endodontically treated maxillary premolars in a Saudi Arabian sub-population

    Directory of Open Access Journals (Sweden)

    Saad Al-Nazhan

    2012-01-01

    Full Text Available Aim: To determine the prevalence of the number of root canals in permanent maxillary first and second premolars of a Saudi Arabian sub-population. Results will be compared to previous Asian studies. Materials and Methods: A total of 894 periapical radiographs of endodontically treated maxillary first and second premolars of 628 Saudi patients (268 males and 360 females were viewed. The teeth were segregated into maxillary first premolars (463 and maxillary second premolars (431. The diagnostic, working length, master cone and final films with different angles were mounted, projected and, with the utilization of written clinical records, evaluated. Teeth with multiple canal systems were categorized according to whether the canals exited the root by common or separate apical foramen. Data was analyzed statistically using Chi-square test and professional t-test, by comparing pairs of groups with the significant level established at 5% (P < 0.05. Results: More than 90% of first maxillary premolar and more than 50% of the second maxillary premolar was found to have two canals. There was no significant difference between male (92% and female (95% in the distribution of the two root canals of the first maxillary premolar (t-test = 1.21, P value = 0.228, however, there was significant difference between the distributions of male (69.4% and female (52.2% of the two root canals within the second maxillary premolar (t-test = 3.75, P value = 0.000. Few teeth showed three canals. Conclusion: The number of root canals of the maxillary first premolar in Saudi population shows a higher incidence of two canals (93.6% than previously reported. In addition, the figure is higher than most of the Asian countries.

  20. Comparison of tumor biology of two distinct cell sub-populations in lung cancer stem cells.

    Science.gov (United States)

    Wang, Jianyu; Sun, Zhiwei; Liu, Yongli; Kong, Liangsheng; Zhou, Shixia; Tang, Junlin; Xing, Hongmei Rosie

    2017-11-14

    Characterization of the stem-like properties of cancer stem cells (CSCs) remain indirect and qualitative, especially the ability of CSCs to undergo asymmetric cell division for self renewal and differentiation, a unique property of cells of stem origin. It is partly due to the lack of stable cellular models of CSCs. In this study, we developed a new approach for CSC isolation and purification to derive a CSC-enriched cell line (LLC-SE). By conducting five consecutive rounds of single cell cloning using the LLC-SE cell line, we obtained two distinct sub-population of cells within the Lewis lung cancer CSCs that employed largely symmetric division for self-renewal (LLC-SD) or underwent asymmetric division for differentiation (LLC-ASD). LLC-SD and LLC-ASD cell lines could be stably passaged in culture and be distinguished by cell morphology, stem cell marker, spheroid formation and subcutaneous tumor initiation efficiency, as well as orthotopic lung tumor growth, progression and survival. The ability LLC-ASD cells to undergo asymmetric division was visualized and quantified by the asymmetric segregation of labeled BrdU and NUMB to one of the two daughter cells in anaphase cell division. The more stem-like LLC-SD cells exhibited higher capacity for tumorigenesis and progression and shorter survival. As few as 10 LLC-SD could initiate subcutaneous tumor growth when transplanted to the athymic mice. Collectively, these observations suggest that the SD-type of cells appear to be on the top of the hierarchical order of the CSCs. Furthermore, they have lead to generated cellular models of CSC self-renewal for future mechanistic investigations.

  1. The expression of Toll-like receptor 4, 7 and co-receptors in neurochemical sub-populations of rat trigeminal ganglion sensory neurons.

    Science.gov (United States)

    Helley, M P; Abate, W; Jackson, S K; Bennett, J H; Thompson, S W N

    2015-12-03

    The recent discovery that mammalian nociceptors express Toll-like receptors (TLRs) has raised the possibility that these cells directly detect and respond to pathogens with implications for either direct nociceptor activation or sensitization. A range of neuronal TLRs have been identified, however a detailed description regarding the distribution of expression of these receptors within sub-populations of sensory neurons is lacking. There is also some debate as to the composition of the TLR4 receptor complex on sensory neurons. Here we use a range of techniques to quantify the expression of TLR4, TLR7 and some associated molecules within neurochemically-identified sub-populations of trigeminal (TG) and dorsal root (DRG) ganglion sensory neurons. We also detail the pattern of expression and co-expression of two isoforms of lysophosphatidylcholine acyltransferase (LPCAT), a phospholipid remodeling enzyme previously shown to be involved in the lipopolysaccharide-dependent TLR4 response in monocytes, within sensory ganglia. Immunohistochemistry shows that both TLR4 and TLR7 preferentially co-localize with transient receptor potential vallinoid 1 (TRPV1) and purinergic receptor P2X ligand-gated ion channel 3 (P2X3), markers of nociceptor populations, within both TG and DRG. A gene expression profile shows that TG sensory neurons express a range of TLR-associated molecules. LPCAT1 is expressed by a proportion of both nociceptors and non-nociceptive neurons. LPCAT2 immunostaining is absent from neuronal profiles within both TG and DRG and is confined to non-neuronal cell types under naïve conditions. Together, our results show that nociceptors express the molecular machinery required to directly respond to pathogenic challenge independently from the innate immune system. Copyright © 2015 IBRO. Published by Elsevier Ltd. All rights reserved.

  2. Distinct DNA methylation epigenotypes in bladder cancer from different Chinese sub-populations and its implication in cancer detection using voided urine

    Directory of Open Access Journals (Sweden)

    Tong Joanna HM

    2011-05-01

    Full Text Available Abstract Background Bladder cancer is the sixth most common cancer in the world and the incidence is particularly high in southwestern Taiwan. Previous studies have identified several tumor-related genes that are hypermethylated in bladder cancer; however the DNA methylation profile of bladder cancer in Taiwan is not fully understood. Methods In this study, we compared the DNA methylation profile of multiple tumor suppressor genes (APC, DAPK, E-cadherin, hMLH1, IRF8, p14, p15, RASSF1A, SFRP1 and SOCS-1 in bladder cancer patients from different Chinese sub-populations including Taiwan (104 cases, Hong Kong (82 cases and China (24 cases by MSP. Two normal human urothelium were also included as control. To investigate the diagnostic potential of using DNA methylation in non-invasive detection of bladder cancer, degree of methylation of DAPK, IRF8, p14, RASSF1A and SFRP1 was also accessed by quantitative MSP in urine samples from thirty bladder cancer patients and nineteen non-cancer controls. Results There were distinct DNA methylation epigenotypes among the different sub-populations. Further, samples from Taiwan and China demonstrated a bimodal distribution suggesting that CpG island methylator phentotype (CIMP is presented in bladder cancer. Moreover, the number of methylated genes in samples from Taiwan and Hong Kong were significantly correlated with histological grade (P SFRP1, IRF8, APC and RASSF1A were significantly associated with increased tumor grade, stage. Methylation of RASSF1A was associated with tumor recurrence. Patients with methylation of APC or RASSF1A were also significantly associated with shorter recurrence-free survival. For methylation detection in voided urine samples of cancer patients, the sensitivity and specificity of using any of the methylated genes (IRF8, p14 or sFRP1 by qMSP was 86.7% and 94.7%. Conclusions Our results indicate that there are distinct methylation epigenotypes among different Chinese sub-populations

  3. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-01-19

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018. Published by Elsevier B.V.

  4. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  6. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis).

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants' growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., 'Photosynthesis'), GO terms (e.g., 'response to karrikin') and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology.

  7. How cannabis causes paranoia: using the intravenous administration of ∆9-tetrahydrocannabinol (THC) to identify key cognitive mechanisms leading to paranoia.

    Science.gov (United States)

    Freeman, Daniel; Dunn, Graham; Murray, Robin M; Evans, Nicole; Lister, Rachel; Antley, Angus; Slater, Mel; Godlewska, Beata; Cornish, Robert; Williams, Jonathan; Di Simplicio, Martina; Igoumenou, Artemis; Brenneisen, Rudolf; Tunbridge, Elizabeth M; Harrison, Paul J; Harmer, Catherine J; Cowen, Philip; Morrison, Paul D

    2015-03-01

    Paranoia is receiving increasing attention in its own right, since it is a central experience of psychotic disorders and a marker of the health of a society. Paranoia is associated with use of the most commonly taken illicit drug, cannabis. The objective was to determine whether the principal psychoactive ingredient of cannabis-∆(9)-tetrahydrocannabinol (THC)-causes paranoia and to use the drug as a probe to identify key cognitive mechanisms underlying paranoia. A randomized, placebo-controlled, between-groups test of the effects of intravenous THC was conducted. A total of 121 individuals with paranoid ideation were randomized to receive placebo, THC, or THC preceded by a cognitive awareness condition. Paranoia was assessed extensively via a real social situation, an immersive virtual reality experiment, and standard self-report and interviewer measures. Putative causal factors were assessed. Principal components analysis was used to create a composite paranoia score and composite causal variables to be tested in a mediation analysis. THC significantly increased paranoia, negative affect (anxiety, worry, depression, negative thoughts about the self), and a range of anomalous experiences, and reduced working memory capacity. The increase in negative affect and in anomalous experiences fully accounted for the increase in paranoia. Working memory changes did not lead to paranoia. Making participants aware of the effects of THC had little impact. In this largest study of intravenous THC, it was definitively demonstrated that the drug triggers paranoid thoughts in vulnerable individuals. The most likely mechanism of action causing paranoia was the generation of negative affect and anomalous experiences. © The Author 2014. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  8. P53 and MITF/Bcl-2 identified as key pathways in the acquired resistance of NRAS-mutant melanoma to MEK inhibition.

    Science.gov (United States)

    Najem, Ahmad; Krayem, Mohammad; Salès, François; Hussein, Nader; Badran, Bassam; Robert, Caroline; Awada, Ahmad; Journe, Fabrice; Ghanem, Ghanem E

    2017-09-01

    inhibition to induce massive apoptosis in NRAS-mutant melanoma cells with wild-type or mutant p53. Hence, our data identify MITF/Bcl-2 as a key mechanism underlying resistance of NRAS-mutant melanoma cells to apoptosis by MEK inhibitors and paves the way for a promising drug combination that could prevent or reverse anti-MEK resistance in this group of patients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Does the sex difference in competitiveness decrease in selective sub-populations? A test with intercollegiate distance runners

    Directory of Open Access Journals (Sweden)

    Robert O. Deaner

    2015-04-01

    Full Text Available Sex differences in some preferences and motivations are well established, but it is unclear whether they persist in selective sub-populations, such as expert financial decision makers, top scientists, or elite athletes. We addressed this issue by studying competitiveness in 1,147 varsity intercollegiate distance runners. As expected, across all runners, men reported greater competitiveness with two previously validated instruments, greater competitiveness on a new elite competitiveness scale, and greater training volume, a known correlate of competitiveness. Among faster runners, the sex difference decreased for one measure of competitiveness but did not decrease for the two other competitiveness measures or either measure of training volume. Across NCAA athletic divisions (DI, DII, DIII, the sex difference did not decrease for any competitiveness or training measure. Further analyses showed that these sex differences could not be attributed to women suffering more injuries or facing greater childcare responsibilities. However, women did report greater commitment than men to their academic studies, suggesting a sex difference in priorities. Therefore, policies aiming to provide men and women with equal opportunities to flourish should acknowledge that sex differences in some kinds of preferences and motivation may persist even in selective sub-populations.

  10. Does the sex difference in competitiveness decrease in selective sub-populations? A test with intercollegiate distance runners.

    Science.gov (United States)

    Deaner, Robert O; Lowen, Aaron; Rogers, William; Saksa, Eric

    2015-01-01

    Sex differences in some preferences and motivations are well established, but it is unclear whether they persist in selective sub-populations, such as expert financial decision makers, top scientists, or elite athletes. We addressed this issue by studying competitiveness in 1,147 varsity intercollegiate distance runners. As expected, across all runners, men reported greater competitiveness with two previously validated instruments, greater competitiveness on a new elite competitiveness scale, and greater training volume, a known correlate of competitiveness. Among faster runners, the sex difference decreased for one measure of competitiveness but did not decrease for the two other competitiveness measures or either measure of training volume. Across NCAA athletic divisions (DI, DII, DIII), the sex difference did not decrease for any competitiveness or training measure. Further analyses showed that these sex differences could not be attributed to women suffering more injuries or facing greater childcare responsibilities. However, women did report greater commitment than men to their academic studies, suggesting a sex difference in priorities. Therefore, policies aiming to provide men and women with equal opportunities to flourish should acknowledge that sex differences in some kinds of preferences and motivation may persist even in selective sub-populations.

  11. Ogyges Kaup, a flightless genus of Passalidae (Coleoptera) from Mesoamerica: nine new species, a key to identify species, and a novel character to support its monophyly.

    Science.gov (United States)

    Cano, Enio B

    2014-12-02

    Nine new species of Ogyges Kaup (Coleoptera: Passalidae) from the mountainous cloud forests of Mesoamerica are described: O. handali new species and O. menchuae new species from Guatemala; O. cavei new species, O. laurae new species, O. llama new species, O. mutenroshii new species, O. ratcliffei new species, and O. toriyamai new species from Honduras; and O. sandinoi new species from Nicaragua, the first objective record of the genus for this country. A key to the adult Ogyges is included. The work also shows that Ogyges possesses an exclusive autapomorphy: a trituberculate suprainternal tooth of each mandible (one long and wide apical tubercle and two connected, small, almost conical, basal tubercles). This character state is found in all known Ogyges species and is proposed as a synapomorphy that supports the monophyly of the genus.

  12. Key molecular processes of the diapause to post-diapause quiescence transition in the alfalfa leafcutting bee Megachile rotundata identified by comparative transcriptome analysis

    Science.gov (United States)

    Insect diapause (dormancy) synchronizes an insect’s life cycle to seasonal changes in the abiotic and biotic resources required for development and reproduction. Transcription analysis of Megachile rotundata diapause termination identified 399 post-diapause upregulated and 144 post-diapause down-reg...

  13. Identifying key domains of health-related quality of life for patients with chronic obstructive pulmonary disease: interviews with healthcare professionals

    NARCIS (Netherlands)

    Paap, Muirne; Bode, Christina; Lenferink, Lonneke I.M.; Terwee, Caroline B.; van der Palen, Jacobus Adrianus Maria

    2015-01-01

    Purpose The aim of this paper is to identify which domains of health-related quality of life (HRQoL) are most important for patients with chronic obstructive pulmonary disease (COPD), from the perspective of healthcare professionals (HCPs). Methods Thirteen Dutch HCPs [six pulmonologists, three

  14. Identifying and Supporting English Learner Students with Learning Disabilities: Key Issues in the Literature and State Practice. REL 2015-086

    Science.gov (United States)

    Burr, Elizabeth; Haas, Eric; Ferriere, Karen

    2015-01-01

    While the literature on learning disabilities and on second-language acquisition is relatively extensive within the field of education, less is known about the specific characteristics and representation of English learner students with learning disabilities. Because there are no definitive resources and processes for identifying and determining…

  15. Identifying key domains of health-related quality of life for patients with chronic obstructive pulmonary disease : interviews with healthcare professionals

    NARCIS (Netherlands)

    Paap, Muirne C. S.; Bode, Christina; Lenferink, Lonneke I.M.; Terwee, Caroline B.; van der Palen, Job

    PURPOSE: The aim of this paper is to identify which domains of health-related quality of life (HRQoL) are most important for patients with chronic obstructive pulmonary disease (COPD), from the perspective of healthcare professionals (HCPs). METHODS: Thirteen Dutch HCPs [six pulmonologists, three

  16. Differential dopamine-induced prolactin mRNA levels in various prolactin-secreting cell (sub)populations.

    Science.gov (United States)

    Kazemzadeh, M; Velkeniers, B; Herregodts, P; Collumbien, R; Finné, E; Derde, M P; Vanhaelst, L; Hooghe-Peters, E L

    1992-03-01

    We have examined the effects of dopamine on prolactin gene expression using quantitative in-situ hybridization histochemistry in different pituitary cell (sub)populations separated according to their density on a discontinuous Percoll gradient. Administration of dopamine resulted in a drastic reduction in hybridization of 35S-labelled DNA probe complementary to prolactin mRNA in total pituitary cells and in lactotrophs with low density. In contrast, dopamine significantly stimulated mRNA accumulation in prolactin-secreting cells with high density compared with other cell layers. The combined use of Percoll gradient and quantitative in-situ hybridization is a valuable and sensitive method with which to examine prolactin-secreting cell response to a given stimulation. Prolactin-secreting cells with high and low density clearly show functional heterogeneity in their response to dopamine.

  17. Kinome-wide shRNA Screen Identifies the Receptor Tyrosine Kinase AXL as a Key Regulator for Mesenchymal Glioblastoma Stem-like Cells

    Directory of Open Access Journals (Sweden)

    Peng Cheng

    2015-05-01

    Full Text Available Glioblastoma is a highly lethal cancer for which novel therapeutics are urgently needed. Two distinct subtypes of glioblastoma stem-like cells (GSCs were recently identified: mesenchymal (MES and proneural (PN. To identify mechanisms to target the more aggressive MES GSCs, we combined transcriptomic expression analysis and kinome-wide short hairpin RNA screening of MES and PN GSCs. In comparison to PN GSCs, we found significant upregulation and phosphorylation of the receptor tyrosine kinase AXL in MES GSCs. Knockdown of AXL significantly decreased MES GSC self-renewal capacity in vitro and inhibited the growth of glioblastoma patient-derived xenografts. Moreover, inhibition of AXL with shRNA or pharmacologic inhibitors also increased cell death significantly more in MES GSCs. Clinically, AXL expression was elevated in the MES GBM subtype and significantly correlated with poor prognosis in multiple cancers. In conclusion, we identified AXL as a potential molecular target for novel approaches to treat glioblastoma and other solid cancers.

  18. Identifying the Areas Benefitting from the Prevention of Wind Erosion by the Key Ecological Function Area for the Protection of Desertification in Hunshandake, China

    Directory of Open Access Journals (Sweden)

    Yu Xiao

    2017-10-01

    Full Text Available Research on the spatial flow of ecosystem services can help to identify the spatial relationships between service-providing areas (SPAs and service-benefitting areas (SBAs. In this study, we used the Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT model to stimulate the flow paths of the wind erosion prevented by ecosystems in Hunshandake, China. By interpolating these paths, the SBAs were identified, and their benefits in terms of land cover, population, and Gross Domestic Product (GDP were determined. The results indicated that the flow paths mostly extended to the eastern part of the study area, and the estimated cover of the SBAs was 39.21% of the total area of China. The grid cells through which many (≥10% of the trajectories passed were mainly located in the western part of north-eastern China and the eastern part of northern China. The benefitting population accounted for 74.51% of the total population of China, and the GDP was 67.11% of the total in 2010. Based on this research, we described a quantitative relationship between the SPAs and the SBAs and identified the actual beneficiaries. This work may provide scientific knowledge that can be used by decision makers to develop management strategies, such as ecological compensation to mitigate damage from sandstorms in the study area.

  19. Resolution of Two Sub-Populations of Conformers and Their Individual Dynamics by Time Resolved Ensemble Level FRET Measurements.

    Directory of Open Access Journals (Sweden)

    Gil Rahamim

    Full Text Available Most active biopolymers are dynamic structures; thus, ensembles of such molecules should be characterized by distributions of intra- or intermolecular distances and their fast fluctuations. A method of choice to determine intramolecular distances is based on Förster resonance energy transfer (FRET measurements. Major advances in such measurements were achieved by single molecule FRET measurements. Here, we show that by global analysis of the decay of the emission of both the donor and the acceptor it is also possible to resolve two sub-populations in a mixture of two ensembles of biopolymers by time resolved FRET (trFRET measurements at the ensemble level. We show that two individual intramolecular distance distributions can be determined and characterized in terms of their individual means, full width at half maximum (FWHM, and two corresponding diffusion coefficients which reflect the rates of fast ns fluctuations within each sub-population. An important advantage of the ensemble level trFRET measurements is the ability to use low molecular weight small-sized probes and to determine nanosecond fluctuations of the distance between the probes. The limits of the possible resolution were first tested by simulation and then by preparation of mixtures of two model peptides. The first labeled polypeptide was a relatively rigid Pro7 and the second polypeptide was a flexible molecule consisting of (Gly-Ser7 repeats. The end to end distance distributions and the diffusion coefficients of each peptide were determined. Global analysis of trFRET measurements of a series of mixtures of polypeptides recovered two end-to-end distance distributions and associated intramolecular diffusion coefficients, which were very close to those determined from each of the pure samples. This study is a proof of concept study demonstrating the power of ensemble level trFRET based methods in resolution of subpopulations in ensembles of flexible macromolecules.

  20. A multi-omics approach identifies key hubs associated with cell type-specific responses of airway epithelial cells to staphylococcal alpha-toxin.

    Directory of Open Access Journals (Sweden)

    Erik Richter

    Full Text Available Responsiveness of cells to alpha-toxin (Hla from Staphylococcus aureus appears to occur in a cell-type dependent manner. Here, we compare two human bronchial epithelial cell lines, i.e. Hla-susceptible 16HBE14o- and Hla-resistant S9 cells, by a quantitative multi-omics strategy for a better understanding of Hla-induced cellular programs. Phosphoproteomics revealed a substantial impact on phosphorylation-dependent signaling in both cell models and highlights alterations in signaling pathways associated with cell-cell and cell-matrix contacts as well as the actin cytoskeleton as key features of early rHla-induced effects. Along comparable changes in down-stream activity of major protein kinases significant differences between both models were found upon rHla-treatment including activation of the epidermal growth factor receptor EGFR and mitogen-activated protein kinases MAPK1/3 signaling in S9 and repression in 16HBE14o- cells. System-wide transcript and protein expression profiling indicate induction of an immediate early response in either model. In addition, EGFR and MAPK1/3-mediated changes in gene expression suggest cellular recovery and survival in S9 cells but cell death in 16HBE14o- cells. Strikingly, inhibition of the EGFR sensitized S9 cells to Hla indicating that the cellular capacity of activation of the EGFR is a major protective determinant against Hla-mediated cytotoxic effects.

  1. Linking policy to research, capacity building and practice : A study to identify key factors for successful linkages between policy, research and capacity building, and practice within the Policy Support Cluster International (BOCI) Programme funded by LNV

    NARCIS (Netherlands)

    Hek, de S.; Kusters, C.S.L.; Schaap, M.

    2008-01-01

    The objective of this study was “to identify the key factors that enhance successful linkages in terms of knowledge between policy and research & capacity building and practice in the international arena and to draw lessons of it that can support policy workers to improve these linkages”. This

  2. Generalized Linear Models to Identify Key Hydromorphological and Chemical Variables Determining the Occurrence of Macroinvertebrates in the Guayas River Basin (Ecuador

    Directory of Open Access Journals (Sweden)

    Minar Naomi Damanik-Ambarita

    2016-07-01

    Full Text Available The biotic integrity of the Guayas River basin in Ecuador is at environmental risk due to extensive anthropogenic activities. We investigated the potential impacts of hydromorphological and chemical variables on biotic integrity using macroinvertebrate-based bioassessments. The bioassessment methods utilized included the Biological Monitoring Working Party adapted for Colombia (BMWP-Col and the average score per taxon (ASPT, via an extensive sampling campaign that was completed throughout the river basin at 120 sampling sites. The BMWP-Col classification ranged from very bad to good, and from probable severe pollution to clean water based on the ASPT scores. Generalized linear models (GLMs and sensitivity analysis were used to relate the bioassessment index to hydromorphological and chemical variables. It was found that elevation, nitrate-N, sediment angularity, logs, presence of macrophytes, flow velocity, turbidity, bank shape, land use and chlorophyll were the key environmental variables affecting the BMWP-Col. From the analyses, it was observed that the rivers at the upstream higher elevations of the river basin were in better condition compared to lowland systems and that a higher flow velocity was linked to a better BMWP-Col score. The nitrate concentrations were very low in the entire river basin and did not relate to a negative impact on the macroinvertebrate communities. Although the results of the models provided insights into the ecosystem, cross fold model development and validation also showed that there was a level of uncertainty in the outcomes. However, the results of the models and sensitivity analysis can support water management actions to determine and focus on alterable variables, such as the land use at different elevations, monitoring of nitrate and chlorophyll concentrations, macrophyte presence, sediment transport and bank stability.

  3. Combined Chlorophyll Fluorescence and Transcriptomic Analysis Identifies the P3/P4 Transition as a Key Stage in Rice Leaf Photosynthetic Development1[OPEN

    Science.gov (United States)

    Yaapar, Muhammad N.; Wanchana, Samart; Thakur, Vivek; Quick, W. Paul

    2016-01-01

    Leaves are derived from heterotrophic meristem tissue that, at some point, must make the transition to autotrophy via the initiation of photosynthesis. However, the timing and spatial coordination of the molecular and cellular processes underpinning this switch are poorly characterized. Here, we report on the identification of a specific stage in rice (Oryza sativa) leaf development (P3/P4 transition) when photosynthetic competence is first established. Using a combined physiological and molecular approach, we show that elements of stomatal and vascular differentiation are coordinated with the onset of measurable light absorption for photosynthesis. Moreover, by exploring the response of the system to environmental perturbation, we show that the earliest stages of rice leaf development have significant plasticity with respect to elements of cellular differentiation of relevance for mature leaf photosynthetic performance. Finally, by performing an RNA sequencing analysis targeted at the early stages of rice leaf development, we uncover a palette of genes whose expression likely underpins the acquisition of photosynthetic capability. Our results identify the P3/P4 transition as a highly dynamic stage in rice leaf development when several processes for the initiation of photosynthetic competence are coordinated. As well as identifying gene targets for future manipulation of rice leaf structure/function, our data highlight a developmental window during which such manipulations are likely to be most effective. PMID:26813793

  4. An image-based RNAi screen identifies SH3BP1 as a key effector of Semaphorin 3E–PlexinD1 signaling

    Science.gov (United States)

    Tata, Aleksandra; Stoppel, David C.; Hong, Shangyu; Ben-Zvi, Ayal; Xie, Tiao

    2014-01-01

    Extracellular signals have to be precisely interpreted intracellularly and translated into diverse cellular behaviors often mediated by cytoskeletal changes. Semaphorins are one of the largest families of guidance cues and play a critical role in many systems. However, how different cell types translate extracellular semaphorin binding into intracellular signaling remains unclear. Here we developed and performed a novel image-based genome-wide functional RNAi screen for downstream signaling molecules that convert the interaction between Semaphorin 3E (Sema3E) and PlexinD1 into cellular behaviors. One of the genes identified in this screen is a RhoGAP protein, SH3-domain binding protein 1 (SH3BP1). We demonstrate that SH3BP1 mediates Sema3E-induced cell collapse through interaction with PlexinD1 and regulation of Ras-related C3 botulinum toxin substrate 1 (Rac1) activity. The identification and characterization of SH3BP1 as a novel downstream effector of Sema3E-PlexinD1 provides an explanation for how extracellular signals are translated into cytoskeletal changes and unique cell behavior, but also lays the foundation for characterizing other genes identified from our screen to obtain a more complete picture of plexin signaling. PMID:24841563

  5. An image-based RNAi screen identifies SH3BP1 as a key effector of Semaphorin 3E-PlexinD1 signaling.

    Science.gov (United States)

    Tata, Aleksandra; Stoppel, David C; Hong, Shangyu; Ben-Zvi, Ayal; Xie, Tiao; Gu, Chenghua

    2014-05-26

    Extracellular signals have to be precisely interpreted intracellularly and translated into diverse cellular behaviors often mediated by cytoskeletal changes. Semaphorins are one of the largest families of guidance cues and play a critical role in many systems. However, how different cell types translate extracellular semaphorin binding into intracellular signaling remains unclear. Here we developed and performed a novel image-based genome-wide functional RNAi screen for downstream signaling molecules that convert the interaction between Semaphorin 3E (Sema3E) and PlexinD1 into cellular behaviors. One of the genes identified in this screen is a RhoGAP protein, SH3-domain binding protein 1 (SH3BP1). We demonstrate that SH3BP1 mediates Sema3E-induced cell collapse through interaction with PlexinD1 and regulation of Ras-related C3 botulinum toxin substrate 1 (Rac1) activity. The identification and characterization of SH3BP1 as a novel downstream effector of Sema3E-PlexinD1 provides an explanation for how extracellular signals are translated into cytoskeletal changes and unique cell behavior, but also lays the foundation for characterizing other genes identified from our screen to obtain a more complete picture of plexin signaling. © 2014 Tata et al.

  6. Labonté Identifies Key Issues for Health Promoters in the New World Order Comment on "Health Promotion in an Age of Normative Equity and Rampant Inequality".

    Science.gov (United States)

    Raphael, Dennis Raphael

    2016-11-02

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to - and opportunities for -health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations' 2015 Sustainable Development Goals (SDGs) can offer a new direction for health promoters in these difficult times. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  7. Travel patterns and characteristics of foreign-born sub-population in New York state

    Energy Technology Data Exchange (ETDEWEB)

    Chin, Shih-Miao [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hwang, Ho-Ling [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Reuscher, Tim [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wilson, Daniel W. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-10-01

    According to the 2010 Census, over 22% of total New York State (NYS) residents were foreign-born and over one in three persons living in New York City (NYC) were foreign-born. Foreign-born and their dependents impact local economies in many different ways, including purchasing power, transportation service needs, business sales and receipts generated, and workforce. To allow better policy decision making and program planning of transportation developments and investments in NYS, a clear understanding of the foreign-born population’s travel characteristics and behaviors, as well as their unique transportation service needs, are necessary. This report documents the characteristics of the foreign-born population and identified differences in travel behaviors and mobility issues between foreign-born residents of NYS and their U.S.-born counterparts.

  8. Integrated analysis of oral tongue squamous cell carcinoma identifies key variants and pathways linked to risk habits, HPV, clinical parameters and tumor recurrence [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Neeraja Krishnan

    2015-11-01

    Full Text Available Oral tongue squamous cell carcinomas (OTSCC are a homogeneous group of tumors characterized by aggressive behavior, early spread to lymph nodes and a higher rate of regional failure. Additionally, the incidence of OTSCC among younger population (<50yrs is on the rise; many of whom lack the typical associated risk factors of alcohol and/or tobacco exposure. We present data on single nucleotide variations (SNVs, indels, regions with loss of heterozygosity (LOH, and copy number variations (CNVs from fifty-paired oral tongue primary tumors and link the significant somatic variants with clinical parameters, epidemiological factors including human papilloma virus (HPV infection and tumor recurrence. Apart from the frequent somatic variants harbored in TP53, CASP8, RASA1, NOTCH and CDKN2A genes, significant amplifications and/or deletions were detected in chromosomes 6-9, and 11 in the tumors. Variants in CASP8 and CDKN2A were mutually exclusive. CDKN2A, PIK3CA, RASA1 and DMD variants were exclusively linked to smoking, chewing, HPV infection and tumor stage. We also performed a whole-genome gene expression study that identified matrix metalloproteases to be highly expressed in tumors and linked pathways involving arachidonic acid and NF-k-B to habits and distant metastasis, respectively. Functional knockdown studies in cell lines demonstrated the role of CASP8 in a HPV-negative OTSCC cell line. Finally, we identified a 38-gene minimal signature that predicts tumor recurrence using an ensemble machine-learning method. Taken together, this study links molecular signatures to various clinical and epidemiological factors in a homogeneous tumor population with a relatively high HPV prevalence.

  9. Transmission dynamics of pulmonary tuberculosis between autochthonous and immigrant sub-populations

    Directory of Open Access Journals (Sweden)

    Becher Heiko

    2009-12-01

    Full Text Available Abstract Background The overall incidence of tuberculosis (TB in Western Europe has been declining since the 19th Century. However, immigrant sub-groups from high-prevalence countries are slowing down this trend. The aim of this study was to describe how immigration influences TB transmission in Germany. For that we prospectively investigated the dynamics of TB transmission between TB high-prevalence immigrant and TB low-prevalence local populations with molecular epidemiological methods and conventional contact investigations. Besides, we assessed transmission in relation to social mixing using an innovative tool that measures the integration of immigrants into the local social environment. Methods A prospective study of confirmed culture positive cases of pulmonary TB and their contacts was carried out in a German federal state from 2003 to 2005. Data for the study included: 1 case data routinely collected by the local public health staff and transmitted to the state health office and the national surveillance centre, 2 a study questionnaire designed to capture social interactions of relevance for TB transmission and 3 molecular genotyping data (IS6110 DNA fingerprint and spoligotyping. The proportion of German cases caused by foreign-born cases, and vice versa, was estimated and an integration index was computed using a selected set of questions from the study questionnaire. Results A total of 749 cases of culture-positive pulmonary tuberculosis voluntarily enrolled in the study, representing 57.8% of all registered cases diagnosed over the study period. Data that included study questionnaire and DNA fingerprinting were available for 41% (n = 308 of the study participants. Forty-seven clusters, defined as a least two cases infected by the same TB strains, were identified by molecular methods and included 132 (17% of the study participants. Epidemiological links were identified for 28% of the clusters by conventional epidemiological data. In

  10. Understanding the distribution of marine megafauna in the English channel region: identifying key habitats for conservation within the busiest seaway on earth.

    Science.gov (United States)

    McClellan, Catherine M; Brereton, Tom; Dell'Amico, Florence; Johns, David G; Cucknell, Anna-C; Patrick, Samantha C; Penrose, Rod; Ridoux, Vincent; Solandt, Jean-Luc; Stephan, Eric; Votier, Stephen C; Williams, Ruth; Godley, Brendan J

    2014-01-01

    The temperate waters of the North-Eastern Atlantic have a long history of maritime resource richness and, as a result, the European Union is endeavouring to maintain regional productivity and biodiversity. At the intersection of these aims lies potential conflict, signalling the need for integrated, cross-border management approaches. This paper focuses on the marine megafauna of the region. This guild of consumers was formerly abundant, but is now depleted and protected under various national and international legislative structures. We present a meta-analysis of available megafauna datasets using presence-only distribution models to characterise suitable habitat and identify spatially-important regions within the English Channel and southern bight of the North Sea. The integration of studies from dedicated and opportunistic observer programmes in the United Kingdom and France provide a valuable perspective on the spatial and seasonal distribution of various taxonomic groups, including large pelagic fishes and sharks, marine mammals, seabirds and marine turtles. The Western English Channel emerged as a hotspot of biodiversity for megafauna, while species richness was low in the Eastern English Channel. Spatial conservation planning is complicated by the highly mobile nature of marine megafauna, however they are important components of the marine environment and understanding their distribution is a first crucial step toward their inclusion into marine ecosystem management.

  11. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance.

    Directory of Open Access Journals (Sweden)

    Daniel M Bean

    Full Text Available The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King's College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A 'core' subnetwork containing only 13-17% of all edges channelled 83-90% of the patient flow, while an 'ephemeral' network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing.

  12. Paving the Way to Successful Implementation: Identifying Key Barriers to Use of Technology-Based Therapeutic Tools for Behavioral Health Care.

    Science.gov (United States)

    Ramsey, Alex; Lord, Sarah; Torrey, John; Marsch, Lisa; Lardiere, Michael

    2016-01-01

    This study aimed to identify barriers to use of technology for behavioral health care from the perspective of care decision makers at community behavioral health organizations. As part of a larger survey of technology readiness, 260 care decision makers completed an open-ended question about perceived barriers to use of technology. Using the Consolidated Framework for Implementation Research (CFIR), qualitative analyses yielded barrier themes related to characteristics of technology (e.g., cost and privacy), potential end users (e.g., technology literacy and attitudes about technology), organization structure and climate (e.g., budget and infrastructure), and factors external to organizations (e.g., broadband accessibility and reimbursement policies). Number of reported barriers was higher among respondents representing agencies with lower annual budgets and smaller client bases relative to higher budget, larger clientele organizations. Individual barriers were differentially associated with budget, size of client base, and geographic location. Results are discussed in light of implementation science frameworks and proactive strategies to address perceived obstacles to adoption and use of technology-based behavioral health tools.

  13. The green shoots of a novel training programme: progress and identified key actions to providing services to MSM at Kenyan health facilities

    Directory of Open Access Journals (Sweden)

    Elise M van der Elst

    2015-10-01

    Full Text Available Introduction: Although men who have sex with men (MSM in sub-Saharan Africa are at high risk for HIV acquisition, access to and quality of health and HIV services within this population are negatively affected by stigma and capacity within the health sector. A recently developed online MSM training programme (www.marps-africa.org was shown to contribute to reductions in MSM prejudice among healthcare providers (HCPs in coastal Kenya. In this study, we used qualitative methods to explore the provision of MSM healthcare services two years post-training in coastal Kenya. Methods: From February to July 2014, we held 10 focus group discussions (FGD with 63 participants, including HCP from 25 facilities, county AIDS coordinators and MSM from local support groups. Participants discussed availability, acceptability and accessibility of HIV healthcare for MSM. HCP also discussed changes in their health service practices after completing the training. FGD were recorded, transcribed verbatim and analyzed using Ritchie and Spencer's “framework approach” for qualitative data. Results: HCPs described continued improvements in their ability to provide service in a non-stigmatizing way to MSM patients since completing the training programme and expressed comfort engaging MSM patients in care. Four additional recommendations for improving MSM healthcare services were identified: 1 expanding the reach of MSM sensitivity training across the medical education continuum; 2 establishing guidelines to manage sexually transmitted anal infections; 3 promoting legal and policy reforms to support integration of MSM-appropriate services into healthcare; and 4 including MSM information in national reporting tools for HIV services. Conclusions: Positive impacts of this sensitivity and skills training programme were reflected in HCP attitudes two years post-intervention. Scaling-up of efforts will rely on continued policies to include MSM in healthcare programmes to

  14. Novel insights into CB1 cannabinoid receptor signaling: a key interaction identified between the extracellular-3 loop and transmembrane helix 2.

    Science.gov (United States)

    Marcu, Jahan; Shore, Derek M; Kapur, Ankur; Trznadel, Megan; Makriyannis, Alexandros; Reggio, Patricia H; Abood, Mary E

    2013-05-01

    Activation of the cannabinoid CB1 receptor (CB1) is modulated by aspartate residue D2.63(176) in transmembrane helix (TMH) 2. Interestingly, D2.63 does not affect the affinity for ligand binding at the CB1 receptor. Studies in class A G protein-coupled receptors have suggested an ionic interaction between residues of TMH2 and 7. In this report, modeling studies identified residue K373 in the extracellular-3 (EC-3) loop in charged interactions with D2.63. We investigated this possibility by performing reciprocal mutations and biochemical studies. D2.63(176)A, K373A, D2.63(176)A-K373A, and the reciprocal mutant with the interacting residues juxtaposed D2.63(176)K-K373D were characterized using radioligand binding and guanosine 5'-3-O-(thio)triphosphate functional assays. None of the mutations resulted in a significant change in the binding affinity of N-(piperidiny-1-yl)-5-(4-chlorophenyl)-1-(2,4-dichloro-phenyl)-4-methyl-1H-pyrazole-3-carboxamide hydrochloride (SR141716A) or (-)-3cis -[2-hydroxyl-4-(1,1-dimethyl-heptyl)phenyl]-trans-4-[3-hydroxyl-propyl] cyclohexan-1-ol (CP55,940). Modeling studies indicated that binding-site interactions and energies of interaction for CP55,940 were similar between wild-type and mutant receptors. However, the signaling of CP55,940, and (R)-(+)-[2,3-dihydro-5-methyl-3-[(4-morpholinyl)methyl]-pyrrolo[1,2,3-de]-1,4-benzoxazin-6-yl](1-naphthalenyl)-methanone mesylate (WIN55,212-2) was impaired at the D2.63(176)A-K373A and the single-alanine mutants. In contrast, the reciprocal D2.63(176)K-K373D mutant regained function for both CP55,940 and WIN55,212-2. Computational results indicate that the D2.63(176)-K373 ionic interaction strongly influences the conformation(s) of the EC-3 loop, providing a structure-based rationale for the importance of the EC-3 loop to signal transduction in CB1. The putative ionic interaction results in the EC-3 loop pulling over the top (extracellular side) of the receptor; this EC-3 loop conformation may serve

  15. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  16. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  17. Unravelling the differential functions and regulation of striatal neuron sub-populations in motor control, reward and motivational processes

    Directory of Open Access Journals (Sweden)

    Sabrina eEna

    2011-07-01

    Full Text Available The striatum, the major input structure of the basal ganglia, is critically involved in motor control and learning of habits and skills, and is also involved in motivational and reward processes. The dorsal striatum, caudate-putamen, is primarily implicated in motor functions whereas the ventral striatum, the nucleus accumbens, is essential for motivation and drug reinforcement. Severe basal ganglia dysfunction occurs in movement disorders as Parkinson’s and Huntington’s disease, and in psychiatric disorders such as schizophrenia and drug addiction. The striatum is essentially composed of GABAergic medium-sized spiny neurons (MSNs that are output neurons giving rise to the so-called direct and indirect pathways and are targets of the cerebral cortex and mesencephalic dopaminergic neurons. Although the involvement of striatal sub-areas in motor control and motivation has been thoroughly characterized, major issues remained concerning the specific and respective functions of the two MSNs sub-populations, D2R-striatopallidal (dopamine D2 receptor-positive and D1R-striatonigral (dopamine D1 receptor-positive neurons, as well as their specific regulation. Here, we review recent advances that gave new insight in the understanding of the differential roles of striatopallidal and striatonigral neurons in the basal ganglia circuit. We discuss innovative techniques developed in the last decade which allowed a much precise evaluation of molecular pathways implicated in motivational processes and functional roles of striatopallidal and striatonigral neurons in motor control and in the establishment of reward-associated behaviour.

  18. Macrophage sub-populations and the lipoxin A4 receptor implicate active inflammation during equine tendon repair.

    Directory of Open Access Journals (Sweden)

    Stephanie Georgina Dakin

    Full Text Available Macrophages (Mφ orchestrate inflammatory and reparatory processes in injured connective tissues but their role during different phases of tendon healing is not known. We investigated the contribution of different Mφ subsets in an equine model of naturally occurring tendon injury. Post mortem tissues were harvested from normal (uninjured, sub-acute (3-6 weeks post injury and chronically injured (>3 months post injury superficial digital flexor tendons. To determine if inflammation was present in injured tendons, Mφ sub-populations were quantified based on surface antigen expression of CD172a (pan Mφ, CD14(highCD206(low (pro-inflammatory M1Mφ, and CD206(high (anti-inflammatory M2Mφ to assess potential polarised phenotypes. In addition, the Lipoxin A(4 receptor (FPR2/ALX was used as marker for resolving inflammation. Normal tendons were negative for both Mφ and FPR2/ALX. In contrast, M1Mφ predominated in sub-acute injury, whereas a potential phenotype-switch to M2Mφ polarity was seen in chronic injury. Furthermore, FPR2/ALX expression by tenocytes was significantly upregulated in sub-acute but not chronic injury. Expression of the FPR2/ALX ligand Annexin A1 was also significantly increased in sub-acute and chronic injuries in contrast to low level expression in normal tendons. The combination of reduced FPR2/ALX expression and persistence of the M2Mφ phenotype in chronic injury suggests a potential mechanism for incomplete resolution of inflammation after tendon injury. To investigate the effect of pro-inflammatory mediators on lipoxin A(4 (LXA(4 production and FPR2/ALX expression in vitro, normal tendon explants were stimulated with interleukin-1 beta and prostaglandin E(2. Stimulation with either mediator induced LXA(4 release and maximal upregulation of FPR2/ALX expression after 72 hours. Taken together, our data suggests that although tenocytes are capable of mounting a protective mechanism to counteract inflammatory stimuli, this

  19. Macrophage Sub-Populations and the Lipoxin A4 Receptor Implicate Active Inflammation during Equine Tendon Repair

    Science.gov (United States)

    Dakin, Stephanie Georgina; Werling, Dirk; Hibbert, Andrew; Abayasekara, Dilkush Robert Ephrem; Young, Natalie Jayne; Smith, Roger Kenneth Whealands; Dudhia, Jayesh

    2012-01-01

    Macrophages (Mϕ) orchestrate inflammatory and reparatory processes in injured connective tissues but their role during different phases of tendon healing is not known. We investigated the contribution of different Mϕ subsets in an equine model of naturally occurring tendon injury. Post mortem tissues were harvested from normal (uninjured), sub-acute (3–6 weeks post injury) and chronically injured (>3 months post injury) superficial digital flexor tendons. To determine if inflammation was present in injured tendons, Mϕ sub-populations were quantified based on surface antigen expression of CD172a (pan Mϕ), CD14highCD206low (pro-inflammatory M1Mϕ), and CD206high (anti-inflammatory M2Mϕ) to assess potential polarised phenotypes. In addition, the Lipoxin A4 receptor (FPR2/ALX) was used as marker for resolving inflammation. Normal tendons were negative for both Mϕ and FPR2/ALX. In contrast, M1Mϕ predominated in sub-acute injury, whereas a potential phenotype-switch to M2Mϕ polarity was seen in chronic injury. Furthermore, FPR2/ALX expression by tenocytes was significantly upregulated in sub-acute but not chronic injury. Expression of the FPR2/ALX ligand Annexin A1 was also significantly increased in sub-acute and chronic injuries in contrast to low level expression in normal tendons. The combination of reduced FPR2/ALX expression and persistence of the M2Mϕ phenotype in chronic injury suggests a potential mechanism for incomplete resolution of inflammation after tendon injury. To investigate the effect of pro-inflammatory mediators on lipoxin A4 (LXA4) production and FPR2/ALX expression in vitro, normal tendon explants were stimulated with interleukin-1 beta and prostaglandin E2. Stimulation with either mediator induced LXA4 release and maximal upregulation of FPR2/ALX expression after 72 hours. Taken together, our data suggests that although tenocytes are capable of mounting a protective mechanism to counteract inflammatory stimuli, this appears to be of

  20. Key Nutrients.

    Science.gov (United States)

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  1. Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development[W][OPEN

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-01-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named “fight-club hubs” characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named “switch genes” was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. PMID:25490918

  2. Mycobacterial Cultures Contain Cell Size and Density Specific Sub-populations of Cells with Significant Differential Susceptibility to Antibiotics, Oxidative and Nitrite Stress

    Science.gov (United States)

    Vijay, Srinivasan; Nair, Rashmi Ravindran; Sharan, Deepti; Jakkala, Kishor; Mukkayyan, Nagaraja; Swaminath, Sharmada; Pradhan, Atul; Joshi, Niranjan V.; Ajitkumar, Parthasarathi

    2017-01-01

    The present study shows the existence of two specific sub-populations of Mycobacterium smegmatis and Mycobacterium tuberculosis cells differing in size and density, in the mid-log phase (MLP) cultures, with significant differential susceptibility to antibiotic, oxidative, and nitrite stress. One of these sub-populations (~10% of the total population), contained short-sized cells (SCs) generated through highly-deviated asymmetric cell division (ACD) of normal/long-sized mother cells and symmetric cell divisions (SCD) of short-sized mother cells. The other sub-population (~90% of the total population) contained normal/long-sized cells (NCs). The SCs were acid-fast stainable and heat-susceptible, and contained high density of membrane vesicles (MVs, known to be lipid-rich) on their surface, while the NCs possessed negligible density of MVs on the surface, as revealed by scanning and transmission electron microscopy. Percoll density gradient fractionation of MLP cultures showed the SCs-enriched fraction (SCF) at lower density (probably indicating lipid-richness) and the NCs-enriched fraction (NCF) at higher density of percoll fractions. While live cell imaging showed that the SCs and the NCs could grow and divide to form colony on agarose pads, the SCF, and NCF cells could independently regenerate MLP populations in liquid and solid media, indicating their full genomic content and population regeneration potential. CFU based assays showed the SCF cells to be significantly more susceptible than NCF cells to a range of concentrations of rifampicin and isoniazid (antibiotic stress), H2O2 (oxidative stress),and acidified NaNO2 (nitrite stress). Live cell imaging showed significantly higher susceptibility of the SCs of SC-NC sister daughter cell pairs, formed from highly-deviated ACD of normal/long-sized mother cells, to rifampicin and H2O2, as compared to the sister daughter NCs, irrespective of their comparable growth rates. The SC-SC sister daughter cell pairs, formed

  3. How aluminum adjuvants could promote and enhance non-target IgE synthesis in a genetically-vulnerable sub-population.

    Science.gov (United States)

    Terhune, Todd D; Deth, Richard C

    2013-01-01

    Aluminum-containing adjuvants increase the effectiveness of vaccination, but their ability to augment immune responsiveness also carries the risk of eliciting non-target responses, especially in genetically susceptible individuals. This study reviews the relevant actions of aluminum adjuvants and sources of genetic risk that can combine to adversely affect a vulnerable sub-population. Aluminum adjuvants promote oxidative stress and increase inflammasome activity, leading to the release of IL-1β, IL-18, and IL-33, but not the important regulatory cytokine IL-12. In addition, they stimulate macrophages to produce PGE₂, which also has a role in regulating immune responses. This aluminum-induced cytokine context leads to a T(H)2 immune response, characterized by the further release of IL-3, IL-4, IL-5, IL-9, IL-13, and IgE-potentiating factors such as sCD23. Genetic variants in cytokine genes, such as IL-4, IL-13, IL-33, and IL-18 influence the response to vaccines in children and are also associated with atopy. These genetic factors may therefore define a genetically-vulnerable sub-population, children with a family history of atopy, who may experience an exaggerated T(H)2 immune response to aluminum-containing vaccines. IL-4, sCD23, and IgE are common factors for both atopy and the immune-stimulating properties of aluminum adjuvants. IL-4 is critical in the production of IgE and total IgE up-regulation. IL-4 has also been reported to induce the production of sCD23 and trigger resting sIgM+, sIgD+ B-cells to switch to sIgE+ B-cells, making them targets for IgE-potentiating factors. Further, the actions of IgE-potentiating factors on sIgE+ B-cells are polyclonal and unrestricted, triggering their differentiation into IgE-forming plasma cells. These actions provide a mechanism for aluminum-adjuvant promotion and enhancement of non-target IgE in a genetically vulnerable sub-population. Identification of these individuals may decrease the risk of adverse events

  4. A 'fragile cell' sub-population revealed during cytometric assessment of Saccharomyces cerevisiae viability in lipid-limited alcoholic fermentation.

    Science.gov (United States)

    Delobel, P; Pradal, M; Blondin, B; Tesniere, C

    2012-11-01

    To show that in anaerobic fermentation with limiting lipid nutrients, cell preparation impacts the viability assessment of yeast cells, and to identify the factors involved. Saccharomyces cerevisiae viability was determined using propidium iodide staining and the flow cytometry. Analyses identified intact cells, dead cells and, under certain conditions, the presence of a third subpopulation of apparently damaged cells. This intermediate population could account for up to 40% of the entire cell population. We describe, analyse and discuss the effects of different solutions for cell resuspension on the respective proportion of these three populations, in particular that of the intermediate population. We show that this intermediate cell population forms in the absence of Ca(2+)/Mg(2+). Cell preparation significantly impacts population viability assessment by FCM. The intermediate population, revealed under certain conditions, could be renamed as 'fragile cells'. For these cells, Ca(2+) and Mg(2+) reduce cell membrane permeability to PI. This is the first study that analyses and discusses the factors influencing the formation of an intermediate population when studying viability in yeast alcoholic fermentation. With a wider application in biological research, this study provides important support to the relatively new questioning of propidium iodide staining as a universal cell death indicator. © 2012 The Authors. Letters in Applied Microbiology © 2012 The Society for Applied Microbiology.

  5. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    In this manner, key dimensions were identified and defined. The results revealed that, although international descriptions are available for 100% of the key measurements, major problems seem to be experienced with landmarking, and with consensus about the measuring method and about landmarking. If one assumes ...

  6. Moving forward with actionable therapeutic targets and opportunities in endometrial cancer : NCI clinical trials planning meeting report on identifying key genes and molecular pathways for targeted endometrial cancer trials

    NARCIS (Netherlands)

    MacKay, Helen J; Levine, Douglas A; Bae-Jump, Victoria L; Bell, Daphne W; McAlpine, Jessica N; Santin, Alessandro; Fleming, Gini F; Mutch, David G; Nephew, Kenneth P; Wentzensen, Nicolas; Goodfellow, Paul J; Dorigo, Oliver; Nijman, Hans W; Broaddus, Russell; Kohn, Elise C

    2017-01-01

    The incidence and mortality rates from endometrial cancer are increasing. There have been no new drugs approved for the treatment of endometrial cancer in decades. The National Cancer Institute, Gynecologic Cancer Steering Committee identified the integration of molecular and/or histologic

  7. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  8. Labonté Identifies Key Issues for Health Promoters in the New World Order; Comment on “Health Promotion in an Age of Normative Equity and Rampant Inequality”

    Directory of Open Access Journals (Sweden)

    Dennis Raphael

    2017-07-01

    Full Text Available For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations’ 2015 Sustainable Development Goals (SDGs can offer a new direction for health promoters in these difficult times.

  9. Metrics for Local Community Planning and Evaluation: The Case for Observational Measurement of High Risk Rural Sub-Populations in Occupant Safety

    Directory of Open Access Journals (Sweden)

    Steve Davidson

    2013-08-01

    Full Text Available Introduction: The purpose of this study is to examine the relevance of non-specific safety belt use data for interventions to rural teens and to pilot a data collection project to provide more specific data to traffic safety stakeholders and educators in rural areas.Methods: Twelve high schools in Southeast Georgia were used for observed safety belt data collection over a 16 month period. Observational surveys were conducted at the entrance to student parking lots of the studied schools in the morning or afternoon. Observers were trained and survey methods were standardized to maintain comparability between results.Results: Observational surveys revealed a safety belt usage rate of 38.6% among high schools teens at the studied high schools. Safety belt usage rates ranged from 9.5% to 66.9%. Observed safety belt use for female vehicle occupants was 48.4% compared to 35.6% for males.Conclusion: The observational survey results from this study support research showing that rural teens have lower safety belt usage rates than adults or urban teens. Despite efforts to target rural areas, programs must specifically target sub populations, especially rural male teens, in order to hold any traction. Because of the wide gap between measured safety belt use in rural Georgia (79.9% and the studied rural high schools (38.6%, local program planners must assess actual safety belt usage in their high risk rural teen population in order to use accurate metrics for intervention and education efforts. [West J Emerg Med. 2013;14(4:380-383.

  10. Molecular dynamics simulations of Hsp40 J-domain mutants identifies disruption of the critical HPD-motif as the key factor for impaired curing in vivo of the yeast prion [URE3].

    Science.gov (United States)

    Xue, You-Lin; Wang, Hao; Riedy, Michael; Roberts, Brittany-Lee; Sun, Yuna; Song, Yong-Bo; Jones, Gary W; Masison, Daniel C; Song, Youtao

    2017-08-02

    Genetic screens using Saccharomyces cerevisiae have identified an array of Hsp40 (Ydj1p) J-domain mutants that are impaired in the ability to cure the yeast [URE3] prion through disrupting functional interactions with Hsp70. However, biochemical analysis of some of these Hsp40 J-domain mutants has so far failed to provide major insight into the specific functional changes in Hsp40-Hsp70 interactions. To explore the detailed structural and dynamic properties of the Hsp40 J-domain, 20 ns molecular dynamic simulations of 4 mutants (D9A, D36A, A30T, and F45S) and wild-type J-domain were performed, followed by Hsp70 docking simulations. Results demonstrated that although the Hsp70 interaction mechanism of the mutants may vary, the major structural change was targeted to the critical HPD motif of the J-domain. Our computational analysis fits well with previous yeast genetics studies regarding highlighting the importance of J-domain function in prion propagation. During the molecular dynamics simulations several important residues were identified and predicted to play an essential role in J-domain structure. Among these residues, Y26 and F45 were confirmed, using both in silico and in vivo methods, as being critical for Ydj1p function.

  11. "Key Concepts in ELT": Taking Stock

    Science.gov (United States)

    Hall, Graham

    2012-01-01

    This article identifies patterns and trends within "Key Concepts in ELT", both since the inception of the feature in ELT Journal in 1993 and during the 17 years of the current editorship. After outlining the aims of the series, the article identifies key themes that have emerged over time, exploring the links between "Key Concepts" pieces and the…

  12. Predicted sub-populations in a marine shrimp proteome as revealed by combined EST and cDNA data from multiple Penaeus species

    Science.gov (United States)

    2010-01-01

    Background Many species of marine shrimp in the Family Penaeidae, viz. Penaeus (Litopenaeus) vannamei, Penaeus monodon, Penaeus (Fenneropenaeus) chinensis, and Penaeus (Marsupenaeus) japonicus, are animals of economic importance in the aquaculture industry. Yet information about their DNA and protein sequences is lacking. In order to predict their collective proteome, we combined over 270,000 available EST and cDNA sequences from the 4 shrimp species with all protein sequences of Drosophila melanogaster and Caenorhabditis elegans. EST data from 4 other crustaceans, the crab Carcinus maenas, the lobster Homarus americanus (Decapoda), the water flea Daphnia pulex, and the brine shrimp Artemia franciscana were also used. Findings Similarity searches from EST collections of the 4 shrimp species matched 64% of the protein sequences of the fruit fly, but only 45% of nematode proteins, indicating that the shrimp proteome content is more similar to that of an insect than a nematode. Combined results with 4 additional non-shrimp crustaceans increased matching to 78% of fruit fly and 56% of nematode proteins, suggesting that present shrimp EST collections still lack sequences for many conserved crustacean proteins. Analysis of matching data revealed the presence of 4 EST groups from shrimp, namely sequences for proteins that are both fruit fly-like and nematode-like, fruit fly-like only, nematode-like only, and non-matching. Gene ontology profiles of proteins for the 3 matching EST groups were analyzed. For non-matching ESTs, a small fraction matched protein sequences from other species in the UniProt database, including other crustacean-specific proteins. Conclusions Shrimp ESTs indicated that the shrimp proteome is comprised of sub-populations of proteins similar to those common to both insect and nematode models, those present specifically in either model, or neither. Combining small EST collections from related species to compensate for their small size allowed

  13. Predicted sub-populations in a marine shrimp proteome as revealed by combined EST and cDNA data from multiple Penaeus species

    Directory of Open Access Journals (Sweden)

    Kotewong Rattanawadee

    2010-11-01

    Full Text Available Abstract Background Many species of marine shrimp in the Family Penaeidae, viz. Penaeus (Litopenaeus vannamei, Penaeus monodon, Penaeus (Fenneropenaeus chinensis, and Penaeus (Marsupenaeus japonicus, are animals of economic importance in the aquaculture industry. Yet information about their DNA and protein sequences is lacking. In order to predict their collective proteome, we combined over 270,000 available EST and cDNA sequences from the 4 shrimp species with all protein sequences of Drosophila melanogaster and Caenorhabditis elegans. EST data from 4 other crustaceans, the crab Carcinus maenas, the lobster Homarus americanus (Decapoda, the water flea Daphnia pulex, and the brine shrimp Artemia franciscana were also used. Findings Similarity searches from EST collections of the 4 shrimp species matched 64% of the protein sequences of the fruit fly, but only 45% of nematode proteins, indicating that the shrimp proteome content is more similar to that of an insect than a nematode. Combined results with 4 additional non-shrimp crustaceans increased matching to 78% of fruit fly and 56% of nematode proteins, suggesting that present shrimp EST collections still lack sequences for many conserved crustacean proteins. Analysis of matching data revealed the presence of 4 EST groups from shrimp, namely sequences for proteins that are both fruit fly-like and nematode-like, fruit fly-like only, nematode-like only, and non-matching. Gene ontology profiles of proteins for the 3 matching EST groups were analyzed. For non-matching ESTs, a small fraction matched protein sequences from other species in the UniProt database, including other crustacean-specific proteins. Conclusions Shrimp ESTs indicated that the shrimp proteome is comprised of sub-populations of proteins similar to those common to both insect and nematode models, those present specifically in either model, or neither. Combining small EST collections from related species to compensate for their

  14. The Rome II and Rome III criteria identify the same subtype-populations in irritable bowel syndrome

    DEFF Research Database (Denmark)

    Engsbro, A L; Simrén, M; Bytzer, P

    2012-01-01

    For comparing trials using different classifications for irritable bowel syndrome (IBS) subtypes, it is important to know whether these identify the same sub-populations. Our aim was to determine the agreement between Rome II and Rome III subtypes, and to explore whether agreement depends...

  15. Identifying key processes in the hydrochemistry of a basin through ...

    Indian Academy of Sciences (India)

    been affected by geothermal heat which is insignif- icant at those depths. As a result, the weather- ing of silicate minerals, which is usually facili- tated by higher temperatures and low pH, will be slower. The same applies to all reactions that usu- ally require higher temperatures than room tem- perature conditions to be ...

  16. Identifying key processes in the hydrochemistry of a basin through ...

    Indian Academy of Sciences (India)

    R-mode factor analysis was applied to the data of 13 physico-chemical parameters and 50 samples in order to determine the major sources of variation in the hydrochemistry of some aquifers in the western region of Ghana. In this study, three sources of variation in the hydrochemistry were distinguished: the dissolution of ...

  17. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  18. IDENTIFYING KEY TRENDS OF DIRECT SALES IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    MĂDĂLINA BRUTU

    2012-01-01

    Full Text Available Selling is the most representative marketing action; without customers there is no organization, and without sales there is no customer. Selling does not mean only to conclude a business (giving an economical good and receiving an amount of money, but also to obtain satisfied, loyal customers. An alternative to the traditional sale is the direct sale. The main objective of this paper is to present briefly the opinions of some renowned researchers regarding selling in general, and direct selling in particular; the righteous dimensioning of direct selling within the European Union and Romania, detecting Romania’s deviations towards the European Union in relation with the characteristics of direct selling, achieving researches, through the SPSS program, which can detect the main trends of direct selling within the European Union.

  19. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Currently, the methods used to assess the veld condition of the Lambert's Bay Strandveld along the West Coast of South Africa require that the operator knows all the plants encountered in the survey area. In this study data were collected from several farms in the Lambert's Bay Strandveld to establish a degradation gradient ...

  20. A novel proteogenomics approach identifying key proteins in severe COPD

    NARCIS (Netherlands)

    Brandsma, C.A.; Guryev, V.; Timens, W.; Postma, D.S.; Bischoff, R.; Yakovleva, M.; Marko-Varga, G.; Fehniger, T.; Van Den Berge, M.; Horvatovich, P.

    2017-01-01

    Rationale COPD is influenced by many genetic and environmental factors. Genetic studies provided insights in the molecular mechanisms underlying COPD, but did not inform on protein changes. We propose that whichever factor contributes to disease, the final common pathway for disease development lies

  1. Starting Vortex Identified as Key to Unsteady Ejector Performance

    Science.gov (United States)

    Paxson, Daniel E.

    2004-01-01

    Unsteady ejectors are currently under investigation for use in some pulse-detonation-engine-based propulsion systems. Experimental measurements made in the past, and recently at the NASA Glenn Research Center, have demonstrated that thrust augmentation can be enhanced considerably when the driver is unsteady. In ejector systems, thrust augmentation is defined as = T(sup Total)/T(sup j), where T(sup Total) is the total thrust of the combined ejector and driving jet and T(sup j) is the thrust due to the driving jet alone. There are three images in this figure, one for each of the named thrust sources. The images are color contours of measured instantaneous vorticity. Each image is an ensemble average of at least 150 phase-locked measurements. The flow is from right to left, and the shape and location of each driver is shown on the far right of each image. The emitted vortex is a clearly defined "doughnut" of highly vortical (spinning) flow. In these planar images, the vortex appears as two distorted circles, one above, and one below the axis of symmetry. Because they are spinning in the opposite direction, the two circles have vorticity of opposite sign and thus are different colors. There is also a rectangle shown in each image. Its width represents the ejector diameter that was found experimentally to yield the highest thrust augmentation. It is apparent that the optimal ejector diameter is that which just "captures" the vortex: that is, the diameter bounding the outermost edge of the vortex structure. The exact mechanism behind the enhanced performance is unclear; however, it is believed to be related to the powerful vortex emitted with each pulse of the unsteady driver. As such, particle imaging velocimetry (PIV) measurements were obtained for three unsteady drivers: a pulsejet, a resonance tube, and a speaker-driven jet. All the drivers were tested with ejectors, and all exhibited performance enhancement over similarly sized steady drivers. The characteristic starting vortices of each driver are shown in these images. The images are color contours of measured instantaneous vorticity. Each image is an ensemble average of at least 150 phase-locked measurements. The flow is from right to left. The shape and location of each driver is shown on the far right of each image. The rectangle shown in each image represents the ejector diameter that was found experimentally to yield the highest thrust augmentation. It is apparent that the optimal ejector diameter is that which just "captures" the vortex: that is, the diameter bounding the outermost edge of the vortex structure. Although not shown, it was observed that the emitted vortex spread as it traveled downstream. The spreading rate for the pulsejet is shown as the dashed lines in the top image. A tapered ejector was fabricated that matched this shape. When tested, the ejector demonstrated superior performance to all those previously tested at Glenn (which were essentially of straight, cylindrical form), achieving a remarkable thrust augmentation of 2. The measured thrust augmentation is shown as a function of ejector length. Also shown are the thrust augmentation values achieved with the straight, cylindrical ejectors of varying diameters. Here, thrust augmentation is plotted as a function of ejector length for several families of ejector diameters. It can be seen that large thrust augmentation values are indeed obtained and that they are sensitive to both ejector length and diameter, particularly the latter. Five curves are shown. Four correspond to straight ejector diameters of 2.2, 3.0, 4.0, and 6.0 in. The fifth curve corresponds to the tapered ejector contoured to bound the emitted vortex. For each curve, there are several data points corresponding to different lengths. The largest value of thrust augmentation is 2.0 for the tapered ejector and 1.81 for the straight ejectors. Regardless of their diameters, all the ejectors trend toward peak performance at a particular leng. That the cross-sectional dimensions of optimal ejectors scaled precisely with the vortex dimensions on three separate pulsed thrust sources demonstrates that the action of the vortex is responsible for the enhanced ejector performance. The result also suggests that, in the absence of a complete understanding of the entrainment and augmentation mechanisms, methods of characterizing starting vortices may be useful for correlating and predicting unsteady ejector performance.

  2. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    issues with parents or other adults in responsible positions (for example, teachers or health care workers) (Meekers ... authoritative figures are often unwilling or unable to provide comprehensive, accurate, age-appropriate ... going children and is promoting the development of programmes on life skills and sexual health ...

  3. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    We talk a lot ... she gives me advice even regarding boyfriends and leaves the option for me to decide ... she warns me about the danger of falling pregnant when I am still young ..... and about HIV/AIDS ... However, I have a boyfriend in our neighbourhood and we have sexual intercourse ... my mother does not know about ...

  4. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  5. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  6. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  7. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  8. School Leadership: Some Key Ideas.

    Science.gov (United States)

    Fidler, Brian

    1997-01-01

    Highlights some key ideas and several perspectives on leadership, including: situational leadership; a leadership framework suggested by T.E. Deal and L.G. Bolman; leadership of the chief executive/leading professional; moral leadership; and curricular leadership. Identifies leadership by its contribution to outcomes and its influence on…

  9. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  10. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not

  11. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  12. Keys to the City

    DEFF Research Database (Denmark)

    Monsson, Christian Kjær

    2014-01-01

    Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118......Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118...

  13. Identifying Clients Predisposed To Failure

    Science.gov (United States)

    Carnes, G. D.

    1973-01-01

    Studies are reviewed that report the prediction of rehabilitation failure from personality measures. Related research is discussed that suggest the dynamics underlying a key concept, the "hypochondriacally organized personality" which is identifiable from the Rorschach anatomy response percentage. (Author)

  14. Key Stakeholders' Perceptions of Effective School Leadership

    Science.gov (United States)

    Odhiambo, George; Hii, Amy

    2012-01-01

    There has been limited research on how teachers, parents and students perceive effective school leadership in practice. The purpose of this article is to present some of the findings derived from a study of key stakeholders' perceptions of effective school leadership. Key stakeholders were identified as teachers, students and parents. Data were…

  15. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    National Research Council Canada - National Science Library

    Doris Yohanna Martínez Castrillón

    2016-01-01

    This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable...

  16. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  17. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  18. An investigation into trends in Advanced Placement test taking in science and mathematics among student sub-populations using a longitudinal growth model

    Science.gov (United States)

    Campbell, D. Michael

    The lack of preparation, participation, and equal access of students in mathematics and the science education continues to afflict America's high school system (Ratliff, 2001). Additionally, gender and ethnic status have become significant factors as females and minority subgroups such as African Americans and Hispanics continue to be underrepresented in these two subject fields. Recognizing and understanding these trends is extremely important for the future of this country. As fewer minorities and females become involved in advanced mathematics and science curriculum there will be a continued lack of minorities and females in mathematics and science careers. Additionally, this insufficient representation leads to fewer numbers of females and minorities in industry and educational leadership positions in mathematics and science to promote participation and equality in these fields. According to Brainard and Carlin (2003) as trends currently stand, these two groups will be under-represented in the fields of math and science and will continue to be denied economic and social power. Thus, a better understanding of these trends in participation in mathematics and science among these groups of students is warranted. This study is intended to accomplish four objectives. The first objective is to identify the extent to which opportunities are increasing or decreasing for students in high schools taking mathematics and science Advanced Placement exams by examining six years of student testing data from the College Board. A second objective is to identify features of high schools that relate to greater expansion in Advanced Placement test taking for females and minority groups in the areas of both math and science. A third objective is to explore whether, and to what extent, any social or educational features such as economic status, regional school and living locations, and ethnic backgrounds have enhanced or reduced Advanced Placement testing in these schools. Lastly

  19. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  20. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  1. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  2. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  3. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  4. Chapter 06: Identification key

    Science.gov (United States)

    Alex Wiedenhoeft

    2011-01-01

    The key is written to guide you through the identification process in the most efficient and accurate way possible. It presents you with a numbered series of questions and asks you to answer them. The answers you provide will be based on your interpretations of the anatomical characters in your unknown specimen and will lead you to a new set of questions. Each time you...

  5. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  6. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  7. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Directory of Open Access Journals (Sweden)

    Ting Zhang

    Full Text Available This paper aims to identify the key fields and their key technical points of oncology by patent analysis.Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC and the International Patent Classification (IPC, respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012 and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year and the standardized values of patent applications in seven years (2006-2012 was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones.The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and

  8. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  9. Interpersonal intelligence: key concepts

    Directory of Open Access Journals (Sweden)

    Meritxell Cano

    2011-10-01

    Full Text Available The purpose of this paper is to delimit the conceptual space of interpersonal intelligence, relating it to situations in which it is used. To this end, we first identify some aspects of an intellectual nature and the type of objects represented. The next section is devoted to the origins of interpersonal intelligence and its role in human adaptation. A third section focuses on the type of procedures for its measurement, not as a collection of tools commonly used, but as a way to make explicit the kind of evidence that is appropriate as good indicators of this intelligence. Finally, we describe some of the main confusions associated with the idea of this form of intelligence, integrating all aspects previously discussed.

  10. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  11. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  12. Secret-key certificates (continued)

    NARCIS (Netherlands)

    S.A. Brands (Stefan)

    1995-01-01

    textabstractA new construction is described for designing secret-key certificate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certificate issuing protocols that enable the Certification Authority to certify public keys, without being

  13. Secure key storage and distribution

    Science.gov (United States)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  14. Upregulation of Mrps18a in breast cancer identified by selecting phage antibody libraries on breast tissue sections

    DEFF Research Database (Denmark)

    Sørensen, Karen Marie Juul; Meldgaard, Theresa; Melchjorsen, Connie Jenning

    2017-01-01

    . RESULTS: We identified the mitochondrial ribosomal protein s18a (Mrps18a) as a protein which is upregulated in breast cancer. However, Mrps18a was not homogeneously upregulated in all cancer cells, suggesting the existence of sub-populations within the tumor. The upregulation was not confined...... to cytokeratin 19 and cytokeratin 14 double positive cells. CONCLUSION: This study illustrates how phage display can be applied towards the discovery of proteins which exhibit changes in their expression patterns. We identified the mitochondrial protein Mrps18a as being upregulated in human breast cancer cells...

  15. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross ...

  16. Morphological and growth responses to water stress of two sub-populations of Bromus pictus from soils with contrasting water availability Respuestas morfológicas y de crecimiento al estrés hídrico de dos subpoblaciones de Bromus pictus provenientes de suelos con contrastante disponibilidad de agua

    Directory of Open Access Journals (Sweden)

    JOSÉ L ROTUNDO

    2006-03-01

    Full Text Available We studied morphological and growth responses to drought of two sub-populations of Bromus pictus from communities with soils with different water availability from the Patagonian steppe. After a process of acclimatization common to both sub-populations, individuals from both sub-populations were subjected to three levels of water availability during 44 days. Independently of the water availability treatment, the sub-population from the community of high soil water availability showed higher aboveground relative growth rate (RGR and higher leaf size (area and weight compared to the sub-population from the community of low soil water availability. These results prove the expected evolution of higher growth rates and leaf sizes in resource rich environments. The sub-population from the community with low water availability also showed a higher tillering rate and a more prostrate morph than the sub-population from the community with high water availability. A higher number of small tillers may be a useful strategy for a quick response to water inputs and for distribute the risk of drought-induced mortality. A more prostrate morph may also present advantages like reducing the area exposed to dry air. The results obtained showed that soil heterogeneity may promote genetic variation. We were unable to detect statistically significant interactions between population and water availability treatments. The genetic variation found between the populations may be useful to develop breeding programs of a native species and may also increase the evolutionary potential of a native species to adapt to environmental changesNosotros estudiamos respuestas morfológicas y de crecimiento a la sequía para dos subpoblaciones de Bromus pictus provenientes de comunidades con suelos de distinta disponibilidad de agua en la estepa patagónica. Luego de un proceso de aclimatización común a ambas subpoblaciones, individuos de cada subpoblación fueron sometidos a tres

  17. DECOY STATE QUANTUM KEY DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2010-03-01

    Full Text Available Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.

  18. On the security of a simple three-party key exchange protocol without server's public keys.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  19. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  20. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  1. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  2. An entrepreneurial key competencies’ model

    National Research Council Canada - National Science Library

    Arafeh, Labib

    2016-01-01

    ... worldwide.Furthermore, the paper proposes a softcomputing-based entrepreneurial key competencies’ model (SKECM). This tool is capable of predicting/judging the overall quality of entrepreneurial competencies...

  3. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  4. Key elements for designing a strategy to generate social and ...

    African Journals Online (AJOL)

    This research explores the key elements in designing a strategy when generating social and environmental hospitality value at events is a priority. The study is grounded in empirical data, using music festivals across Europe as case studies. Six key elements have been identified, among which are: visionary leadership, ...

  5. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    time fluctuating nature of flows is clearly understood with the help of advanced instrumentation and computing .... validate numerical models concerned with the design and construction of PKW. Acknowledgements ... Erpicum S, Nagel V and Laugier F 2011 Piano Key Weir design study at Raviege dam. Labyrinth and.

  6. Partitioned key-value store with atomic memory operations

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  7. IMPlementation of A Relatives' Toolkit (IMPART study): an iterative case study to identify key factors impacting on the implementation of a web-based supported self-management intervention for relatives of people with psychosis or bipolar experiences in a National Health Service: a study protocol.

    Science.gov (United States)

    Lobban, Fiona; Appleton, Victoria; Appelbe, Duncan; Barraclough, Johanna; Bowland, Julie; Fisher, Naomi R; Foster, Sheena; Johnson, Sonia; Lewis, Elizabeth; Mateus, Céu; Mezes, Barbara; Murray, Elizabeth; O'Hanlon, Puffin; Pinfold, Vanessa; Rycroft-Malone, Jo; Siddle, Ron; Smith, Jo; Sutton, Chris J; Walker, Andrew; Jones, Steven H

    2017-12-28

    Web-based interventions to support people to manage long-term health conditions are available and effective but rarely used in clinical services. The aim of this study is to identify critical factors impacting on the implementation of an online supported self-management intervention for relatives of people with recent onset psychosis or bipolar disorder into routine clinical care and to use this information to inform an implementation plan to facilitate widespread use and inform wider implementation of digital health interventions. A multiple case study design within six early intervention in psychosis (EIP) services in England, will be used to test and refine theory-driven hypotheses about factors impacting on implementation of the Relatives' Education And Coping Toolkit (REACT). Qualitative data including behavioural observation, document analysis, and in-depth interviews collected in the first two EIP services (wave 1) and analysed using framework analysis, combined with quantitative data describing levels of use by staff and relatives and impact on relatives' distress and wellbeing, will be used to identify factors impacting on implementation. Consultation via stakeholder workshops with staff and relatives and co-facilitated by relatives in the research team will inform development of an implementation plan to address these factors, which will be evaluated and refined in the four subsequent EIP services in waves 2 and 3. Transferability of the implementation plan to non-participating services will be explored. Observation of implementation in a real world clinical setting, across carefully sampled services, in real time provides a unique opportunity to understand factors impacting on implementation likely to be generalizable to other web-based interventions, as well as informing further development of implementation theories. However, there are inherent challenges in investigating implementation without influencing the process under observation. We outline our

  8. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  9. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  10. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  11. Network topology reveals key cardiovascular disease genes.

    Directory of Open Access Journals (Sweden)

    Anida Sarajlić

    Full Text Available The structure of protein-protein interaction (PPI networks has already been successfully used as a source of new biological information. Even though cardiovascular diseases (CVDs are a major global cause of death, many CVD genes still await discovery. We explore ways to utilize the structure of the human PPI network to find important genes for CVDs that should be targeted by drugs. The hope is to use the properties of such important genes to predict new ones, which would in turn improve a choice of therapy. We propose a methodology that examines the PPI network wiring around genes involved in CVDs. We use the methodology to identify a subset of CVD-related genes that are statistically significantly enriched in drug targets and "driver genes." We seek such genes, since driver genes have been proposed to drive onset and progression of a disease. Our identified subset of CVD genes has a large overlap with the Core Diseasome, which has been postulated to be the key to disease formation and hence should be the primary object of therapeutic intervention. This indicates that our methodology identifies "key" genes responsible for CVDs. Thus, we use it to predict new CVD genes and we validate over 70% of our predictions in the literature. Finally, we show that our predicted genes are functionally similar to currently known CVD drug targets, which confirms a potential utility of our methodology towards improving therapy for CVDs.

  12. Right collaborations is the key

    Indian Academy of Sciences (India)

    First page Back Continue Last page Graphics. Right collaborations is the key. Large-scale production and analysis of stress tolerant transgenics needs active collaborations between plant physiologists, biochemists and geneticists. Collaboration between molecular biologists and biochemists is seen. Active collaboration ...

  13. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  14. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  15. Focusing on key development challenges

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strategic Framework to guide our work during 2010–2015. This framework builds on the Centre's strengths ... Focusing on key development challenges. Building on strengths. Meeting tomorrow's ... durable peace, and the inclusion of marginalized groups, particularly women and girls. • Globalization, Growth and Poverty.

  16. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  17. Continuous variable quantum key distribution

    Science.gov (United States)

    Li, Yong-Min; Wang, Xu-Yang; Bai, Zeng-Liang; Liu, Wen-Yuan; Yang, Shen-Shen; Peng, Kun-Chi

    2017-04-01

    Not Available Project supported by the National Natural Science Foundation of China (Grant Nos. 61378010 and 11504219), the Key Project of the Ministry of Science and Technology of China (Grant No. 2016YFA0301403), the Natural Science Foundation of Shanxi Province, China (Grant No. 2014011007-1), and the Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi Province, China.

  18. KEY TOPICS IN SPORTS MEDICINE

    OpenAIRE

    Amir Ali Narvani; Panagiotis Thomas; Burce Lynn

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  19. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  20. The Body: The Key Concepts

    OpenAIRE

    Blackman, Lisa

    2008-01-01

    Questions around 'the body' are central to social theory. Our changing understanding of the body now challenges the ways we conceive power, ideology, subjectivity and social and cultural process. The Body: the key concepts highlights and analyses the debates which make the body central to current sociological, psychological, cultural and feminist thinking. Today, questions around the body are intrinsic to a wide range of debates - from technological developments in media and communications, t...

  1. Disarming the Key Leader Engagement

    Science.gov (United States)

    2010-09-01

    niques and the managed expectation of key leader engagement effects. Effects are not immediate, and we must build them with candor, genuine concern...security agreement for U.S. forces? The agree- ment was understood in theory , but its application generated a litany of ques- tions. However, one...thing was clear: the way ahead would require systematic engagements with Iraqi leaders to leverage their powers of public persuasion. Military

  2. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  3. Detector decoy quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Moroder, Tobias; Luetkenhaus, Norbert [Quantum Information Theory Group, Institute of Theoretical Physics I, University Erlangen-Nuremberg, Staudtstrasse 7/B2, 91058 Erlangen (Germany); Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Spain)], E-mail: tmoroder@iqc.ca

    2009-04-15

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  4. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  5. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  6. Identifiability in stochastic models

    CERN Document Server

    1992-01-01

    The problem of identifiability is basic to all statistical methods and data analysis, occurring in such diverse areas as Reliability Theory, Survival Analysis, and Econometrics, where stochastic modeling is widely used. Mathematics dealing with identifiability per se is closely related to the so-called branch of ""characterization problems"" in Probability Theory. This book brings together relevant material on identifiability as it occurs in these diverse fields.

  7. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  8. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  9. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  10. Hemodialysis Key Features Mining and Patients Clustering Technologies

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2012-01-01

    Full Text Available The kidneys are very vital organs. Failing kidneys lose their ability to filter out waste products, resulting in kidney disease. To extend or save the lives of patients with impaired kidney function, kidney replacement is typically utilized, such as hemodialysis. This work uses an entropy function to identify key features related to hemodialysis. By identifying these key features, one can determine whether a patient requires hemodialysis. This work uses these key features as dimensions in cluster analysis. The key features can effectively determine whether a patient requires hemodialysis. The proposed data mining scheme finds association rules of each cluster. Hidden rules for causing any kidney disease can therefore be identified. The contributions and key points of this paper are as follows. (1 This paper finds some key features that can be used to predict the patient who may has high probability to perform hemodialysis. (2 The proposed scheme applies k-means clustering algorithm with the key features to category the patients. (3 A data mining technique is used to find the association rules from each cluster. (4 The mined rules can be used to determine whether a patient requires hemodialysis.

  11. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  12. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  13. Nephrology key information for internists.

    Science.gov (United States)

    Salim, Sohail Abdul; Medaura, Juan A; Malhotra, Bharat; Garla, Vishnu; Ahuja, Shradha; Lawson, Nicki; Pamarthy, Amaleswari; Sonani, Hardik; Kovvuru, Karthik; Palabindala, Venkataraman

    2017-03-01

    Hospitalists and primary care physicians encounter renal disease daily. Although most cases of acute kidney injury (AKI) are secondary to dehydration and resolve by giving fluids, many cases of AKI are due to not uncommon but unfamiliar causes needing nephrology evaluation. Common indications to consult a nephrologist on an emergency basis include hyperkalemia or volume overload in end stage renal disease patients (ESRD). Other causes of immediate consultation are cresenteric glomerulonephritis / rapidly progressive glomerulonephritis in which renal prognosis of the patient depends on timely intervention. The following evidence-based key information could improve patient care and outcomes. Abbreviations: AKI: Acute kidney injury ESRD: End stage renal disease patients.

  14. Key Note: Living with droughts?

    OpenAIRE

    Erdbrink, C. D.; van Beek, Eelco; van Os, A.G.

    2008-01-01

    The Netherlands Center for River Research (NCR) in its first 10 years of existence has focused its activities on flooding. Climate change might cause that droughts will become as important as or even more important than floods. The dry year 2003 in Europe has shown the huge socio-economic impacts of droughts. New concepts are emerging on how to deal with droughts. This key-note addresses the issues of droughts and scarcity and makes a plea to include more drought research in NCR.

  15. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  16. Key instrumentation in BWR plants

    Energy Technology Data Exchange (ETDEWEB)

    Laendner, Alexander; Stellwag, Bernhard; Fandrich, Joerg [AREVA NP GmbH, Erlangen (Germany)

    2011-01-15

    This paper describes water chemistry surveillance practices at boiling water reactor (BWR) power plants. The key instrumentation in BWR plants consists of on-line as well as off-line instrumentation. The chemistry monitoring and control parameters are predominantly based on two guidelines, namely the VGB Water Chemistry Guidelines and the EPRI Water Chemistry Guidelines. Control parameters and action levels specified in the VGB guideline are described. Typical sampling locations in BWR plants, chemistry analysis methods and water chemistry data of European BWR plants are summarized. Measurement data confirm the high quality of reactor water of the BWRs in Europe. (orig.)

  17. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  18. Key paediatric messages from Amsterdam

    Science.gov (United States)

    Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio

    2016-01-01

    The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186

  19. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  20. Metadata, Identifiers, and Physical Samples

    Science.gov (United States)

    Arctur, D. K.; Lenhardt, W. C.; Hills, D. J.; Jenkyns, R.; Stroker, K. J.; Todd, N. S.; Dassie, E. P.; Bowring, J. F.

    2016-12-01

    Physical samples are integral to much of the research conducted by geoscientists. The samples used in this research are often obtained at significant cost and represent an important investment for future research. However, making information about samples - whether considered data or metadata - available for researchers to enable discovery is difficult: a number of key elements related to samples are difficult to characterize in common ways, such as classification, location, sample type, sampling method, repository information, subsample distribution, and instrumentation, because these differ from one domain to the next. Unifying these elements or developing metadata crosswalks is needed. The iSamples (Internet of Samples) NSF-funded Research Coordination Network (RCN) is investigating ways to develop these types of interoperability and crosswalks. Within the iSamples RCN, one of its working groups, WG1, has focused on the metadata related to physical samples. This includes identifying existing metadata standards and systems, and how they might interoperate with the International Geo Sample Number (IGSN) schema (schema.igsn.org) in order to help inform leading practices for metadata. For example, we are examining lifecycle metadata beyond the IGSN `birth certificate.' As a first step, this working group is developing a list of relevant standards and comparing their various attributes. In addition, the working group is looking toward technical solutions to facilitate developing a linked set of registries to build the web of samples. Finally, the group is also developing a comparison of sample identifiers and locators. This paper will provide an overview and comparison of the standards identified thus far, as well as an update on the technical solutions examined for integration. We will discuss how various sample identifiers might work in complementary fashion with the IGSN to more completely describe samples, facilitate retrieval of contextual information, and

  1. Identifiability of nonlinear systems

    Energy Technology Data Exchange (ETDEWEB)

    Tunali, E.T.

    1985-01-01

    The parameter identifiability problem of deterministic, nonlinear dynamical control systems is studied in the framework of differential geometric systems theory. The relations between nonlinear observability, nonlinear functional expansions and identifiability are investigated and necessary and sufficient conditions are obtained for a class of nonlinear systems. In a different approach, by using the uniqueness theorem of nonlinear system realization theory, necessary and sufficient conditions are obtained for another class of nonlinear systems. These results provide an insight to the identifiability problem of nonlinear systems. The results are illustrated by examples that also show the effectiveness of the conditions obtained. Finally, some possible research topics in this area are suggested.

  2. Identifying Key Workplace Stressors Affecting Twentieth Air Force: Analyses Conducted from December 2012 Through February 2013

    Science.gov (United States)

    2014-01-01

    wood shop. Auto hobby shop closed. Daycare center closes at 1730. It’s open 6:00 to 5:30. I was in class and I had to have someone pick up my kid...research and develop- ment center for studies and analyses. PAF provides the Air Force with independent analyses of policy alternatives affecting the...Advocate JCM Job Characteristics Model LCC launch control center LF launch facility MAF missile alert facility Mnx Jr missile maintainers, non–team chiefs

  3. Identifying Key Components of Teaching and Learning in a STEM School

    Science.gov (United States)

    Morrison, Judith; Roth McDuffie, Amy; French, Brian

    2015-01-01

    This study was conducted at an innovative science, technology, engineering, and mathematics high school, providing a rich contextual description of the teaching and learning at the school, specifically focusing on problem solving and inquiry approaches, and students' motivation, social interactions, and collaborative work. Data were collected…

  4. Key Concepts in Pregnancy of Unknown Location: Identifying Ectopic Pregnancy and Providing Patient-Centered Care.

    Science.gov (United States)

    Fields, Loren; Hathaway, Alison

    2017-03-01

    Pregnancy of unknown location (PUL) is a descriptive term for when a woman with a positive pregnancy test has a transvaginal ultrasound that cannot determine the site of the pregnancy. While the majority of women with PUL are subsequently diagnosed with a spontaneous abortion or viable intrauterine pregnancy, 7% to 20% of these women have an ectopic pregnancy. The potential for morbidity and mortality related to an ectopic pregnancy means that considerable care is necessary in the evaluation and management of women with PUL. In some cases, the location of the pregnancy is never determined and the PUL is categorized as resolving or persisting. Evidence suggests expectant management is a safe and effective approach for most women with PUL and should be the mainstay of care. However, in the case of persisting PUL, continued concern for ectopic pregnancy remains. Strategies for deciding when to intervene when a woman has a PUL are reviewed. A variety of clinical tools, including serum beta human chorionic gonadotropin (β-hCG), repeat ultrasonography, dilation and curettage (D&C), and empiric methotrexate therapy are discussed. Finally, a proposal is made that women with persisting PUL can be presented with the option of choosing expectant management, diagnostic D&C, or empiric methotrexate treatment. © 2016 by the American College of Nurse-Midwives.

  5. Identifying Key Events in AOPs for Embryonic Disruption using Computational Toxicology (European Teratology Society - AOP symp.)

    Science.gov (United States)

    Addressing safety aspects of drugs and environmental chemicals relies extensively on animal testing; however, the quantity of chemicals needing assessment and challenges of species extrapolation require alternative approaches to traditional animal studies. Newer in vitro and in s...

  6. Metabolome analysis of Arabidopsis thaliana roots identifies a key metabolic pathway for iron acquisition.

    Directory of Open Access Journals (Sweden)

    Holger Schmidt

    Full Text Available Fe deficiency compromises both human health and plant productivity. Thus, it is important to understand plant Fe acquisition strategies for the development of crop plants which are more Fe-efficient under Fe-limited conditions, such as alkaline soils, and have higher Fe density in their edible tissues. Root secretion of phenolic compounds has long been hypothesized to be a component of the reduction strategy of Fe acquisition in non-graminaceous plants. We therefore subjected roots of Arabidopsis thaliana plants grown under Fe-replete and Fe-deplete conditions to comprehensive metabolome analysis by gas chromatography-mass spectrometry and ultra-pressure liquid chromatography electrospray ionization quadrupole time-of-flight mass spectrometry. Scopoletin and other coumarins were found among the metabolites showing the strongest response to two different Fe-limited conditions, the cultivation in Fe-free medium and in medium with an alkaline pH. A coumarin biosynthesis mutant defective in ortho-hydroxylation of cinnamic acids was unable to grow on alkaline soil in the absence of Fe fertilization. Co-cultivation with wild-type plants partially rescued the Fe deficiency phenotype indicating a contribution of extracellular coumarins to Fe solubilization. Indeed, coumarins were detected in root exudates of wild-type plants. Direct infusion mass spectrometry as well as UV/vis spectroscopy indicated that coumarins are acting both as reductants of Fe(III and as ligands of Fe(II.

  7. Metabolome analysis of Arabidopsis thaliana roots identifies a key metabolic pathway for iron acquisition.

    Science.gov (United States)

    Schmidt, Holger; Günther, Carmen; Weber, Michael; Spörlein, Cornelia; Loscher, Sebastian; Böttcher, Christoph; Schobert, Rainer; Clemens, Stephan

    2014-01-01

    Fe deficiency compromises both human health and plant productivity. Thus, it is important to understand plant Fe acquisition strategies for the development of crop plants which are more Fe-efficient under Fe-limited conditions, such as alkaline soils, and have higher Fe density in their edible tissues. Root secretion of phenolic compounds has long been hypothesized to be a component of the reduction strategy of Fe acquisition in non-graminaceous plants. We therefore subjected roots of Arabidopsis thaliana plants grown under Fe-replete and Fe-deplete conditions to comprehensive metabolome analysis by gas chromatography-mass spectrometry and ultra-pressure liquid chromatography electrospray ionization quadrupole time-of-flight mass spectrometry. Scopoletin and other coumarins were found among the metabolites showing the strongest response to two different Fe-limited conditions, the cultivation in Fe-free medium and in medium with an alkaline pH. A coumarin biosynthesis mutant defective in ortho-hydroxylation of cinnamic acids was unable to grow on alkaline soil in the absence of Fe fertilization. Co-cultivation with wild-type plants partially rescued the Fe deficiency phenotype indicating a contribution of extracellular coumarins to Fe solubilization. Indeed, coumarins were detected in root exudates of wild-type plants. Direct infusion mass spectrometry as well as UV/vis spectroscopy indicated that coumarins are acting both as reductants of Fe(III) and as ligands of Fe(II).

  8. Separating the Wheat from the Chaff: Identifying Key Elements in the NLA .AU Domain Harvest

    Science.gov (United States)

    Fellows, Geoff; Harvey, Ross; Lloyd, Annemaree; Pymm, Bob; Wallis, Jake

    2008-01-01

    In 2005 and 2006 the National Library of Australia (NLA) carried out two whole-domain web harvests which complement the selective web archiving approach taken by PANDORA. Web harvests of this size pose significant challenges to their use. Despite these challenges, such harvests present fascinating research opportunities. The NLA has provided…

  9. Temperature Dependence of Laser-Induced Demagnetization in Ni: A Key for Identifying the Underlying Mechanism

    Directory of Open Access Journals (Sweden)

    T. Roth

    2012-05-01

    Full Text Available The microscopic mechanisms responsible for the ultrafast loss of magnetic order triggered in ferromagnetic metals by optical excitation are still under debate. One of the ongoing controversies is about the thermal origin of ultrafast demagnetization. Although different theoretical investigations support a main driving mechanism of thermal origin, alternative descriptions in terms of coherent interaction between the laser and the spin system or superdiffusive spin transport have been proposed. Another important matter of debate originates from the experimental observation of two time scales in the demagnetization dynamics of the 4f ferromagnet gadolinium. Here, it is still unclear whether it is necessary to invoke two distinct microscopic mechanisms to explain such behavior, or if one single mechanism is indeed sufficient. To uncover the physics behind these two unsolved issues, we explore the dependence of ultrafast-demagnetization dynamics in nickel through a survey of different laser intensities and ambient temperatures. Measurements in a large range of these external parameters are performed by means of the time-resolved magneto-optical Kerr effect and display a pronounced change in the maximum loss of magnetization and in the temporal profile of the demagnetization traces. The most striking observation is that the same material system (nickel can show a transition from a one-step (one time scale to a two-step (two time scales demagnetization, occurring on increasing the ambient temperature. We find that the fluence and the temperature dependence of ultrafast demagnetization—including the transition from one-step to two-step dynamics—are reproduced theoretically assuming only a single scattering mechanism coupling the spin system to the temperature of the electronic system. This finding means that the origin of ultrafast demagnetization is thermal and that only a single microscopic channel is sufficient to describe magnetization dynamics in the 3d ferromagnets on all time scales.

  10. Identifying key factors associated with aggression on acute inpatient psychiatric wards.

    Science.gov (United States)

    Bowers, Len; Allan, Teresa; Simpson, Alan; Jones, Julia; Van Der Merwe, Marie; Jeffery, Debra

    2009-04-01

    Aggressive behaviour is a critical issue for modern acute psychiatric services, not just because of the adverse impact it has on patients and staff, but also because it puts a financial strain on service providers. The aim of this study was to assess the relationship of patient violence to other variables: patient characteristics, features of the service and physical environment, patient routines, staff factors, the use of containment methods, and other patient behaviours. A multivariate cross sectional design was utilised. Data were collected for a six month period on 136 acute psychiatric wards in 26 NHS Trusts in England. Multilevel modelling was conducted to ascertain those factors most strongly associated with verbal aggression, aggression toward objects, and physical aggression against others. High levels of aggression were associated with a high proportion of patients formally detained under mental health legislation, high patient turnover, alcohol use by patients, ward doors being locked, and higher staffing numbers (especially qualified nurses). The findings suggest that the imposition of restrictions on patients exacerbates the problem of violence, and that alcohol management strategies may be a productive intervention. Insufficient evidence is available to draw conclusions about the nature of the link between staffing numbers and violence.

  11. An Operational Landscape Unit approach for identifying key landscape connections in wetland restoration

    NARCIS (Netherlands)

    Verhoeven, J.T.A.; Soons, M.B.; Janssen, R.; Omtzigt, N.

    2008-01-01

    1. Nature conservation and restoration traditionally focus on protecting individual sites. In parts of the world where the natural landscape has been severely altered for agricultural or urban use, individual patches are too small and isolated to ensure effective nature protection. Spatial

  12. Integration of transcriptome and whole genomic resequencing data to identify key genes affecting swine fat deposition.

    Directory of Open Access Journals (Sweden)

    Kai Xing

    Full Text Available Fat deposition is highly correlated with the growth, meat quality, reproductive performance and immunity of pigs. Fatty acid synthesis takes place mainly in the adipose tissue of pigs; therefore, in this study, a high-throughput massively parallel sequencing approach was used to generate adipose tissue transcriptomes from two groups of Songliao black pigs that had opposite backfat thickness phenotypes. The total number of paired-end reads produced for each sample was in the range of 39.29-49.36 millions. Approximately 188 genes were differentially expressed in adipose tissue and were enriched for metabolic processes, such as fatty acid biosynthesis, lipid synthesis, metabolism of fatty acids, etinol, caffeine and arachidonic acid and immunity. Additionally, many genetic variations were detected between the two groups through pooled whole-genome resequencing. Integration of transcriptome and whole-genome resequencing data revealed important genomic variations among the differentially expressed genes for fat deposition, for example, the lipogenic genes. Further studies are required to investigate the roles of candidate genes in fat deposition to improve pig breeding programs.

  13. Identifying Key Steps for Developing Mobile Applications & Mobile Websites for Libraries

    OpenAIRE

    Devendra Dilip Potnis; Reynard Regenstreif-Harms; Edwin Cortez

    2016-01-01

    Mobile applications and mobile websites (MAMW) represent information systems that are increasingly being developed by libraries to better serve their patrons. Due to a lack of in-house IT skills and the knowledge necessary to develop MAMW, a majority of libraries are forced to rely on external IT professionals, who may or may not help libraries meet patron needs but instead may deplete libraries’ scarce financial resources. This paper applies a system analysis and design perspective to analyz...

  14. Mapping the Global Flow of Tungsten to Identify Key Material Efficiency and Supply Security Opportunities

    OpenAIRE

    Leal-Ayala, David R.; Allwood, Julian M.; Petavratzi, Evi; Brown, Teresa J; Gunn, Gus

    2015-01-01

    Tungsten is an economically important metal with diverse applications ranging from wear resistant cutting tools to its use in specialized steels and alloys. Concerns about its supply security have been raised by various studies in literature, mostly due to trade disputes arising from supply concentration and exports restrictions in China and its lack of viable substitutes. Although tungsten material flows have been analysed for specific regions, a global mass flow analysis of tungsten is stil...

  15. Identifying Key Factors for Introducing GPS-Based Fleet Management Systems to the Logistics Industry

    National Research Council Canada - National Science Library

    Hu, Yi-Chung; Chiu, Yu-Jing; Hsu, Chung-Sheng; Chang, Yu-Ying

    2015-01-01

    .... Global positioning system-based fleet management system technology provides synergy to transport companies and achieves many management goals such as monitoring and tracking commodity distribution...

  16. Identifying the key issues focusing on the costs and benefits of immigration in developed countries

    OpenAIRE

    Dobra, Alexandra

    2009-01-01

    The present paper aims to acquaint concisely about the main issues surrounding the theme immigration, founded in the literature. This acquaintance is ensured through first (comprising the third part of the corpus), an overall focus on the question of assessing, on the one hand the benefits and on the other hand the costs of immigration, through the exploitation of many theories and arguments – especially concentrated on the economic and fiscal aspects - each being illustrated with specific ex...

  17. Identifying key habitat and seasonal patterns of a critically endangered population of killer whales

    OpenAIRE

    Esteban, Ruth; Verborgh, Philippe; Gauffier, Pauline; Giménez, Joan; Afán, Isabel; García, Pedro; Murcia, José Luis; Magalhães, Sara; Andreu, Ezequiel; de Stephanis, Renaud

    2014-01-01

    Killer whales have been described in the Gulf of Cadiz, southern Spain, in spring and in the Strait of Gibraltar in summer. A total of 11,276 cetaceans sightings coming from different sources (dedicated research surveys, whale watching companies and opportunistic observations) were used to create two presence–‘pseudo-absence’ predictive generalized additive models (GAM), where presence data were defined as sightings of killer whales and ‘pseudo-absence’ data as sightings of other cetacean spe...

  18. The PrOSTE: identifying key components of effective procedural teaching.

    Science.gov (United States)

    McSparron, Jakob I; Ricotta, Daniel N; Moskowitz, Ari; Volpicelli, Frank M; Roberts, David H; Schwartzstein, Richard M; Huang, Grace C

    2015-02-01

    Novel approaches for faculty development and assessment of procedural teaching skills are needed to improve the procedural education of trainees. The Objective Structured Teaching Exercise (OSTE) entails a simulated encounter in which faculty are observed teaching a standardized student and has been used to evaluate teaching skills. Use of an OSTE to assess the teaching of central venous catheterization has not been reported. The purpose of this study was to develop a procedural OSTE for subclavian central venous catheter (CVC) insertion and to determine specific aspects of procedural teaching associated with improved skills in novices. Critical care faculty/fellows taught a standardized student to insert a CVC in a simulator. We assessed the instructor's teaching skills using rating scales to generate a procedural teaching score. After this encounter, the instructor taught novice medical students to place CVCs in simulators. Novices then independently placed catheters in simulators and were evaluated by trained observers using a checklist. Generalized estimating equations were used to examine the correlation between specific teaching behaviors and the novices' skills in CVC placement. We recruited 10 participants to serve as teachers and 30 preclinical medical students to serve as novice learners. The overall mean procedural teaching score was 85.5 (±15.4). Improved student performance was directly related to the degree to which the teacher "provided positive feedback" (β = 1.53, SE = 0.44, P = 0.001), "offered learner suggestions for improvement" (β = 1.40, SE = 0.35, P < 0.001), and "demonstrated the procedure in a step-by-step manner" (β = 2.50, SE = 0.45, P < 0.001). There was no significant correlation between total scores and student skills (β = 0.06, SE = 0.46, P = 0.18). The OSTE is a standardized method to assess procedural teaching skills. Our findings suggest that specific aspects of procedural teaching should be emphasized to ensure effective transfer of psychomotor skills to trainees.

  19. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-07-01

    Full Text Available whether or not the use of MXit will enhance or harm traditional literary skills (Considine, 2004; Vosloo, 2009; Wei, 2007). As such, the study of MXit language or lingo is important to future research. This paper presented a statistical analysis...

  20. RNA-Seq Identifies Key Reproductive Gene Expression Alterations in Response to Cadmium Exposure

    OpenAIRE

    Hanyang Hu; Xing Lu; Xiang Cen; Xiaohua Chen; Feng Li; Shan Zhong

    2014-01-01

    Cadmium is a common toxicant that is detrimental to many tissues. Although a number of transcriptional signatures have been revealed in different tissues after cadmium treatment, the genes involved in the cadmium caused male reproductive toxicity, and the underlying molecular mechanism remains unclear. Here we observed that the mice treated with different amount of cadmium in their rodent chow for six months exhibited reduced serum testosterone. We then performed RNA-seq to comprehensively in...

  1. How Is This Flower Pollinated? A Polyclave Key to Use in Teaching.

    Science.gov (United States)

    Tyrrell, Lucy

    1989-01-01

    Presents an identification method which uses the process of elimination to identify pollination systems. Provides the polyclave key, methodology for using the key, a sample worksheet, and abbreviation codes for pollination systems. (MVL)

  2. Identifying Motivational Factors within a Multinational Company

    OpenAIRE

    Daniela Bradutanu

    2011-01-01

    The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interv...

  3. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non...... be used as a breakwater therefore providing a solid structure for harbor protection; the Wave Star can be used as a base for offshore wind and photovoltaic installation in the middle of the sea, realizing an hybrid renewable energy platform. It is the authors´ believe that taking wave energy devices......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  4. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  5. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  6. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  7. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  8. E-Commerce Performance. Shopping Cart Key Performance Indicators

    OpenAIRE

    Mihaela I. MUNTEAN; Diana TARNAVEANU; Ana Raluca ION

    2016-01-01

    In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framewor...

  9. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  10. Identifying Knowledge and Communication

    Directory of Open Access Journals (Sweden)

    Eduardo Coutinho Lourenço de Lima

    2006-12-01

    Full Text Available In this paper, I discuss how the principle of identifying knowledge which Strawson advances in ‘Singular Terms and Predication’ (1961, and in ‘Identifying Reference and Truth-Values’ (1964 turns out to constrain communication. The principle states that a speaker’s use of a referring expression should invoke identifying knowledge on the part of the hearer, if the hearer is to understand what the speaker is saying, and also that, in so referring, speakers are attentive to hearers’ epistemic states. In contrasting it with Russell’s Principle (Evans 1982, as well as with the principle of identifying descriptions (Donnellan 1970, I try to show that the principle of identifying knowledge, ultimately a condition for understanding, makes sense only in a situation of conversation. This allows me to conclude that the cooperative feature of communication (Grice 1975 and reference (Clark andWilkes-Gibbs 1986 holds also at the understanding level. Finally, I discuss where Strawson’s views seem to be unsatisfactory, and suggest how they might be improved.

  11. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  12. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  13. Key business restart drivers in Slovakia

    Directory of Open Access Journals (Sweden)

    Anna Pilková

    2013-01-01

    Full Text Available The phenomenon of business restart, also referred to as second chance, proved to be an integral part of entrepreneurial dynamics. Considering the high level of individual entrepreneurial activity (14.2% in 2011, 10.2% in 2012 accompanied with high discontinuance rate in Slovakia (7.0% in 2011, 4.7% in 20121, it is important to further investigate key factors which influence business restart in our country. These findings could unveil what helps to preserve the current entrepreneurial activity, which is besides producing more new entrepreneurs another option to secure self-employment and job creation through individual business activities, with positive impact on economic growth in the country.The main aim of our paper is to analyze the issue of business restart in Slovakia through dynamics measured on individual level and to identify the key drivers of restart activity. These findings represent a good information basis for policy makers helping them better understand the characteristics of business restart phenomenon and develop relevant entrepreneurship policies, as well as for further entrepreneurship research.Our research is primarily based on Slovak Global entrepreneurship Monitor (GEM 2011 and 2012 individual level data. We applied binominal logistic regression to analyze relationships between business restart and its potential drivers.

  14. Identifying learning styles.

    Science.gov (United States)

    Hughes, Grace

    2016-12-14

    What was the nature of the CPD activity, practice-related feedback and/or event and/or experience in your practice? The article explored different learning styles and outlined some of the models that can be used to identify them. It discussed the limitations of these models, indicating that although they can be helpful in identifying a student's preferred learning style, this is not 'fixed' and might change over time. Learning is also influenced by other factors, such as culture and age.

  15. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  17. Inherited thrombophilia: key points for genetic counseling.

    Science.gov (United States)

    Varga, Elizabeth

    2007-06-01

    With the evolution of medical genetics to focus on highly prevalent, multifactorial conditions, it is inevitable that genetic counselors will be called upon to participate in the evaluation and counseling of individuals with inherited thrombophilia. The purpose of this review is to educate the genetic counselor on key issues related to risk assessment and genetic counseling for hereditary thrombophilia. The information contained in this document is derived from an extensive review of the literature, as well as the author's personal expertise. Upon completion of this review, the genetic counselor will be able to: a) describe inherited and acquired risk factors for thrombosis, b) collect and interpret personal and family histories to assess risk related to hereditary thrombophilia, c) discuss the potential advantages and disadvantages of thrombophilia testing, including psychosocial aspects and implications for medical management, and d) identify educational and support resources for patients and families.

  18. Key questions to consider in stalking cases.

    Science.gov (United States)

    Sheridan, Lorraine; Roberts, Karl

    2011-01-01

    Stalkers can inflict severe injury upon and have been known to kill their victims. Based on the detailed responses of 1,565 stalking victims, a set of key questions was produced with the aim of increasing the opportunities of police officers to identify potentially dangerous stalkers. Despite marked methodological differences and the inclusion of a large number of variables, regression analyses for significant correlates for physical assault per se and for severe violence largely reflected the results of earlier works. For severe violence (n=136), the most important correlate was a high level of victim fear, suggesting that victims are adept at assessing their own risk of stalker violence. The set of 11 questions performed well on preliminary tests and is presented here. Copyright © 2011 John Wiley & Sons, Ltd.

  19. [Treatment adherence: a key element].

    Science.gov (United States)

    Bastida, Guillermo; Sánchez Montes, Cristina; Aguas, Mariam

    2011-12-01

    A substantial percentage of patients fail to follow health professionals' recommendations, which affects the management of chronic diseases, reducing the effectiveness of therapeutic interventions and increasing the costs of the disease. Lack of adherence is a multidimensional phenomenon and is influenced by numerous factors that should be identified. A multiplicity of measures is available to improve adherence, such as simplifying treatment administration, but none of these measures is effective when used alone. One way of tackling lack of adherence is by identifying patients' barriers to medication and involving them in decision making. Ulcerative colitis (UC) poses a risk for lack of treatment adherence. In this disease, poor adherence correlates with poor disease control (drug effectiveness) and with higher costs. As in other chronic diseases, the causes associated with poor adherence are multiple, including psychosocial factors, the physician-patient relationship and patients' prejudices toward medication. A single dose of aminosalycylates (5-ASA) should be recommended, as this dose is as safe and effective as other regimens. However, by itself, this recommendation does not seem to improve adherence. Identifying the scale of the problem and developing strategies to involve the patient in decision making is crucial to improve treatment adherence. Copyright © 2011 Elsevier España, S.L.U. All rights reserved.

  20. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  1. Identifying teaching in wild animals.

    Science.gov (United States)

    Thornton, Alex; Raihani, Nichola J

    2010-08-01

    After a long period of neglect, the study of teaching in nonhuman animals is beginning to take a more prominent role in research on social learning. Unlike other forms of social learning, teaching requires knowledgeable individuals to play an active role in facilitating learning by the naive. Casting aside anthropocentric requirements for cognitive mechanisms assumed to underpin teaching in our own species, researchers are now beginning to discover evidence for teaching across a wide range of taxa. Nevertheless, unequivocal evidence for teaching remains scarce, with convincing experimental data limited to meerkats, pied babblers, and tandem-running ants. In this review, our aim is to stimulate further research in different species and contexts by providing conceptual and methodological guidelines for identifying teaching, with a focus on natural populations. We begin by highlighting the fact that teaching is a form of cooperative behavior that functions to promote learning in others and show that consideration of these key characteristics is critical in helping to identify suitable targets for future research. We then go on to discuss potential observational, experimental, and statistical techniques that may assist researchers in providing evidence that the criteria that make up the accepted operational definition of teaching have been met. Supplemental materials for this article may be downloaded from http://lb.psychonomic-journals.org/content/supplemental.

  2. Key aspects of coronal heating

    Science.gov (United States)

    Klimchuk, James A.

    2015-01-01

    We highlight 10 key aspects of coronal heating that must be understood before we can consider the problem to be solved. (1) All coronal heating is impulsive. (2) The details of coronal heating matter. (3) The corona is filled with elemental magnetic stands. (4) The corona is densely populated with current sheets. (5) The strands must reconnect to prevent an infinite build-up of stress. (6) Nanoflares repeat with different frequencies. (7) What is the characteristic magnitude of energy release? (8) What causes the collective behaviour responsible for loops? (9) What are the onset conditions for energy release? (10) Chromospheric nanoflares are not a primary source of coronal plasma. Significant progress in solving the coronal heating problem will require coordination of approaches: observational studies, field-aligned hydrodynamic simulations, large-scale and localized three-dimensional magnetohydrodynamic simulations, and possibly also kinetic simulations. There is a unique value to each of these approaches, and the community must strive to coordinate better. PMID:25897094

  3. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  4. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...... of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47% points....

  5. Chaos-based encryption keys and neural key-store for cloud-hosted data confidentiality

    CSIR Research Space (South Africa)

    Mosola, NN

    2017-09-01

    Full Text Available no significance if the key management is flawed. To address the inherent key management problem, the solution uses a neural network to learn patterns of an encryption key. Once learnt, the key is then discard to thwart possible key attacks. The key...

  6. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  7. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  8. Lectins identify distinct populations of coelomocytes in Strongylocentrotus purpuratus.

    Directory of Open Access Journals (Sweden)

    Wen-Yun Liao

    Full Text Available Coelomocytes represent the immune cells of echinoderms, but detailed knowledge about their roles during immune responses is very limited. One major challenge for studying coelomocyte biology is the lack of reagents to identify and purify distinct populations defined by objective molecular markers rather than by morphology-based classifications that are subjective at times. Glycosylation patterns are known to differ significantly between cell types in vertebrates, and furthermore they can vary depending on the developmental stage and activation states within a given lineage. Thus fluorescently labeled lectins that recognize distinct glycan structures on cell surface proteins are routinely used to identify discrete cell populations in the vertebrate immune system. Here we now employed a panel of fifteen fluorescently-labeled lectins to determine differences in the glycosylation features on the surface of Strongylocentrotus purpuratus coelomocytes by fluorescence microscopy and flow cytometry. Eight of the lectins (succinylated wheat germ agglutinin, Len culinaris lectin, Pisum sativum agglutinin, Saphora japonica agglutinin, Solanum tuberosum lectin, Lycopersicon esculentum lectin, Datura stramonium lectin, Vicia villosa lectin showed distinct binding patterns to fixed and live cells of three major coelomocyte classes: phagocytic cells, red spherule cells, and vibratile cells. Importantly, almost all lectins bound only to a subgroup of cells within each cell type. Lastly, we established fluorescently-labeled lectin-based fluorescence activated cell sorting as a strategy to purify distinct S. purpuratus coelomocyte (sub-populations based on molecular markers. We anticipate that this will become a routine approach in future studies focused on dissecting the roles of different coelomocytes in echinoderm immunity.

  9. Symmetric Key Services Markup Language (SKSML)

    Science.gov (United States)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  10. Random Cell Identifiers Assignment

    Directory of Open Access Journals (Sweden)

    Robert Bestak

    2012-01-01

    Full Text Available Despite integration of advanced functions that enable Femto Access Points (FAPs to be deployed in a plug-and-play manner, the femtocell concept still cause several opened issues to be resolved. One of them represents an assignment of Physical Cell Identifiers (PCIs to FAPs. This paper analyses a random based assignment algorithm in LTE systems operating in diverse femtocell scenarios. The performance of the algorithm is evaluated by comparing the number of confusions for various femtocell densities, PCI ranges and knowledge of vicinity. Simulation results show that better knowledge of vicinity can significantly reduce the number of confusions events.

  11. Tag Content Access Control with Identity-based Key Exchange

    Science.gov (United States)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  12. Oral Health in the US: Key Facts

    Science.gov (United States)

    ... Policy Oral Health in the U.S.: Key Facts Oral Health in the U.S.: Key Facts Published: Jun 01, ... Email Print This fact sheet provides data on oral health care coverage and access for children, nonelderly adults ...

  13. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  14. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  15. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  16. Graduate Entrepreneurship Incubation Environments: A Framework of Key Success Factors

    Science.gov (United States)

    Al-Dajani, Haya; Dedoussis, Evangelos; Watson, Erika; Tzokas, Nikalaos

    2014-01-01

    The benchmarking framework developed in this study is specifically designed for higher education institutions to consider when developing environments to encourage entrepreneurship among their students, graduates and staff. The objective of the study was to identify key success factors of Graduate Entrepreneurship Incubator Environments (GEIEs)…

  17. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  18. An analysis of key stakeholders' attitudes and beliefs about barriers ...

    African Journals Online (AJOL)

    The purpose of this report is to examine key stakeholders experience and knowledge of HPV and cervical cancer, examine their experiences with the current cervical cancer screening and treatment policy, and identify barriers and facilitating factors to vaccine implementation and uptake. Fifteen indepth interviews were ...

  19. Key success factors for developing and managing guesthouses: a ...

    African Journals Online (AJOL)

    The goal of the study was to identify key success factors (KSF's) that ownermanagers of guesthouses can apply to develop and manage guesthouses effectively. This study was urged by the significant growth of guesthouses in South Africa during the past five years as well as the size of the guesthouse sector as part of

  20. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  1. Key informant perceptions of vision loss in children and implications ...

    African Journals Online (AJOL)

    Background: The role of key informants (KIs) in identifying children with vision loss is expanding, yet there is a minimal understanding of KI perceptions of vision loss in children. The aim of the study was to understand the KI's perception of childhood vision loss in order to design more effective training programmes. Materials ...

  2. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    Human and animal populations are increasingly confronted with emerging and re-emerging infections and often such infections are exchanged between these populations, e.g. through food. A more effective and uniform approach to the prevention of these microbial threats is essential. The technological......-source systems. There is therefore an obvious need to develop a global system of whole microbial genome databases to aggregate, share, mine and use microbiological genomic data, to address global public health and clinical challenges, and most importantly to identify and diagnose infectious diseases. The global...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...

  3. Actionable Persistent Identifier Collections

    Directory of Open Access Journals (Sweden)

    Tobias Weigel

    2014-01-01

    Full Text Available Persistent Identifiers (PIDs have lately received a lot of attention from scientific infrastructure projects and communities that aim to employ them for management of massive amounts of research data and metadata objects. Such usage scenarios, however, require additional facilities to enable automated data management with PIDs. In this article, we present a conceptual framework that is based on the idea of using common abstract data types (ADTs in combination with PIDs. This provides a well-defined interface layer that abstracts from both underlying PID systems and higher-level applications. Our practical implementation is based on the Handle System, yet the fundamental concept of PID-based ADTs is transferable to other infrastructures, and it is well suited to achieve interoperability between them.

  4. Mobile Dichotomous Key Application as a Scaffolding Tool in the Museum Setting

    Science.gov (United States)

    Knight, Kathryn

    2012-01-01

    This study explored the use of a dichotomous key as a scaffolding tool in the museum setting. The dichotomous key was designed as a scaffolding tool to help students make more detailed observations as they identified various species of birds on display. The dichotomous key was delivered to groups of fifth and seventh graders in two ways: on a…

  5. A Dichotomous Key to Tree Cones and Fruits of the Eastern United States.

    Science.gov (United States)

    Collins, Linda T.

    1991-01-01

    The author presents a dichotomous key to 29 tree cones, fruits, and nuts of eastern United States. Students can use the key to identify at least 10 species in a 1-hour laboratory assignment. This key uses reproductive structures that are significantly different from others. These structures are durable enough to be used in the laboratory for many…

  6. Identifying potential academic leaders

    Science.gov (United States)

    White, David; Krueger, Paul; Meaney, Christopher; Antao, Viola; Kim, Florence; Kwong, Jeffrey C.

    2016-01-01

    Objective To identify variables associated with willingness to undertake leadership roles among academic family medicine faculty. Design Web-based survey. Bivariate and multivariable analyses (logistic regression) were used to identify variables associated with willingness to undertake leadership roles. Setting Department of Family and Community Medicine at the University of Toronto in Ontario. Participants A total of 687 faculty members. Main outcome measures Variables related to respondents’ willingness to take on various academic leadership roles. Results Of all 1029 faculty members invited to participate in the survey, 687 (66.8%) members responded. Of the respondents, 596 (86.8%) indicated their level of willingness to take on various academic leadership roles. Multivariable analysis revealed that the predictors associated with willingness to take on leadership roles were as follows: pursuit of professional development opportunities (odds ratio [OR] 3.79, 95% CI 2.29 to 6.27); currently holding at least 1 leadership role (OR 5.37, 95% CI 3.38 to 8.53); a history of leadership training (OR 1.86, 95% CI 1.25 to 2.78); the perception that mentorship is important for one’s current role (OR 2.25, 95% CI 1.40 to 3.60); and younger age (OR 0.97, 95% CI 0.95 to 0.99). Conclusion Willingness to undertake new or additional leadership roles was associated with 2 variables related to leadership experiences, 2 variables related to perceptions of mentorship and professional development, and 1 demographic variable (younger age). Interventions that support opportunities in these areas might expand the pool and strengthen the academic leadership potential of faculty members. PMID:27331226

  7. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  8. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Keywords. Quantum cryptography; quantum key distribution. Abstract. Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, ...

  9. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    restrict the amount of data that may be exposed when a key is compromised. In this paper, we propose novel key update methods, and benefiting from stochastic model checking we propose a novel method for determining optimal key update strategies for custom network scenarios. We also present a case study...... where an application in commercial building automation is considered....

  10. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  11. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  12. Secure key distribution applications of chaotic lasers

    Science.gov (United States)

    Jiang, Ning; Xue, Chenpeng; Lv, Yunxin; Qiu, Kun

    2016-11-01

    Chaotic semiconductor laser is a good candidate for secure communication and high-speed true random bit generator, for its characteristics of broad bandwidth and prominent unpredictability. Based on the synchronization property and true random bit generation characteristic of chaotic semiconductor lasers, physical secure key distribution is available. In this work, we majorly show three key distribution schemes stemming from synchronized chaotic semiconductor lasers or chaos-based key exchange protocol. The numerical results demonstrate that the security of the chaos-synchronization-based key distribution scheme can be physically enhanced by adopting dynamic synchronization scheme or encrypted key generation, and that of key distribution with chaos-based key exchange protocol is dependent on the security of the exchange protocol and finally determined by the difficulty of regeneration the chaos system accurately.

  13. Efficient Secret Key Delivery Using Heartbeats

    Directory of Open Access Journals (Sweden)

    Cho Kwantae

    2017-01-01

    Full Text Available Recently many researchers have employed physiological signals like heartbeats as a source of the key seed used in key establishment protocols. The physiological signals make it easy to establish a secret key between implantable (or attachable medical devices which can sense physiological signals. A key establishment protocol is a fundamental requirement to support the security of the healthcare and medical services such as diagnosis, treatment, prevention, and follow-up services. However, existing key establishment protocols demand high computational and communication costs or need long key establishment time. In this paper, we propose an efficient IPI-based key establishment protocol that requires relatively short time while keeping the strength of security close.

  14. Identifying Adolescent Sleep Problems

    Science.gov (United States)

    Short, Michelle A.; Gradisar, Michael; Gill, Jason; Camfferman, Danny

    2013-01-01

    Objectives To examine the efficacy of self-report and parental report of adolescent sleep problems and compare these findings to the incidence of adolescents who fulfill clinical criteria for a sleep problem. Sleep and daytime functioning factors that predict adolescents’ self-identification of a sleep problem will also be examined. Method 308 adolescents (aged 13–17 years) from eight socioeconomically diverse South Australian high schools participated in this study. Participants completed a survey battery during class time, followed by a 7-day Sleep Diary and the Flinders Fatigue Scale completed on the final day of the study. Parents completed a Sleep, Medical, Education and Family History Survey. Results The percentage of adolescents fulfilling one or more of the criteria for a sleep problem was inordinately high at 66%. Adolescent self-reporting a sleep problem was significantly lower than the adolescents who had one or more of the clinical criteria for a sleep problem (23.1% vs. 66.6%; χ2 = 17.46, padolescent having a sleep problem was significantly lower than adolescent self-report (14.3% vs. 21.1%, pAdolescents who reported unrefreshing sleep were 4.81 times more likely to report a sleep problem. For every hour that bedtime was delayed, the odds of self-reporting a sleep problem increased by 1.91 times, while each additional 10 minutes taken to fall asleep increased the odds 1.40 times. Conclusion While many adolescents were found to have sleep patterns indicative of a sleep problem, only a third of this number self-identify having a sleep problem, while only a sixth of this number are indicated by parental report. This study highlights important features to target in future sleep education and intervention strategies for both adolescents and parents. PMID:24086501

  15. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  16. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  17. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  18. Key Gaps for Enabling Plant Growth in Future Missions

    Science.gov (United States)

    Anderson, Molly; Motil, Brian; Barta, Dan; Fritsche, Ralph; Massa, Gioia; Quincy, Charlie; Romeyn, Matthew; Wheeler, Ray; Hanford, Anthony

    2017-01-01

    Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space Administration (NASA). It also begins to identify solutions to the simpler questions identified by the group based on work initiated in 2017. Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space

  19. Identifying program critical success factors in construction industry

    National Research Council Canada - National Science Library

    Kiani, Sarmad; Yousefi, Vahidreza; Haji Yakhchali, Siamak; Mellatdust, Aghil

    2014-01-01

    .... This paper attempts to identify program critical success factors focusing on Iran’s construction industry so that the level of relative importance of various factors could be determined for key stakeholder...

  20. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  1. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  2. Optimization of Quantum Key Distribution Protocols

    OpenAIRE

    Tannous, C.; Langlois, J.

    2017-01-01

    Quantum Key Distribution is a practically implementable information-theoretic secure method for transmitting keys to remote partners performing quantum communication. After examining various protocols from the simplest such as QC and BB84 we move on to describe BBM92, DPSK, SARG04 and finally MDI from the largest possible communication distance and highest secret key bitrate. We discuss how any protocol can be optimized by reviewing the various steps and underlying assumptions proper to every...

  3. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  4. Key innovations and the ecology of macroevolution.

    Science.gov (United States)

    Hunter, J P

    1998-01-01

    The origin or evolutionary `success' of taxa is often attributed to key innovations-aspects of organismal phenotype that promote diversification. Different ways of delimiting taxa and measuring `success' (i.e. number or longevity of species, morphological variety or differential control of energy) give rise to different ideas of how key innovations might operate. Key innovations may enhance competitive ability, relax adaptive trade-offs or permit exploitation of a new productive resource base. Recent key innovation studies comparing species richness in extant sister clades may miss important observations possible only with consideration of the fossil record, traditional higher taxa and phenotypic diversity.

  5. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its... this section shall be enforced by the Commander, U.S. Naval Base, Key West, Fla., and any other...

  6. Radiation-sensitive genetically susceptible pediatric sub-populations

    Energy Technology Data Exchange (ETDEWEB)

    Kleinerman, Ruth A. [National Cancer Institute, NIH, DHHS, Radiation Epidemiology Branch, Division of Cancer Epidemiology and Genetics, Rockville, MD (United States)

    2009-02-15

    Major advances in pediatric cancer treatment have resulted in substantial improvements in survival. However, concern has emerged about the late effects of cancer therapy, especially radiation-related second cancers. Studies of childhood cancer patients with inherited cancer syndromes can provide insights into the interaction between radiation and genetic susceptibility to multiple cancers. Children with retinoblastoma (Rb), neurofibromatosis type 1 (NF1), Li-Fraumeni syndrome (LFS), and nevoid basal cell carcinoma syndrome (NBCCS) are at substantial risk of developing radiation-related second and third cancers. A radiation dose-response for bone and soft-tissue sarcomas has been observed in hereditary Rb patients, with many of these cancers occurring in the radiation field. Studies of NF1 patients irradiated for optic pathway gliomas have reported increased risks of developing another cancer associated with radiotherapy. High relative risks for second and third cancers were observed for a cohort of 200 LFS family members, especially children, possibly related to radiotherapy. Children with NBCCS are very sensitive to radiation and develop multiple basal cell cancers in irradiated areas. Clinicians following these patients should be aware of their increased genetic susceptibility to multiple primary malignancies enhanced by sensitivity to ionizing radiation. (orig.)

  7. KEY FACTORS INFLUENCING PURCHASE INTENTIONS TOWARDS AUTOMOBILES IN PAKISTAN

    Directory of Open Access Journals (Sweden)

    SYED NAVEED ALTAF

    2016-04-01

    Full Text Available In this paper the authors identify and investigate the key factors which influence intentions to purchase passenger cars among consumers in Pakistan. A questionnaire was developed to check the significance of these key variables identified from previous studies, especially those conducted in the context of automobile purchasing in Asian countries. Faculty members from universities of two major cities in Pakistan were selected at random as respondents for this study. The findings of the study will be useful to both managers in the auto industry as well as policy makers. It will help managers in the auto industry to gain a better understanding of consumer intentions and identify the factors which influence them. Policy makers in Pakistan’s auto sector would benefit from the insights of this study when developing the long overdue Auto Policy. Analysis of the data collected has revealed that the three key factors identified from studies in other Asian countries are also relevant for Pakistani auto consumers.

  8. Key-value store with internal key-value storage interface

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  9. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  10. Public-Key Cryptography (Dagstuhl Seminar 16371)

    OpenAIRE

    Fischlin, Marc; May, Alexander; Pointcheval, David; Rabin, Tal

    2017-01-01

    This report documents the program and results of Dagstuhl seminar 16731 “Public-Key Cryptography” which took place September 11th -16th, 2016. The goal of the seminar was to bring together different sub areas from public-key cryptography and to promote research among these areas.

  11. Bioenergy has a key role to play!

    DEFF Research Database (Denmark)

    Holm-Nielsen, Jens Bo

    2010-01-01

    Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;......Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;...

  12. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  13. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Abstract. Kak's quantum key distribution (QKD) protocol provides not only the dis- tribution but also the integrity of secret key simultaneously in quantum channel. Conse- quently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the ...

  14. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  15. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  16. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  17. Musical key perception in relation to color.

    Science.gov (United States)

    Firth, Ian C

    2014-12-01

    A link between musical keys and colors is common among musicians, although there has never been any agreement about which color matches which key. This study tested two alternative key-color associations: E is red and Eb is green, or vice versa. 21 participants (10 men, 11 women; M age = 20 yr., SD = 3.3) with absolute pitch listened to melodies beginning with an anacrusis and a perfect cadence which were played through in C major. Then the melodies began in another key, while four or two colored squares were displayed (in Experiments 1 and 2, respectively). Participants were asked to chose the color which best matched the quality of the new key. The results showed strong support for the E red / Eb green linkage.

  18. Key Principles in Quality and Safety in Radiology.

    Science.gov (United States)

    Abujudeh, Hani; Kaewlai, Rathachai; Shaqdan, Khalid; Bruno, Michael A

    2017-03-01

    The purpose of this article is to introduce the reader to basic concepts of quality and safety in radiology. Concepts are introduced that are keys to identifying, understanding, and utilizing certain quality tools with the aim of making process improvements. Challenges, opportunities, and change drivers can be mapped from the radiology quality perspective. Best practices, informatics, and benchmarks can profoundly affect the outcome of the quality improvement initiative we all aim to achieve.

  19. Key Drivers for a successful NPD launch strategy

    OpenAIRE

    Padwal, Smita

    2009-01-01

    The successful factors in new product strategy are identified. Product acceptance, the role of brand equity and pricing policy are particularly delved into. The importance of open innovation, outsourcing and networks in the new product development process is also discussed. Extensive literature around the new product development process and strategy is reviewed. Consumer research with regards to product acceptance, price and brand equity is also carried out. Thus finally the key drivers to a ...

  20. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  1. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  2. Digital Identifier Systems: Comparative Evaluation

    Directory of Open Access Journals (Sweden)

    Hamid Reza Khedmatgozar

    2015-02-01

    Full Text Available Identifier is one of the main elements in identifying an object in digital environment. Digital identifier systems were developed followed by a lot of problems such as violation of persistency and uniqueness of physical identifiers and URL in digital environment. These identifiers try to guarantee uniqueness and persistency of hostnames by using indirect names for Domain Name System (DNS. The main objective of this research is to identify qualified digital identifier system among other systems. To achieve the research objective, researchers have considered two major steps: first, identifying main criteria for distinguishing digital identifier based on literature review and focus group interview; and second, performing a comparative evaluation on common identifier systems in the world. Findings of first step demonstrated seven main criteria in three domains for distinguishing digital identifier systems: identifier uniqueness and persistency in the identifier features domain, digital identification, digital uniqueness, digital persistency and digital actionability in the digital coverage domain, and globality in the comprehensiveness of scope domain. In the second step, results of the comparative evaluation on common identifier systems indicated that six identifier systems, included, DOI, Handle, UCI, URN, ARK and PURL, are appropriate choices for using as a digital identifier system. Also, according to these results, three identification systems Including NBN, MARIAM and ISNI were identified as suitable choices for digital identification in certain specialized fields. According to many benefits of using these identifiers in important applied fields, such as, digital content chains and networks integration, digital right management, cross referencing, digital libraries and citation analysis, results of this study can help digital environment experts to diagnose digital identifier and their effective use in applied fields.

  3. Proposing New Wilderness Areas: Okefenokee, Pelican Islands, Island Bay, Cedar Keys, Passage Key, and Wichita Mountains

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — President Transmittal on the proposal of wilderness additions that include Okefenokee, Pelican Islands, Island Bay, Cedar Keys, Passage Key, and Wichita Mountains.

  4. New Cholesterol Fighting Meds Target Key Gene

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_165942.html New Cholesterol Fighting Meds Target Key Gene Two trials show ... New gene-based therapies appear to significantly decrease cholesterol levels in people, and could even cut down ...

  5. PDS4 Training: Key Concepts and Vocabulary

    Science.gov (United States)

    Gordon, M. K.; Guinness, E. A.; Neakrase, L. D. V.; Padams, J.; Raugh, A. C.

    2017-06-01

    Those planning to attend the PDS4 training session are strongly encouraged to review this poster prior to the training session. This poster briefly describes new vocabulary and a number of key concepts introduced with PDS4.

  6. Exercise Is Key to Healthy Aging

    Science.gov (United States)

    ... on. NIH Research Exercise Is Key to Healthy Aging Past Issues / Winter 2015 Table of Contents Dr. Hodes, Director of the National Institute on Aging, does regular strength training and aerobic exercise. Photo ...

  7. Defending Critical Infrastructure as Cyber Key Terrain

    Science.gov (United States)

    2016-08-01

    AU/ACSC/2016 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY Defending Critical Infrastructure as Cyber Key Terrain by Derek Molle, Civ, USAF...20 Converged Enterprise Network...23 Logically Isolated Enterprise

  8. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  9. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook Tweet ... can spread through that community. How do flu vaccines work? Flu vaccines cause antibodies to develop in ...

  10. Key Data Elements in Myeloid Leukemia

    NARCIS (Netherlands)

    Varghese, J.; Holz, C.; Neuhaus, P.; Bernardi, M.; Boehm, A.; Ganser, A.; Gore, S.; Heaney, M.; Hochhaus, A.; Hofmann, W.K.; Krug, U.; Muller-Tidow, C.; Smith, A.; Weltermann, A.; Witte, T.J.M. de; Hehlmann, R.; Dugas, M.

    2016-01-01

    Data standards consisting of key data elements for clinical routine and trial documentation harmonize documentation within and across different health care institutions making documentation more efficient and improving scientific data analysis. This work focusses on the field of myeloid leukemia

  11. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English gr...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science......The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...

  12. Benthic Habitats of the Florida Keys

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The benthic habitats of the Florida Keys were mapped from a series of 450 aerial photographs. Ecologists outlined the boundaries of specific habitat types by...

  13. Key Communicators--An Authorized Grapevine

    Science.gov (United States)

    Bagin, Don

    1975-01-01

    Key communicators--community members who come in contact with many people and who are informal information sources--can be used by the schools as sources of feedback from the community and as information disseminators. (DS)

  14. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  15. High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution

    OpenAIRE

    Zhao, Yi-bo; Han, Zheng-fu; Chen, Jin-jian; Gui, You-zhen; Guo, Guang-can

    2006-01-01

    The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can...

  16. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  17. Measuring key parameters of intense pulsed light (IPL) devices.

    Science.gov (United States)

    Town, Godfrey; Ash, Caerwyn; Eadie, Ewan; Moseley, Harry

    2007-09-01

    Unlike medical lasers, intense pulsed light (IPL) devices are largely unregulated and unclassified as to degree of safety hazard. With the exception of most of the USA, the United Kingdom and parts of Europe, the Far East and Australia, the sale of IPLs is generally unrestricted, with the majority being sold into the beauty therapy and spa markets. Standards are only imposed on manufacturers for technical performance data and operating tolerances determined by CE-compliance under electrical safety standards or the EU Medical Device Directive. Currently, there is no requirement for measurement of key IPL performance characteristics. To identify the key IPL parameters, emphasize their importance in terms of safe and effective treatment and provide examples of preliminary measurement methods. These measurements can highlight changes in an IPL device's performance, improving patient safety and treatment efficacy. Five key parameters were identified as having an important role to play in the way light interacts with the skin, and therefore an important role in patient safety and effective treatment. Simple methods were devised to measure the parameters, which include fluence, pulse duration, pulse profile, spectral output and time-resolved spectral output. The measurement methods permitted consistent and comparable measurements to be made by two of the authors at working clinic locations on 18 popular IPL devices and allowed assessment of output variations. Results showed discrepancies between the measured IPL device outputs and those values displayed on the system or claimed by the manufacturers. The importance of these discrepancies and their impact is discussed. This study, of 18 popular devices in regular daily use in England and Wales, provides example methods for measuring key IPL device parameters and highlights the need for regular measurement of at least those five key parameters measured in this study. These methods can help service technicians to check

  18. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  19. The Digital Thread as the Key Enabler

    Science.gov (United States)

    2016-11-01

    life cycle by providing the capability to access, integrate and transform disparate data into actionable information. The digital thread is the...17 Defense AT&L: November-December 2016 The Digital Thread as the Key Enabler Col. Keith Bearden, USAF Bearden is the deputy director of...enabling you to do your job better, faster and cheaper. There is one initiative, the key enabler, to accomplish this goal—the digital thread. But let’s

  20. SAXICOLE BRYOPHYTES FROM VÂLSAN KEYS

    Directory of Open Access Journals (Sweden)

    Codruţa Mihaela Dobrescu

    2015-07-01

    Full Text Available The paper presents a review of the saxicole species in the Vâlsan Keys and considerations regarding the bryophytic saxicole cenoses from the protected area. To analyze the diversity of the saxicole bryophytes, we considered the number of species, as well as the phytogeografical element, the growth form and the “life strategy” of each species. From the systematic perspective, Vâlsan Keys are featured by a high specific diversity of the saxicole bryophytes.

  1. Cryptographic key generation using handwritten signature

    Science.gov (United States)

    Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-Garcia, J.

    2006-04-01

    Based on recent works showing the feasibility of key generation using biometrics, we study the application of handwritten signature to cryptography. Our signature-based key generation scheme implements the cryptographic construction named fuzzy vault. The use of distinctive signature features suited for the fuzzy vault is discussed and evaluated. Experimental results are reported, including error rates to unlock the secret data by using both random and skilled forgeries from the MCYT database.

  2. 78 FR 79061 - Noise Exposure Map Notice; Key West International Airport, Key West, FL

    Science.gov (United States)

    2013-12-27

    ... Federal Aviation Administration Noise Exposure Map Notice; Key West International Airport, Key West, FL... Administration (FAA) announces its determination that the Noise Exposure Maps submitted by Monroe County for the...: This notice announces that the FAA finds that the Noise Exposure Maps submitted for the Key West...

  3. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.|info:eu-repo/dai/nl/14111634X; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  4. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  5. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae).

    Science.gov (United States)

    Hernández, Macotulio Soto; Jones, Robert W; Castillo, Pedro Reyes

    2013-01-01

    Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included.

  6. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae

    Directory of Open Access Journals (Sweden)

    Macotulio Hernandez

    2013-01-01

    Full Text Available Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included.

  7. A SINE-based dichotomous key for primate identification.

    Science.gov (United States)

    Herke, Scott W; Xing, Jinchuan; Ray, David A; Zimmerman, Jacquelyn W; Cordaux, Richard; Batzer, Mark A

    2007-04-01

    For DNA samples or 'divorced' tissues, identifying the organism from which they were taken generally requires some type of analytical method. The ideal approach would be robust even in the hands of a novice, requiring minimal equipment, time, and effort. Genotyping SINEs (Short INterspersed Elements) is such an approach as it requires only PCR-related equipment, and the analysis consists solely of interpreting fragment sizes in agarose gels. Modern primate genomes are known to contain lineage-specific insertions of Alu elements (a primate-specific SINE); thus, to demonstrate the utility of this approach, we used members of the Alu family to identify DNA samples from evolutionarily divergent primate species. For each node of a combined phylogenetic tree (56 species; n=8 [Hominids]; 11 [New World monkeys]; 21 [Old World monkeys]; 2 [Tarsiformes]; and, 14 [Strepsirrhines]), we tested loci (>400 in total) from prior phylogenetic studies as well as newly identified elements for their ability to amplify in all 56 species. Ultimately, 195 loci were selected for inclusion in this Alu-based key for primate identification. This dichotomous SINE-based key is best used through hierarchical amplification, with the starting point determined by the level of initial uncertainty regarding sample origin. With newly emerging genome databases, finding informative retrotransposon insertions is becoming much more rapid; thus, the general principle of using SINEs to identify organisms is broadly applicable.

  8. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  9. Key enablers to facilitate healthy behavior change: workshop summary.

    Science.gov (United States)

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  10. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    Science.gov (United States)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  11. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  12. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  13. Academic Primer Series: Eight Key Papers about Education Theory

    Directory of Open Access Journals (Sweden)

    Michael Gottlieb

    2017-02-01

    Full Text Available Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A threeround, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice. [West J Emerg Med. 2017;18(2293-302.

  14. Identification key to adult Odonata of New Caledonia and Wallis and Futuna

    OpenAIRE

    Grand, D.; Marinov, M.; Cook, C.; Jourdan, Hervé; Rouys, S.; Theuerkauf, J.

    2014-01-01

    We present a dichotomous key to identify adults of all presently described Odonata of New Caledonia including the Loyalty Islands (Melanesia) and Wallis and Futuna (Western Polynesia). The key covers a total of 58 species of which approximately 50 % are regionally endemic, while others are more widespread species inhabiting neighboring archipelagos such as Vanuatu and Fiji, and even more distant regions.

  15. The Key Roles in the Informal Organization: A Network Analysis Perspective

    Science.gov (United States)

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  16. Key events and their effects on cycling behaviour in Dar-es-Salaam : abstract + powerpoint

    NARCIS (Netherlands)

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper explores key events and investigates their effects on cycling behaviour in the city of Dar-es-Salaam, Tanzania. The objective of the study is to identify specific key events during a person’s life course with a significant effect on change of travel behaviour towards cycling in relation to

  17. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  18. Identifying management preferences, institutional organisational ...

    African Journals Online (AJOL)

    The potential to improve the management of fisheries in Pemba, Mozambique, were explored by evaluating stakeholder's preferences for management and the key institutional design elements of the fisheries organisations or community councils of fisheries (CCPs). We interviewed fishers, community leaders and ...

  19. Review of American Xyleborina (Coleoptera: Curculionidae: Scolytinae) Occurring North of Mexico, with an Illustrated Key

    National Research Council Canada - National Science Library

    Robert J. Rabaglia; Stephanie A. Dole; Anthony I. Cognato

    2006-01-01

    .... The need for a worldwide revision of this tribe hampers the ability to identify species. To remedy this situation, an illustrated key is constructed and Xyleborus glabratus Eichhoff, Xyleborus similis Ferrari, and Euwallacea fornicatus (Eichhoff...

  20. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  1. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver....... While anonymity and confidentiality appear to be orthogonal properties, making anonymous communication confidential is more involved than one might expect, since the ciphertext might reveal which public key has been used to encrypt. To address this problem, public-key cryptosystems with enhanced...... security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...

  2. Extending key sharing: how to generate a key tightly coupled to a network security policy

    Science.gov (United States)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  3. Several Key Features of Marriage in Kosovo

    OpenAIRE

    Dr.Sc. Hamdi Podvorica

    2014-01-01

    In this paper titled “Several key features of marriage in Kosovo”, I have made efforts to address the matrimony, as an important societal and legal concept, in the light of positive law in Kosovo. In short terms, I have addressed the historical development of marriage in general, from the period of promiscuity until today, and I have emphasized key features of marriage in various time periods, only to comprehend better the ways of development of marriage in time and space. A special empha...

  4. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  5. Key nuclear reaction experiments discoveries and consequences

    CERN Document Server

    Paetz gen. Schieck, Hans

    2015-01-01

    In this book the author charts the developments in nuclear physics since its inception around a century ago by reviewing the key experiments that helped drive and shape our understanding of the field, especially in the context of the wider developments in physics in the early 20th Century. In addition to providing a path through the field and the crucial events it looks at how these experiments not only answered key questions at the time but presented new challenges to the contemporary perception of the nuclear and sub-atomic worlds and how they helped develop our present understanding of nuclear physics.

  6. The soil N cycle: new insights and key challenges

    Science.gov (United States)

    van Groenigen, J. W.; Huygens, D.; Boeckx, P.; Kuyper, Th. W.; Lubbers, I. M.; Rütting, T.; Groffman, P. M.

    2015-03-01

    The study of soil N cycling processes has been, is, and will be at the centre of attention in soil science research. The importance of N as a nutrient for all biota; the ever-increasing rates of its anthropogenic input in terrestrial (agro)ecosystems; its resultant losses to the environment; and the complexity of the biological, physical, and chemical factors that regulate N cycling processes all contribute to the necessity of further understanding, measuring, and altering the soil N cycle. Here, we review important insights with respect to the soil N cycle that have been made over the last decade, and present a personal view on the key challenges of future research. We identify three key challenges with respect to basic N cycling processes producing gaseous emissions: 1. quantifying the importance of nitrifier denitrification and its main controlling factors; 2. characterizing the greenhouse gas mitigation potential and microbiological basis for N2O consumption; 3. characterizing hotspots and hot moments of denitrification Furthermore, we identified a key challenge with respect to modelling: 1. disentangling gross N transformation rates using advanced 15N / 18O tracing models Finally, we propose four key challenges related to how ecological interactions control N cycling processes: 1. linking functional diversity of soil fauna to N cycling processes beyond mineralization; 2. determining the functional relationship between root traits and soil N cycling; 3. characterizing the control that different types of mycorrhizal symbioses exert on N cycling; 4. quantifying the contribution of non-symbiotic pathways to total N fixation fluxes in natural systems We postulate that addressing these challenges will constitute a comprehensive research agenda with respect to the N cycle for the next decade. Such an agenda would help us to meet future challenges on food and energy security, biodiversity conservation, water and air quality, and climate stability.

  7. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    Science.gov (United States)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  8. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  9. Teaching Tools for Diagnostics: The Behavior Key.

    Science.gov (United States)

    Ellsworth, J'Anne D.

    This paper presents a set of charts that may help a teacher develop a theory about what is working well in the classroom and where problems exist. Each chart is divided into two categories repeatedly. In effect, the chart serves as a dichotomous key. At each point where two choices diverge, the teacher should move to the more likely answer. The…

  10. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  11. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  12. Quantum Cryptography: Key Distribution and Beyond

    OpenAIRE

    Akshata Shenoy-Hejamadi; Anirban Pathak; Srikanth Radhakrishna

    2017-01-01

    Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications. Quanta 2017; 6: 1–47.

  13. Student Engagement: Key to Personalized Learning

    Science.gov (United States)

    Ferlazzo, Larry

    2017-01-01

    Personalized learning has the potential to greatly improve student achievement--but realistic teachers know that any instructional strategy will only be effective if students are willing to do the work. That is why Larry Ferlazzo emphasizes the importance of weaving intrinsic motivation into every personalized learning classroom. Four key elements…

  14. Key variables of organisation design in servitization

    DEFF Research Database (Denmark)

    Kreye, Melanie; Jensen, Per Langaa

    2014-01-01

    to external environment to ensure performance. We present a case in the European renewable energy sector. The findings show three key variables: (i) processes need to enable information flow between business departments; (ii) servitization strategy needs to be translated into service-centred activities...

  15. Key requirements for future control room functionality

    DEFF Research Database (Denmark)

    Tornelli, Carlo; Zuelli, Roberto; Marinelli, Mattia

    2016-01-01

    This internal report provides the key requirements for the future control centres. R8.1 represents the starting point of WP8 activities and wants to achieve a double objective. On the one hand it collects general requirements on future control centres emerging from the general trends in power...

  16. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  17. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties al...

  18. Crystallization: Key thermodynamic, kinetic and hydrodynamic aspects

    Indian Academy of Sciences (India)

    the knowledge gaps therein that pose challenges to research as well as industrial requirements. The section is organized as follows: first, crystallization practice in industry is briefly reviewed and key issues are .... by which these clusters form is either not very well understood or scantly available in the lit- erature. Primary ...

  19. Tajikistan : Key Priorities for Climate Change Adaptation

    OpenAIRE

    Barbone, Luca; Reva, Anna; Zaidi, Salman

    2010-01-01

    How should Tajikistan adapt to ongoing and future climate change, in particular given the many pressing development challenges it currently faces? The paper argues that for developing countries like Tajikistan, faster economic and social development is the best possible defense against climate change. It presents some key findings from a recent nationally representative household survey to...

  20. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  1. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  2. Scientific independence: A key to credibility

    Science.gov (United States)

    Leonard F. Ruggiero

    2007-01-01

    Independence and objectivity are key ingredients of scientific credibility, especially in research organizations that are part of a natural resource management agency like the Forest Service. Credibility, in turn, is essential to the utility of scientific information in socio-political processes. In order to develop this thesis further, a basic understanding of Forest...

  3. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  4. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    A. Broadbent (Anne); C. Schaffner (Christian)

    2016-01-01

    textabstractQuantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness

  5. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  6. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  7. Environmental conflicts: Key issues and management implications ...

    African Journals Online (AJOL)

    Environmental conflicts have emerged as key issues challenging local, regional, national and global security. Environmental crises and problems throughout the world are widespread and increasing rapidly. In relation to these concerns, the article discusses the following aspects: people and the environment, environmental ...

  8. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum method of Bennett and Brassard (BB84) where the transmission states have been decreased from 4 to 3 and ...

  9. Quantum Cryptography: Key Distribution and Beyond

    Directory of Open Access Journals (Sweden)

    Akshata Shenoy-Hejamadi

    2017-06-01

    Full Text Available Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications. Quanta 2017; 6: 1–47.

  10. Soil fauna: key to new carbon models

    NARCIS (Netherlands)

    Filser, Juliane; Faber, J.H.; Tiunov, Alexei V.; Brussaard, L.; Frouz, J.; Deyn, de G.B.; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, M.; Wall, D.H.; Querner, Pascal; Eijsackers, Herman; Jimenez, Juan Jose

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential

  11. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  12. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  13. Key performance indicators: Global product development

    DEFF Research Database (Denmark)

    Taylor, Thomas Paul; Ahmed-Kristensen, Saeema

    2014-01-01

    investigates the use of key performance indicators as an approach for measuring the success of global product development projects. With the conclusions from a survey and workshop together with observations during a global development project, the need for an alternative approach to measurement than...

  14. Escherichia Coli--Key to Modern Genetics.

    Science.gov (United States)

    Bregegere, Francois

    1982-01-01

    Mid-nineteenth century work by Mendel on plant hybrids and by Pasteur on fermentation gave birth by way of bacterial genetics to modern-day molecular biology. The bacterium Escherichia Coli has occupied a key position in genetic studies leading from early gene identification with DNA to current genetic engineering using recombinant DNA technology.…

  15. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  16. Key Data on Education in Europe 2012

    Science.gov (United States)

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  17. Key Data on Education in Europe 2009

    Science.gov (United States)

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but…

  18. TRANSITIONAL JUSTICE AND DEMOCRATIC CHANGE: KEY CONCEPTS

    Directory of Open Access Journals (Sweden)

    ELENA ANDREEVSKA

    2013-05-01

    Full Text Available This Article proposes a genealogy of transitional justice and focuses on transitional justice as one of the key steps in peace building that needs to be taken to secure a stable democratic futureTransitional justice is a response to systematic or widespread violations of human rights. It seeks recognition for victims and promotion of possibilities for peace, reconciliation and democracy. The paper focuses on key concepts of transitional justice before addressing its traditional components: justice, reparation, truth and institutional reform. This Article meeting point on the transitional process in a society which has experienced a violent conflict and needs adequate mechanisms to deal with the legacies of the past in order to prevent future violence and cover the way for reconciliation and democratic consolidation. It provides key stakeholders with an overview of transitional justice and its different components, while examining key challenges faced by those working in this area. The present paper concludes with some remarks that challenge the traditional concept of transitional justice and its processes in order to initiate important debate on where future work in this field is needed.

  19. The Kotter Key Is Not the Answer.

    Science.gov (United States)

    Johnson, Simon O.

    1980-01-01

    The author, responding to an article in the April 1980 "Educational Leadership" states that he has not found any indication that the Kotter syndrome (from the television series "Welcome Back, Kotter") is a key to educating disadvantaged students. (Author/MLF)

  20. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  1. Key components of an effective mentoring relationship: a qualitative study.

    Science.gov (United States)

    Eller, Lucille Sanzero; Lev, Elise L; Feurer, Amy

    2014-05-01

    Despite the recognized importance of mentoring, little is known about specific mentoring behaviors that result in positive outcomes. To identify key components of an effective mentoring relationship identified by protégés-mentor dyads in an academic setting. In this qualitative study, purposive sampling resulted in geographic diversity and representation of a range of academic disciplines. Participants were from 12 universities in three regions of the U.S. (South, n=5; Northeast, n=4; Midwest, n=2) and Puerto Rico (n=1). Academic disciplines included natural sciences (51%), nursing/health sciences (31%), engineering (8%), and technology (1%). Twelve workshops using the Technology of Participation method were held with 117 mentor-protégé dyads. Consensus was reached regarding the key components of an effective mentoring relationship. Conventional content analysis, in which coding categories were informed by the literature and derived directly from the data, was employed. Eight themes described key components of an effective mentoring relationship: (1) open communication and accessibility; (2) goals and challenges; (3) passion and inspiration; (4) caring personal relationship; (5) mutual respect and trust; (6) exchange of knowledge; (7) independence and collaboration; and (8) role modeling. Described within each theme are specific mentor-protégé behaviors and interactions, identified needs of both protégé and mentor in the relationship, and desirable personal qualities of mentor and protégé. Findings can inform a dialog between existing nurse mentor-protégé dyads as well as student nurses and faculty members considering a mentoring relationship. Nurse educators can evaluate and modify their mentoring behaviors as needed, thereby strengthening the mentor-protégé relationship to ensure positive outcomes of the learning process. © 2013.

  2. New criteria to identify spectrum

    DEFF Research Database (Denmark)

    Jensen, Arne; Krishna, M.

    In this paper we give some new criteria for identifying the components of a probability measure, in its Lebesgue decomposition. This enables us to give new criteria to identify spectral types of self adjoint operators on Hilbert spaces, especially those of interest....

  3. New criteria to identify spectrum

    DEFF Research Database (Denmark)

    Jensen, Arne; Krishna, M.

    2005-01-01

    In this paper we give some new criteria for identifying the components of a probability measure, in its Lebesgue decomposition. This enables us to give new criteria to identify spectral types of self-adjoint operators on Hilbert spaces, especially those of interest....

  4. Citric acid: emerging applications of key biotechnology industrial product.

    Science.gov (United States)

    Ciriminna, Rosaria; Meneguzzo, Francesco; Delisi, Riccardo; Pagliaro, Mario

    2017-01-01

    Owing to new biotechnological production units mostly located in China, global supply of citric acid in the course of the last two decades rose from less than 0.5 to more than 2 million tonnes becoming the single largest chemical obtained via biomass fermentation and the most widely employed organic acid. Critically reviewing selected research achievements and production trends, we identify the reasons for which this polycarboxylic acid will become a key chemical in the emerging bioeconomy.Graphical abstractPalermo's Fabbrica Chimica Italiana Goldenberg today. In 1930 it was Europe's largest citric acid plant (photo courtesy of Aldo Ferrande).

  5. Key considerations for conducting Chinese medicine clinical trials in hospitals

    Directory of Open Access Journals (Sweden)

    Shergis Johannah L

    2013-02-01

    Full Text Available Abstract Conducting clinical trials of Chinese medicines (CM in hospitals presents challenges for researchers. The success of hospital-based CM clinical trials may be influenced by the protocol design, including the maintenance of CM theory in compliance with scientific rigour and hospital guidelines and justified treatment approaches with results that can translate into clinical practice. Other influences include personnel and resources such as a dedicated team open to CM with an established research culture and the ability to maximise participant recruitment. This article identifies the key challenges and limitations of conducting CM clinical trials in Australian hospitals.

  6. Cellular Imaging: a Key Phenotypic Screening Strategy for Predictive Toxicology

    Directory of Open Access Journals (Sweden)

    JINGHAI JAMES XU

    2015-09-01

    Full Text Available Incorporating phenotypic screening as a key strategy will enhances confidence in the predictivity and translatability of drug discovery efforts. Cellular imaging serves as the a phenotypic anchor to identify important toxicologic pathology that encompasses an array of underlying mechanisms, thus provides an effective means to reduce drug development failures due to insufficient safety. This mini-review highlights the latest advances in hepatotoxicity, cardiotoxicity, and genetic toxicity tests that utilized cellular imaging as a screening strategy, and recommends path forward for further improvement.

  7. Identifying patients with cost-related medication non-adherence: a big-data approach.

    Science.gov (United States)

    Zhang, James X; Meltzer, David O

    2016-08-01

    Millions of Americans encounter access barriers to medication due to cost; however, to date, there is no effective screening tool that identifies patients at risk of cost-related medication non-adherence (CRN). By utilizing a big-data approach to combining the survey data and electronic health records (EHRs), this study aimed to develop a method of identifying patients at risk of CRN. CRN data were collected by surveying patients about CRN behaviors in the past 3 months. By matching the dates of patients' receipt of monthly Social Security (SS) payments and the dates of prescription orders for 559 Medicare beneficiaries who were primary SS claimants at high risk of hospitalization in an urban academic medical center, this study identified patients who ordered their outpatient prescription within 2 days of receipt of monthly SS payments in 2014. The predictive power of this information on CRN was assessed using multivariate logistic regression analysis. Among the 559 Medicare patients at high risk of hospitalization, 137 (25%) reported CRN. Among those with CRN, 96 (70%) had ordered prescriptions on receipt of SS payments one or more times in 2014. The area under the Receiver Operating Curve was 0.70 using the predictive model in multivariate logistic regression analysis. With a new approach to combining the survey data and EHR data, patients' behavior in delaying filling of prescription until funds from SS checks become available can be measured, providing some predictive value for cost-related medication non-adherence. The big-data approach is a valuable tool to identify patients at risk of CRN and can be further expanded to the general population and sub-populations, providing a meaningful risk-stratification for CRN and facilitating physician-patient communication to reduce CRN.

  8. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  9. Public-key quantum digital signature scheme with one-time pad private-key

    Science.gov (United States)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  10. On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Tischhauser, Elmar

    2014-01-01

    can therefore result in a more powerful attack. A second assumption usually made in linear cryptanalysis is the key equivalence hypothesis, even though due to the linear hull effect, the bias can heavily depend on the key. As a further contribution of this paper, we propose a practical technique...

  11. Adding-Listing Machines (Ten-Key and Full-Key), Business Education: 7718.07.

    Science.gov (United States)

    McKinney, Lottie N.

    This pamphlet describes a course designed to give students mastery over the 10-key and full-key adding-listing machines in solving special business problems. With course guidelines, performance objectives, course content, learning activities, evaluative instruments, student and teacher resources, the course content seeks to develop occupational…

  12. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  13. Author Identifiers in Scholarly Repositories

    CERN Document Server

    Warner, Simeon

    2010-01-01

    Bibliometric and usage-based analyses and tools highlight the value of information about scholarship contained within the network of authors, articles and usage data. Less progress has been made on populating and using the author side of this network than the article side, in part because of the difficulty of unambiguously identifying authors. I briefly review a sample of author identifier schemes, and consider use in scholarly repositories. I then describe preliminary work at arXiv to implement public author identifiers, services based on them, and plans to make this information useful beyond the boundaries of arXiv.

  14. Application of cognitive engineering principles to the redesign of a dichotomous identification key for parasitology.

    Science.gov (United States)

    Smith-Akin, Kimberly A; McLane, Sharon; Craig, Thomas M; Johnson, Todd R

    2006-01-01

    Dichotomous identification keys are used throughout biology for identification of plants, insects, and parasites. However, correct use of identification keys can be difficult as they are not usually intended for novice users who may not be familiar with the terminology used or with the morphology of the organism being identified. Therefore, we applied cognitive engineering principles to redesign a parasitology identification key for the Internet. We addressed issues of visual clutter and spatial distance by displaying a single question couplet at a time and by switching to the appropriate next couplet after the user made a choice. Our analysis of the original paper-based key versus the Web-based approach found that of 26 applicable cognitive engineering principles, the paper key did not meet 4 (15%) and partially met 11 (42%). In contrast, the redesigned key met 100% of 32 applicable cognitive engineering principles.

  15. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    Science.gov (United States)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  16. PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY

    Directory of Open Access Journals (Sweden)

    Lanny Sutanto

    2014-01-01

    Full Text Available The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.

  17. Identification of key ancestors of modern germplasm in a breeding program of maize.

    Science.gov (United States)

    Technow, F; Schrag, T A; Schipprack, W; Melchinger, A E

    2014-12-01

    Probabilities of gene origin computed from the genomic kinships matrix can accurately identify key ancestors of modern germplasms Identifying the key ancestors of modern plant breeding populations can provide valuable insights into the history of a breeding program and provide reference genomes for next generation whole genome sequencing. In an animal breeding context, a method was developed that employs probabilities of gene origin, computed from the pedigree-based additive kinship matrix, for identifying key ancestors. Because reliable and complete pedigree information is often not available in plant breeding, we replaced the additive kinship matrix with the genomic kinship matrix. As a proof-of-concept, we applied this approach to simulated data sets with known ancestries. The relative contribution of the ancestral lines to later generations could be determined with high accuracy, with and without selection. Our method was subsequently used for identifying the key ancestors of the modern Dent germplasm of the public maize breeding program of the University of Hohenheim. We found that the modern germplasm can be traced back to six or seven key ancestors, with one or two of them having a disproportionately large contribution. These results largely corroborated conjectures based on early records of the breeding program. We conclude that probabilities of gene origin computed from the genomic kinships matrix can be used for identifying key ancestors in breeding programs and estimating the proportion of genes contributed by them.

  18. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  19. Progress in satellite quantum key distribution

    Science.gov (United States)

    Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander

    2017-08-01

    Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.

  20. Key Design Properties for Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas; Tan, Yao-Hua

    2015-01-01

    . The contribution of the paper is to expand previous research with complementary key design properties. The paper starts with a review of existing literature on previous proposed solutions for increased collaboration in the supply chain for international trade, Inter-Organization Systems and Information......This paper reports on the use of key design properties for development of a new approach towards a solution for sharing shipping information in the supply chain for international trade. Information exchange in international supply chain is extremely inefficient, rather uncoordinated, based largely...... on paper, e-mail, phone and text message, and far too costly. This paper explores the design properties for a shared information infrastructure to exchange information between all parties in the supply chain, commercial parties as well as authorities, which is called a Shipping Information Pipeline...

  1. Emergency department waiting room nurse role: A key informant perspective.

    Science.gov (United States)

    Innes, Kelli; Jackson, Debra; Plummer, Virginia; Elliott, Doug

    2017-02-01

    Emergency departments have become overcrowded with increased waiting times. Strategies to decrease waiting times include time-based key performance indicators and introduction of a waiting room nurse role. The aim of the waiting room nurse role is to expedite care by assessing and managing patients in the waiting room. There is limited literature examining this role. This paper presents results of semi-structured interviews with five key informants to explore why and how the waiting room nurse role was implemented in Australian emergency departments. Data were thematically analysed. Five key informants from five emergency departments across two Australian jurisdictions (Victoria and New South Wales) reported that the role was introduced to reduce waiting times and improve quality and safety of care in the ED waiting room. Critical to introducing the role was defining and supporting the scope of practice, experience and preparation of the nurses. Role implementation required champions to overcome identified challenges, including funding. There has been limited evaluation of the role. The waiting room nurse role was introduced to decrease waiting times and contributed to risk mitigation. Common to all roles was standing orders, while preparation and experience varied. Further research into the role is required. Copyright © 2016 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.

  2. Identification of Key Barriers in Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  3. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  4. Quantum Cryptography Beyond Quantum Key Distribution

    OpenAIRE

    Broadbent, A.; Schaffner, C

    2015-01-01

    textabstractQuantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secure two- and multi-party computation and delegated quantum computation. Quantum cryptography also studies the limitations and challenges resulting from quantum adversaries—including the ...

  5. Quantum key distribution over multicore fiber.

    Science.gov (United States)

    Dynes, J F; Kindness, S J; Tam, S W-B; Plews, A; Sharpe, A W; Lucamarini, M; Fröhlich, B; Yuan, Z L; Penty, R V; Shields, A J

    2016-04-18

    We present the first quantum key distribution (QKD) experiment over multicore fiber. With space division multiplexing, we demonstrate that weak QKD signals can coexist with classical data signals launched at full power in a 53 km 7-core fiber, while showing negligible degradation in performance. Based on a characterization of intercore crosstalk, we perform additional simulations highlighting that classical data bandwidths beyond 1Tb/s can be supported with high speed QKD on the same fiber.

  6. Quantum key distribution over multicore fiber

    OpenAIRE

    Dynes, JF; Kindness, Stephen; Tam, SW-B; Plews, A.; Sharpe, AW; Lucamarini, M.; Fröhlich, B.; Yuan, ZL; Penty, Richard Vincent; Shields, AJ

    2016-01-01

    We present the first quantum key distribution (QKD) experiment over multicore fiber. With space division multiplexing, we demonstrate that weak QKD signals can coexist with classical data signals launched at full power in a 53 km 7-core fiber, while showing negligible degradation in performance. Based on a characterization of intercore crosstalk, we perform additional simulations highlighting that classical data bandwidths beyond 1Tb/s can be supported with high speed QKD on the same fiber.

  7. Key factors of teenagers' mobile advertising acceptance

    OpenAIRE

    Martí Parreño, José; Sanz Blas, Silvia; Ruiz Mafé, Carla; Aldás Manzano, Joaquín

    2013-01-01

    Purpose – The purpose of this paper is to analyse key drivers of teenagers’ attitude toward mobile advertising and its effects on teenagers’ mobile advertising acceptance. Design/methodology/approach – A proposed model of affective (irritation and entertainment) and cognitive (perceived usefulness) antecedents of attitude toward mobile advertising and its effects on mobile advertising acceptance is analysed. The sample consisted of 355 Spanish teenagers. The model was tested us...

  8. Key Physical Mechanisms in Nanostructured Solar Cells

    Energy Technology Data Exchange (ETDEWEB)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  9. Methods for Identifying Translational Researchers

    Science.gov (United States)

    Feeney, Mary K.; Johnson, Timothy; Welch, Eric W.

    2014-01-01

    There is currently no generally accepted method for identifying the community of translational researchers when evaluating Clinical and Translational Science Centers. We use data from the multiyear evaluation of the University of Illinois at Chicago Center for Clinical and Translational Science (CCTS) to investigate the complexities of reliably identifying translational researchers. We use three methods to identify translational researchers: (1) participating in CCTS services and programs; (2) self-identifying as a translational researcher; and (3) engaging in activities that are characteristic of translational science. We find little overlap of these differently defined research groups. We conclude with a discussion of how the findings suggest challenges for evaluating translational science programs and the need for better definition, communication, and demonstration of translational science for scientists and evaluators. PMID:24064431

  10. Identifying parameter regions for multistationarity

    DEFF Research Database (Denmark)

    Conradi, Carsten; Feliu, Elisenda; Mincheva, Maya

    2017-01-01

    Mathematical modelling has become an established tool for studying the dynamics of biological systems. Current applications range from building models that reproduce quantitative data to identifying systems with predefined qualitative features, such as switching behaviour, bistability or oscillat...

  11. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  12. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  13. Species Identification Key of Korean Mammal Hair

    Science.gov (United States)

    LEE, Eunok; CHOI, Tae-Young; WOO, Donggul; MIN, Mi-Sook; SUGITA, Shoei; LEE, Hang

    2014-01-01

    ABSTRACT The hair microstructures of Korean terrestrial mammals from 23 species (22 wild and one domestic) were analyzed using light and scanning electron microscopy (SEM) to construct a hair identification key. The hairs were examined using the medulla structures and cuticular scales of guard hairs from the dorsal regions of mature adult animals. All cuticular scale structures in the hair of Rodentia, Lagomorpha, Carnivora and Insectivora showed the petal pattern, and those of Artiodactyla and Chiroptera showed the wave pattern and coronal pattern, respectively. Rodentia, Lagomorpha and Carnivora showed multicellular, and Insectivora and Artiodactyla showed unicellular regular, mesh or columnar in the medulla structures, respectively. Chiroptera did not show the medulla structures in their hair. We found that it is possible to distinguish between species and order based on general appearance, medulla structures and cuticular scales. Thus, we constructed a hair identification key with morphological characteristics from each species. This study suggests that hair identification keys could be useful in fields, such as forensic science, food safety and foraging ecology. PMID:24451929

  14. Satellite-to-ground quantum key distribution

    Science.gov (United States)

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-09-01

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD—a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

  15. Key performance indicators for Australian mental health court liaison services.

    Science.gov (United States)

    Davidson, Fiona; Heffernan, Ed; Greenberg, David; Butler, Tony; Burgess, Philip

    2017-12-01

    The aim of this paper is to describe the development and technical specifications of a framework and national key performance indicators (KPIs) for Australian mental health Court Liaison Services (CLSs) by the National Mental Health Court Liaison Performance Working Group (Working Group). Representatives from each Australian State and Territory were invited to form a Working Group. Through a series of national workshops and meetings, a framework and set of performance indicators were developed using a review of literature and expert opinion. A total of six KPIs for CLSs have been identified and a set of technical specifications have been formed. This paper describes the process and outcomes of a national collaboration to develop a framework and KPIs. The measures have been developed to support future benchmarking activities and to assist services to identify best practice in this area of mental health service delivery.

  16. Influence: A Key to Successful Leadership

    Science.gov (United States)

    Hoy, Wayne K.; Smith, Page A.

    2007-01-01

    Purpose: The purpose of this article is to examine and condense the literature on influence and persuasion. Design/methodology/approach: The article identifies basic principles of influence in the theoretical and research literature, which are supported by empirical study. Findings: Ten principles of influence were identified, empirical support…

  17. Identifying core competencies for public health epidemiologists.

    Science.gov (United States)

    Bondy, Susan J; Johnson, Ian; Cole, Donald C; Bercovitz, Kim

    2008-01-01

    Public health authorities have prioritized the identification of competencies, yet little empirical data exist to support decisions on competency selection among particular disciplines. We sought perspectives on important competencies among epidemiologists familiar with or practicing in public health settings (local to national). Using a sequential, qualitative-quantitative mixed method design, we conducted key informant interviews with 12 public health practitioners familiar with front-line epidemiologists' practice, followed by a web-based survey of members of a provincial association of public health epidemiologists (90 respondents of 155 eligible) and a consensus workshop. Competency statements were drawn from existing core competency lists and those identified by key informants, and ranked by extent of agreement in importance for entry-level practitioners. Competencies in quantitative methods and analysis, critical appraisal of scientific evidence and knowledge transfer of scientific data to other members of the public health team were all regarded as very important for public health epidemiologists. Epidemiologist competencies focused on the provision, interpretation and 'translation' of evidence to inform decision-making by other public health professionals. Considerable tension existed around some potential competency items, particularly in the areas of more advanced database and data-analytic skills. Empirical data can inform discussions of discipline-specific competencies as one input to decisions about competencies appropriate for epidemiologists in the public health workforce.

  18. Identifying the immunomodulatory components of helminths.

    Science.gov (United States)

    Shepherd, C; Navarro, S; Wangchuk, P; Wilson, D; Daly, N L; Loukas, A

    2015-06-01

    Immunomodulatory components of helminths offer great promise as an entirely new class of biologics for the treatment of inflammatory diseases. Here, we discuss the emerging themes in helminth-driven immunomodulation in the context of therapeutic drug discovery. We broadly define the approaches that are currently applied by researchers to identify these helminth molecules, highlighting key areas of potential exploitation that have been mostly neglected thus far, notably small molecules. Finally, we propose that the investigation of immunomodulatory compounds will enable the translation of current and future research efforts into potential treatments for autoimmune and allergic diseases, while at the same time yielding new insights into the molecular interface of host-parasite biology. © 2015 John Wiley & Sons Ltd.

  19. UP Finder: A COBRA toolbox extension for identifying gene overexpression strategies for targeted overproduction

    OpenAIRE

    Wang, Xi; Yu, Liang; Chen, Shulin

    2017-01-01

    Overexpression of key genes is a basic strategy for overproducing target products via metabolic engineering. Traditionally, identifying those key genes/pathways largely relies on the knowledge of biochemistry and bioinformatics. In this study, a modeling tool named UP Finder was developed to facilitate the rapid identification of gene overexpression strategies. It was based on the COBRA toolbox under MATLAB environment. All the key gene/pathway targets are identified in one click after simply...

  20. In silico lineage tracing through single cell transcriptomics identifies a neural stem cell population in planarians.

    Science.gov (United States)

    Molinaro, Alyssa M; Pearson, Bret J

    2016-04-27

    The planarian Schmidtea mediterranea is a master regenerator with a large adult stem cell compartment. The lack of transgenic labeling techniques in this animal has hindered the study of lineage progression and has made understanding the mechanisms of tissue regeneration a challenge. However, recent advances in single-cell transcriptomics and analysis methods allow for the discovery of novel cell lineages as differentiation progresses from stem cell to terminally differentiated cell. Here we apply pseudotime analysis and single-cell transcriptomics to identify adult stem cells belonging to specific cellular lineages and identify novel candidate genes for future in vivo lineage studies. We purify 168 single stem and progeny cells from the planarian head, which were subjected to single-cell RNA sequencing (scRNAseq). Pseudotime analysis with Waterfall and gene set enrichment analysis predicts a molecularly distinct neoblast sub-population with neural character (νNeoblasts) as well as a novel alternative lineage. Using the predicted νNeoblast markers, we demonstrate that a novel proliferative stem cell population exists adjacent to the brain. scRNAseq coupled with in silico lineage analysis offers a new approach for studying lineage progression in planarians. The lineages identified here are extracted from a highly heterogeneous dataset with minimal prior knowledge of planarian lineages, demonstrating that lineage purification by transgenic labeling is not a prerequisite for this approach. The identification of the νNeoblast lineage demonstrates the usefulness of the planarian system for computationally predicting cellular lineages in an adult context coupled with in vivo verification.