WorldWideScience

Sample records for survey entry id

  1. Bi-weekly waterfowl survey data entry

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Data sheet for the entry of bi-weekly waterfowl survey data from the state of Kansas. This Excel file contains the data entry sheet and a chart displaying waterfowl...

  2. Integrated alarm annunciation and entry control systems -- Survey results

    Energy Technology Data Exchange (ETDEWEB)

    Clever, J.J.; Arakaki, L.H.; Monaco, F.M.; Juarros, L.E.; Quintana, G.R.

    1993-10-01

    This report provides the results and analyses of a detailed survey undertaken in Summer 1993 to address integrated intrusion detection alarm annunciation and entry control system issues. This survey was undertaken as a first attempt toward beginning to answer questions about integrated systems and commercial capabilities to meet or partially meet US Department of Energy (DOE) site needs.

  3. Automated entry technologies for confined space work activities: A survey.

    Science.gov (United States)

    Botti, Lucia; Ferrari, Emilio; Mora, Cristina

    2017-04-01

    Work in confined spaces poses a significant risk to workers and rescuers involved in the emergency response when an accident occurs. Despite several standards and regulations define the safety requirements for such activities, injuries, and fatalities still occur. Furthermore, the on-site inspections after accidents often reveal that both employers and employees fail to implement safe entry procedures. Removing the risk is possible by avoiding the worker entry, but many activities require the presence of the operator inside the confined space to perform manual tasks. The following study investigates the available technologies for hazardous confined space work activities, e.g., cleaning, inspecting, and maintenance tasks. The aim is to provide a systematic review of the automated solutions for high-risk activities in confined spaces, considering the non-man entry as the most effective confined space safety strategy. Second, this survey aims to provide suggestions for future research addressing the design of new technologies. The survey consists of about 60 papers concerning innovative technologies for confined space work activities. The document review shows that several solutions have been developed and automation can replace the workers for a limited number of hazardous tasks. Several activities still require the manual intervention due to the complex characteristics of confined spaces, e.g., to remove the remains of the automatic cleaning process from the bottom of a tank. The results show that available technologies require more flexibility to adapt to such occupational environments and further research is needed.

  4. Graduate entry nurses' initial perspectives on nursing: Content analysis of open-ended survey questions.

    Science.gov (United States)

    McKenna, Lisa; Brooks, Ingrid; Vanderheide, Rebecca

    2017-02-01

    Graduate entry nursing courses offer individuals with prior degrees the opportunity to gain nursing qualifications and facilitate career change. While it is known that accelerated graduate entry courses are increasingly popular, the perceptions of nursing held by such individuals and the influence this has on those seeking to enter the profession are less clearly understood. To explore graduate entry nursing students' perceptions of nursing on entering their pre-registration course. A descriptive design utilising cross-section survey with two open-ended questions: What do you believe the role of the nurse is? What things have influenced that view? were asked. Demographic data were analysed using descriptive frequencies, while the two open-ended questions were analysed using summative content analysis. One university-based postgraduate graduate entry nursing course in Australia PARTICIPANTS: Eight cohorts (n=286) commencing students with prior degrees other than nursing. The course attracts students from diverse backgrounds. Exposure to nursing and nurses, either as a consumer of health care or other health care role, plays a primary role in influencing career change. However, similar to those found with school leavers, there remains much misinformation about nurses' roles for students in these courses. Most identify the role of caring in nursing. For some, media representations are the only information sources. Graduate entry courses offer opportunities to attract new nurses and contribute to addressing workforce shortages. However, there is still a lack of knowledge of nursing roles among students on entry. More work is required by the profession to ensure nursing is accurately and positively represented to the community. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  5. A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

    CERN Document Server

    Deb, Novarun; Chaki, Nabendu

    2011-01-01

    An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published ...

  6. Clinical Reasoning: Survey of Teaching Methods, Integration, and Assessment in Entry-Level Physical Therapist Academic Education.

    Science.gov (United States)

    Christensen, Nicole; Black, Lisa; Furze, Jennifer; Huhn, Karen; Vendrely, Ann; Wainwright, Susan

    2017-02-01

    Although clinical reasoning abilities are important learning outcomes of physical therapist entry-level education, best practice standards have not been established to guide clinical reasoning curricular design and learning assessment. This research explored how clinical reasoning is currently defined, taught, and assessed in physical therapist entry-level education programs. A descriptive, cross-sectional survey was administered to physical therapist program representatives. An electronic 24-question survey was distributed to the directors of 207 programs accredited by the Commission on Accreditation in Physical Therapy Education. Descriptive statistical analysis and qualitative content analysis were performed. Post hoc demographic and wave analyses revealed no evidence of nonresponse bias. A response rate of 46.4% (n=96) was achieved. All respondents reported that their programs incorporated clinical reasoning into their curricula. Only 25% of respondents reported a common definition of clinical reasoning in their programs. Most respondents (90.6%) reported that clinical reasoning was explicit in their curricula, and 94.8% indicated that multiple methods of curricular integration were used. Instructor-designed materials were most commonly used to teach clinical reasoning (83.3%). Assessment of clinical reasoning included practical examinations (99%), clinical coursework (94.8%), written examinations (87.5%), and written assignments (83.3%). Curricular integration of clinical reasoning-related self-reflection skills was reported by 91%. A large number of incomplete surveys affected the response rate, and the program directors to whom the survey was sent may not have consulted the faculty members who were most knowledgeable about clinical reasoning in their curricula. The survey construction limited some responses and application of the results. Although clinical reasoning was explicitly integrated into program curricula, it was not consistently defined, taught, or

  7. UST-ID robotics: Wireless communication and minimum conductor technology, and end-point tracking technology surveys

    Energy Technology Data Exchange (ETDEWEB)

    Holliday, M.A.

    1993-10-01

    This report is a technology review of the current state-of-the-art in two technologies applicable to the Underground Storage Tank (UST) program at the Hanford Nuclear Reservation. The first review is of wireless and minimal conductor technologies for in-tank communications. The second review is of advanced concepts for independent tool-point tracking. This study addresses the need to provide wireless transmission media or minimum conductor technology for in-tank communications and robot control. At present, signals are conducted via contacting transmission media, i.e., cables. Replacing wires with radio frequencies or invisible light are commonplace in the communication industry. This technology will be evaluated for its applicability to the needs of robotics. Some of these options are radio signals, leaky coax, infrared, microwave, and optical fiber systems. Although optical fiber systems are contacting transmission media, they will be considered because of their ability to reduce the number of conductors. In this report we will identify, evaluate, and recommend the requirements for wireless and minimum conductor technology to replace the present cable system. The second section is a technology survey of concepts for independent end-point tracking (tracking the position of robot end effectors). The position of the end effector in current industrial robots is determined by computing that position from joint information, which is basically a problem of locating a point in three-dimensional space. Several approaches are presently being used in industrial robotics, including: stereo-triangulation with a theodolite network and electrocamera system, photogrammetry, and multiple-length measurement with laser interferometry and wires. The techniques that will be evaluated in this survey are advanced applications of the aforementioned approaches. These include laser tracking (3-D and 5-D), ultrasonic tracking, vision-guided servoing, and adaptive robotic visual tracking.

  8. Perils and potentials of self-selected entry to epidemiological studies and surveys

    DEFF Research Database (Denmark)

    Keiding, Niels; Louis, Thomas A.

    2016-01-01

    Low front-end cost and rapid accrual make Web-based surveys and enrolment in studies attractive, but participants are often self-selected with little reference to a well-defined study base. Of course, high quality studies must be internally valid (validity of inferences for the sample at hand......), but Web-based enrolment reactivates discussion of external validity (generalization of within-study inferences to a target population or context) in epidemiology and clinical trials. Survey research relies on a representative sample produced by a sampling frame, prespecified sampling process and weighting...... that maps results to an intended population. In contrast, recent analytical epidemiology has shifted the focus away from survey-type representativity to internal validity in the sample. Against this background, it is a good time for statisticians to take stock of our role and position regarding surveys...

  9. Experience with digital entry of national iodine survey data in Senegal

    African Journals Online (AJOL)

    Handheld computers have the potential to facilitate high quality data collection and ... capture in a national survey to monitor progress toward universal salt iodization in ... to collect the data learned how to manipulate the PDAs within a short amount of time. ... recommended, along with efforts to build local technical capacity.

  10. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  11. OA 2014-5 Dataset - Limited Entry and Open Access cost earnings survey collecting 2014-15 data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This project collects economic data from vessel owners participating in the West Coast limited entry fixed gear and open access groundfish, salmon, crab, and shrimp...

  12. The use of personal digital assistants for data entry at the point of collection in a large household survey in southern Tanzania

    Directory of Open Access Journals (Sweden)

    Mushi Adiel

    2007-06-01

    Full Text Available Abstract Background Survey data are traditionally collected using pen-and-paper, with double data entry, comparison of entries and reconciliation of discrepancies before data cleaning can commence. We used Personal Digital Assistants (PDAs for data entry at the point of collection, to save time and enhance the quality of data in a survey of over 21,000 scattered rural households in southern Tanzania. Methods Pendragon Forms 4.0 software was used to develop a modular questionnaire designed to record information on household residents, birth histories, child health and health-seeking behaviour. The questionnaire was loaded onto Palm m130 PDAs with 8 Mb RAM. One hundred and twenty interviewers, the vast majority with no more than four years of secondary education and very few with any prior computer experience, were trained to interview using the PDAs. The 13 survey teams, each with a supervisor, laptop and a four-wheel drive vehicle, were supported by two back-up vehicles during the two months of field activities. PDAs and laptop computers were charged using solar and in-car chargers. Logical checks were performed and skip patterns taken care of at the time of data entry. Data records could not be edited after leaving each household, to ensure the integrity of the data from each interview. Data were downloaded to the laptop computers and daily summary reports produced to evaluate the completeness of data collection. Data were backed up at three levels: (i at the end of every module, data were backed up onto storage cards in the PDA; (ii at the end of every day, data were downloaded to laptop computers; and (iii a compact disc (CD was made of each team's data each day. A small group of interviewees from the community, as well as supervisors and interviewers, were asked about their attitudes to the use of PDAs. Results Following two weeks of training and piloting, data were collected from 21,600 households (83,346 individuals over a seven

  13. Application of student ID-related data in practical teaching of engineering survey%学号关联数据在工程测量实践教学中的应用研究

    Institute of Scientific and Technical Information of China (English)

    陈德标

    2011-01-01

    为提高测量实训实效,本文以平面点位放样为切入点,探讨了学号关联数据表的编制及优点.其应用实验表明,学号关联数据法能有效调动学习积极性,减少抄袭、拷贝现象,使成绩评定更加客观公正,提高实训实效.问卷调查表明该方法师生认可度高,在测量实践教学中有一定推广价值.%Based on plane point lofting, this paper dicussed merits of compiling a student ID-relaled data table in order to improve survey practical effectiveness. Its application results showed that student ID-related data method could effectively mobilize study motivation, reduce plagiarism and copy, leading to a more fair assessment.

  14. Application of student ID-related data in practical teaching of engineering survey%一种基于圆形窗口的多边形裁剪新算法

    Institute of Scientific and Technical Information of China (English)

    罗畏; 邹峥嵘

    2011-01-01

    Based on plane point lofting, this paper discussed merits of compiling a student ID-related data bable in order to improve survey practical effectiveness. Its application results showed that student ID-related data method could effectively mobilize studymotivation, reduce plagiarism and copy, leading to a more fair assessment.%本文在相关文献提出的圆形窗口裁减算法基础上,提出了一种圆形窗口裁剪多边形的有效算法.该算法的基本思想是,建立单线性链表数据结构来存储多边形的顶点以及多边形与圆的交点,使用一种免解二次方程的算法来求交点的坐标.该算法与其他同类算法相比,具有较简单的数据结构和较快的运行速度.

  15. Successful I.D. Encounters.

    Science.gov (United States)

    Poorman, Margaret J.

    Instructional Development (I.D.) encounters are dependent for success on such variables as power, politics, promotion, and organizational placement. I.D. consultants must be aware of power bases or orientation of other personnel and clients, e.g., these four "power personalities" which affect their efforts in managing I.D. encounters: the gate…

  16. Effects of a change in entry-to-practice criteria for cardiovascular perfusion in Canada: results of a national survey.

    Science.gov (United States)

    Belway, Dean; Tran, Diem T T; Rubens, Fraser D

    2017-05-01

    Years of experience and level of education are two important determinants of a clinician's expertise. While entry-to-practice criteria for admission to perfusion training in Canada changed from clinical experience-based criteria to education-based criteria in 2006, the effects of these changes have not been studied. To determine the academic and clinical backgrounds of perfusionists in Canada, ascertain perceptions about the adequacy of training and evaluate the effects of the changes on the composition of the perfusion community of Canada. An electronic questionnaire was distributed to all practicing perfusionists in Canada, addressing details regarding clinical experience, academic education and perceptions about the adequacy of training. Two hundred and twenty-eight questionnaires were completed, representing a 72% response rate. Perfusionists admitted under academic-based criteria have significantly higher levels of education (100% degree holders vs 69.1%, pperfusion because of attraction to the type of work (p=0.045). Many perfusionists (70, 32%) in Canada believe themselves inadequately trained for their clinical assignments outside the OR. In addition, 19% of perfusionists plan to retire over the next 10 years. The introduction of education-based entry criteria has changed the academic and clinical experience levels of perfusionists in Canada. Strategies designed to better prepare perfusionists for their clinical assignments outside the OR are merited.

  17. Coal Mines, Abandoned - COAL_MINE_ENTRIES_IN: Underground Coal Mine Entrances in Indiana (Indiana Geological Survey, 1:24,000, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — SW_COAL_ENTRY, the predecessor of COAL_MINE_ENTRIES_IN, is a point- based ESRI ArcView shapefile that shows the locations of underground coal mine entrances in the...

  18. US Ports of Entry

    Data.gov (United States)

    Department of Homeland Security — HSIP Non-Crossing Ports-of-Entry A Port of Entry is any designated place at which a CBP officer is authorized to accept entries of merchandise to collect duties, and...

  19. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  20. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  1. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  2. Water Entry of Projectiles

    Science.gov (United States)

    Truscott, Tadd T.; Epps, Brenden P.; Belden, Jesse

    2014-01-01

    The free-surface impact of solid objects has been investigated for well over a century. This canonical problem is influenced by many physical parameters, including projectile geometry, material properties, fluid properties, and impact parameters. Through advances in high-speed imaging and visualization techniques, discoveries about the underlying physics have improved our understanding of these phenomena. Improvements to analytical and numerical models have led to critical insights into cavity formation, the depth and time of pinch-off, forces, and trajectories for myriad different impact parameters. This topic spans a wide range of regimes, from low-speed entry phenomena dominated by surface tension to high-speed ballistics, for which cavitation is important. This review surveys experimental, theoretical, and numerical studies over this broad range, utilizing canonical images where possible to enhance intuition and insight into the rich phenomena.

  3. 利用ID-ELISA技术调查分析海南3种主要番木瓜病毒分布及感病情况%Survey on Distributions and Infectious Status of Three Main Kinds of Papaya Virus by ID-ELISA in Hainan

    Institute of Scientific and Technical Information of China (English)

    杨勇; 庹德财; 沈文涛; 言普; 黎小瑛; 周鹏; 王锐萍

    2015-01-01

    利用PCR方法分别扩增番木瓜环斑病毒(papaya ringspot virus,PRSV)、番木瓜畸形花叶病毒(papaya leaf distortion mosaic virus,PLDMV)和番木瓜花叶病(papaya mosaic virus,PaMV)的外壳蛋白(coat protein,CP)基因,并连接到原核表达载体pET-28a上,获得重组质粒pET28-PRSV-CP、pET28-PLDMV-CP和pET28-PaMV-CP,通过转化、诱导表达后,经SDS-PAGE分析显示,这3种CP蛋白在大肠杆菌中高效表达,其中PRSV CP蛋白和PLDMV CP以包涵体形式存在,PaMV CP以可溶蛋白形式存在.利用Ni2+-NTA琼脂糖亲和层析纯化获得了3种病毒的重组CP蛋白,并免疫大白兔获得高效价的抗体.Western blot检测结果表明,这3种抗血清与对应的诱导表达蛋白发生特异反应.再采用抗血清建立一种快捷、简便和低成本的ID-ELISA (Indirect enzyme-linked immunosorbent assay)技术,并利用此技术对海南岛283个疑似感病的番木瓜样品进行检测鉴别,初步掌握了海南岛3种主要番木瓜病毒的分布及感病情况,为下一步该病的有效防治策略提供科学依据.

  4. L’idéologie

    Directory of Open Access Journals (Sweden)

    Paul Aron

    2007-02-01

    Full Text Available De Marx à BourdieuJugée essentielle dans les années septante, déclinée en colloques, ouvrages polémiques ou encyclopédiques divers, rythmée par les interventions théoriques de penseurs comme Antonio Gramsci, que l’on commençait à traduire en français, Louis Althusser, Lucien Sève ou Robert Fossaert, la problématique de l’idéologie a mobilisé les esprits à un point tel que le silence qui l’entoure aujourd’hui peut légitimement surprendre.Je commencerai par situer cette notion dans son cadre hi...

  5. Tinjauan Desain Website kemlu.go.id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-03-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.

  6. DLMS Voice Data Entry.

    Science.gov (United States)

    1980-06-01

    between operator and computer displayed on ADM-3A 20c A-I Possible Hardware Configuration for a Multistation Cartographic VDES ...this program a Voice Recognition System (VRS) which can be used to explore the use of voice data entry ( VDE ) in the DIMS or other cartographic data...Multi-Station Cartographic Voice Data Entry System An engineering development model voice data entry system ( VDES ) could be most efficiently

  7. Entry at Venus

    Science.gov (United States)

    Venkatapathy, Ethiraj; Smith, Brandon

    2016-01-01

    This is lecture to be given at the IPPW 2016, as part of the 2 day course on Short Course on Destination Venus: Science, Technology and Mission Architectures. The attached presentation material is intended to be introduction to entry aspects of Venus in-situ robotic missions. The presentation introduces the audience to the aerodynamic and aerothermodynamic aspects as well as the loads, both aero and thermal, generated during entry. The course touches upon the system design aspects such as TPS design and both high and low ballistic coefficient entry system concepts that allow the science payload to be protected from the extreme entry environment and yet meet the mission objectives.

  8. DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution

    Directory of Open Access Journals (Sweden)

    Abdulrahman H. Altalhi

    2011-11-01

    Full Text Available The covert channel is a method used to send secret data within a communication channel in unauthorized ways. This is performed by exploiting the weaknesses in packet or network communications with the intention to hide the existence of a covert communication. The DNS identification (DNS ID method has been exploited by Thyer. However, the major problem in Thyers implementation is that the encrypted cipher was directly inserted as a DNS ID value, which is abnormal, compared to the normal DNS ID distribution. We have overcome this problem through the application of Steganography to insert the cipher value into the DNS ID. The data set test for normal DNS ID is taken from MAWI. We tested four different message lengths and plotted the distribution graph. We found that the proposed result is normal compared to normal distribution of the DNS ID. Therefore, this method produces a normal distribution for DNS ID covert channel.

  9. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  10. Double entry bookkeeping vs single entry bookkeeping

    Directory of Open Access Journals (Sweden)

    Ileana Andreica

    2016-11-01

    Full Text Available Abstract: A financial management eficiently begin, primarily, with an accounting record kept in the best possible conditions, this being conditioned on the adoption of a uniform forms, rational, clear and simple accounting. Throughout history, there have been known two forms of accounting: the simple and double entry. Romanian society after 1990 underwent a substantial change in social structure, the sector on which put a great emphasis being private, that of small manufacturers, peddler, freelance, who work independently and authorized or as associative form (family enterprises, various associations (owners, tenants, etc., liberal professions, etc.. They are obliged to keep a simple bookkeeping, because they have no juridical personality. Companies with legal personality are required to keep double entry bookkeeping; therefore, knowledge and border demarcation between the two forms of organisation of accounting is an essential. The material used for this work is mainly represented by the financial and accounting documents, by the analysis of the economic, by legislative updated sources, and as the method was used the comparison method, using hypothetical data, in case of an authorized individual and a legal entity. Based on the chosen material, an authorized individual (who perform single entry accounting system and a juridical entity (who perform double entry accounting system were selected comparative case studies, using hypothetical data, were analysed advantages and disadvantages in term of fiscal, if using two accounting systems, then were highlighted some conclusion that result.

  11. Inhibitor of differentiation 4 (ID4): From development to cancer.

    Science.gov (United States)

    Patel, Divya; Morton, Derrick J; Carey, Jason; Havrda, Mathew C; Chaudhary, Jaideep

    2015-01-01

    Highly conserved Inhibitors of DNA-Binding (ID1-ID4) genes encode multi-functional proteins whose transcriptional activity is based on dominant negative inhibition of basic helix-loop-helix (bHLH) transcription factors. Initial animal models indicated a degree of compensatory overlap between ID genes such that deletion of multiple ID genes was required to generate easily recognizable phenotypes. More recently, new model systems have revealed alterations in mice harboring deletions in single ID genes suggesting complex gene and tissue specific functions for members of the ID gene family. Because ID genes are highly expressed during development and their function is associated with a primitive, proliferative cellular phenotype there has been significant interest in understanding their potential roles in neoplasia. Indeed, numerous studies indicate an oncogenic function for ID1, ID2 and ID3. In contrast, the inhibitor of differentiation 4 (ID4) presents a paradigm shift in context of well-established role of ID1, ID2 and ID3 in development and cancer. Apart from some degree of functional redundancy such as HLH dependent interactions with bHLH protein E2A, many of the functions of ID4 are distinct from ID1, ID2 and ID3: ID4 proteins a) regulate distinct developmental processes and tissue expression in the adult, b) promote stem cell survival, differentiation and/or timing of differentiation, c) epigenetic inactivation/loss of expression in several advanced stage cancers and d) increased expression in some cancers such as those arising in the breast and ovary. Thus, in spite of sharing the conserved HLH domain, ID4 defies the established model of ID protein function and expression. The underlying molecular mechanism responsible for the unique role of ID4 as compared to other ID proteins still remains largely un-explored. This review will focus on the current understanding of ID4 in context of development and cancer. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Energy Technology Data Exchange (ETDEWEB)

    Desprez, Pierre-Yves (El Cerrito, CA); Campisi, Judith (Berkeley, CA)

    2011-10-04

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  13. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2011-10-04

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  14. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  15. Combined Id1 and Id3 Deletion Leads to Severe Erythropoietic Disturbances.

    Directory of Open Access Journals (Sweden)

    Qingshi Zhao

    Full Text Available The Inhibitor of DNA Binding (Id proteins play a crucial role in regulating hematopoiesis and are known to interact with E proteins and the bHLH family of transcription factors. Current efforts seek to elucidate the individual roles of Id members in regulating hematopoietic development and specification. However, the nature of their functional redundancies remains elusive since ablation of multiple Id genes is embryonically lethal. We developed a model to test this compensation in the adult. We report that global Id3 ablation with Tie2Cre-mediated conditional ablation of Id1 in both hematopoietic and endothelial cells (Id cDKO extends viability to 1 year but leads to multi-lineage hematopoietic defects including the emergence of anemia associated with defective erythroid development, a novel phenotype unreported in prior single Id knockout studies. We observe decreased cell counts in the bone marrow and splenomegaly to dimensions beyond what is seen in single Id knockout models. Transcriptional dysregulation of hematopoietic regulators observed in bone marrow cells is also magnified in the spleen. E47 protein levels were elevated in Id cDKO bone marrow cell isolates, but decreased in the erythroid lineage. Chromatin immunoprecipitation (ChIP studies reveal increased occupancy of E47 and GATA1 at the promoter regions of β-globin and E2A. Bone marrow transplantation studies highlight the importance of intrinsic Id signals in maintaining hematopoietic homeostasis while revealing a strong extrinsic influence in the development of anemia. Together, these findings demonstrate that loss of Id compensation leads to dysregulation of the hematopoietic transcriptional network and multiple defects in erythropoietic development in adult mice.

  16. Financial Performance of Entry Mode Decisions

    DEFF Research Database (Denmark)

    Boyd, Britta; Dyhr Ulrich, Anna Marie; Hollensen, Svend

    2012-01-01

    Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step ...... and implications are provided for companies willing to invest more into foreign markets in order to achieve a higher degree of control and better financial results.......Based on a survey of 170 Danish SMEs the paper examines influences on entry mode choices and the financial outcome of these decisions. The main research objectives are divided into two steps: Step 1: To determine the factors influencing the choice of foreign entry modes by Danish companies. Step 2......: To determine the relationship between the choice of entry mode and export performance, measured in terms of financial outcome. Drawing from transaction cost theory the authors develop and test a model where different factors affect the level of control chosen by the parent company. This study contributes...

  17. Entry Location and Entry Timing (ELET Decision Model for International Construction Firms

    Directory of Open Access Journals (Sweden)

    Che Maznah Mat Isa

    2014-09-01

    Full Text Available This paper proposes a model for entry location (EL and entry timing (ET decisions to guide construction firms in accessing targeted international markets.  Neglecting to properly choose the right combination of the entry location and entry timing (ELET decisions can lead to poor performance of the firms’ international ventures.  The sampling frame was from the Malaysian construction firms that have undertaken and completed projects abroad.  Survey questionnaires sent to 115 firms registered with Construction Industry Development Board (CIDB Malaysia, operating in more than 50 countries, achieved a 39.1 per cent response rate. Based on a comprehensive statistical analysis of survey data it was found that the mutually inclusive significant factors that influenced the firms’ ELET decisions were: the firm’s ability to assess market signals and opportunities, international experience, financial capacity, competencies and capabilities (project management, specialist expertise and technology, resources (level of knowledge based on research and development, experience in similar works, financial support from the home country banks, technical complexities of projects and availability of funds for projects.  Hence, the present research builds on and extends the literature on the ELET decisions in a more integrated way. Keywords: Entry location, entry timing, resource-based view, international markets, Malaysian construction firms.

  18. Noorteadlased kaitsesid doktoritöid

    Index Scriptorium Estoniae

    2002-01-01

    13. sept. 2002.a. kaitsesid TPÜ-s doktoritöid Mare Leino ("Sotsiaalsed probleemid koolis ja õpetaja toimetulek" ja Maaris Raudsepp ("Loodussäästlikkus kui regulatiivne idee: sotsiaal-psühholoogiline analüüs")

  19. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  20. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  1. Selection of starter cultures for idli batter fermentation and their effect on quality of idlis.

    Science.gov (United States)

    Sridevi, J; Halami, Prakash M; Vijayendra, S V N

    2010-10-01

    Idli batter samples were prepared using lactic starter cultures like Pediococcus pentosaceus (Pp), Enterococcus faecium MTCC 5153 (Ef), Ent. faecium (IB2 Ef-IB2), individually, along with the yeast culture, Candida versatilis (Cv). Idli batter prepared using Ef and Ef-IB2 cultures gave better results, when evaluated for the rise in batter volume (80 ml), level of CO2 production (23.8%), titratable acidity 2.4-3.5% (lactic acid) and pH 4.3-4.4. Storage stability of batter made with selected starter cultures was determined by analyzing the idlis prepared using the batter stored for 1 and 5 days for texture, nutrient composition and sensory quality. Slight variations in the results were seen among the idlis of different combination of cultures, whereas these results are better than that of the idlis made using naturally fermented idli batter. Sensory profile of idlis prepared using starter cultures had a higher score (3.9-4.4) compared to the control (3.6) for overall acceptability.

  2. Hybrid location determination technology within urban and indoor environment based on Cell-ID and path loss

    Institute of Scientific and Technical Information of China (English)

    HU Sheng; LEI Jian-jun; XIA Ying; GE Jun-wei; BAE Hae-young

    2004-01-01

    The location determination technology based on simple delay evaluations or GPS is not accurate enough or even impossible in urban and indoor environments due to the multi-path propagation. To enhance the location accuracy and reduce the operation cost within these environments, this paper proposes a novel hybrid location determination technology which combines CELL-ID with the database correlation method. The proposed method generate the prediction database of path loss according to CELL-ID, and after the computation the smallest squared error of measured path loss and the prediction path loss,the location of the mobile terminal is decided by the coordinates of the best matching matrix entry.

  3. Shuttle entry guidance

    Science.gov (United States)

    Harpold, J. C.; Graves, C. A., Jr.

    1978-01-01

    This paper describes the design of the entry guidance for the Space Shuttle Orbiter. This guidance provides the steering commands for trajectory control from initial penetration of the earth's atmosphere until the terminal area guidance is activated at an earth-relative speed of 2500 fps. At this point, the Orbiter is at a distance of about 50 nmi from the runway threshold, and at an altitude of about 80,000 ft. The entry guidance design is based on an analytic solution of the equations of motion defining the drag acceleration profile that meets the terminal criteria of the entry flight while maintaining the flight within systems and operational constraints. Guidance commands, which are based on a control law that ensures damping of oscillatory type trajectory motion, are computed to steer the Orbiter to this drag acceleration profile.

  4. IDS in Telecommunication Network using PCA

    Directory of Open Access Journals (Sweden)

    T. K. Abdelhamid

    2013-07-01

    Full Text Available Data Security has become a very serious part of any organizational information system.Internet threatshavebecome moreintelligentso itcan deceivethe basic security solutions such as firewalls and antivirusscanners.To enhance the overall security of the networkan additional security layer such asintrusiondetection system(IDShas to be added.The anomaly detection IDSisa typeof IDS thatcandifferentiatebetweennormal and abnormal in thedata monitored. This paper proposes two types of IDS, oneof themcanbeusedasa network intrusion detection system(NIDS with overallsuccess (0.9161 and highdetection rate (0.9288 andtheothertypecanalso beusedasa host intrusion detection system(HIDS withoverall success (0.8493 and very high detection rate (0.9628using NSL-KDD data set

  5. Haro sur l’idéologie

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Bertrand

    2007-02-01

    Full Text Available Consacrer une journée d’études à la question de l’idéologie dans les études littéraires, ce n’est pas réhabiliter une notion qui a porté toute la tradition sociocritique, de Lukàcs à Hamon, en passant par Barthes, Dubois, Duchet et tant d’autres, en référence à la célèbre définition qu’en avait donné Althusser dans Positions. Ce n’est pas non plus enterrer très idéologiquement une notion dont on découvrirait, en cette ère de postmodernité, l’incongruité opérationnelle. C’est pour le moins fai...

  6. SURVEY

    DEFF Research Database (Denmark)

    SURVEY er en udbredt metode og benyttes inden for bl.a. samfundsvidenskab, humaniora, psykologi og sundhedsforskning. Også uden for forskningsverdenen er der mange organisationer som f.eks. konsulentfirmaer og offentlige institutioner samt marketingsafdelinger i private virksomheder, der arbejder...... med surveys. Denne bog gennemgår alle surveyarbejdets faser og giver en praktisk indføring i: • design af undersøgelsen og udvælgelse af stikprøver, • formulering af spørgeskemaer samt indsamling og kodning af data, • metoder til at analysere resultaterne...

  7. Deployable Entry-system Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Deployable Entry-system ProjecT (ADEPT) will develop requirements for the ADEPT flight test.  Prior entry systems used high mass thermal protection...

  8. Tarbijakaitse ei sekku esialgu ID-pileti projekti / Urmas Seaver

    Index Scriptorium Estoniae

    Seaver, Urmas, 1973-

    2004-01-01

    Tallinna ID-pileti müügil teenustasu võtmist arvustanud riigi tarbijakaitse amet ei sekku esialgu käivituvasse projekti, sest linnavalitsus võimaldab osta kahest teeninduspunktist ID-piletit ka teenustasuta

  9. Re-entry and simulation

    Science.gov (United States)

    Jian, H.; Guangming, X.

    1983-11-01

    The physics of re-entry are discussed with emphasis on the re-entry trajectory of a ballistic missile. Factors discussed include re-entry speed, ablation, aerodynamic heating, and the plasma sheath shield. Experimental techniques used to simulate the aerodynamics and performance of missile systems include the computer, the wind tunnel, and free flight. Each of these is briefly discussed.

  10. Effectiveness of Iphone’s Touch ID: KSA Case Study

    Directory of Open Access Journals (Sweden)

    Ahmad A. Al-Daraiseh

    2015-01-01

    Full Text Available A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s. One of the most anticipated and hailed features of the new device was its Touch ID. Apple advertised that the new technology will increase the security of its device, and it will also be used in different applications as a proof of identity. To make the issue more controversial, Apple announced a new financial service (Apple Pay that allows iPhone 6 users to use their iPhone as a replacement to credit cards. The minute the new technology was introduced; many questions appeared that needed immediate answers. Users were concerned about how it will work? Is it easy to use? Is it really safe? And whether it will be effective in protecting their private data or not? In this paper we provide a comprehensive study of this feature. We discuss the advantages and disadvantages of using it. Then we analyze and share the results of a survey that we conducted to measure the effectiveness of such feature in the Kingdom of Saudi Arabia (KSA. In this study, we only focus on users from KSA, because if the device fails to protect mobile’s data, severe consequences might happen. Due to cultural believes in KSA, releasing mobile contents to unauthorized people could lead to crimes. Survey analysis revealed somewhat controversial results, while 76% of all participants believe that this technology will improve the device security, only 33% use it to lock/unlock their devices, and even a smaller percentage use it to make purchases.

  11. Remembering one's ID/E-ntity: E/ID protein regulation of T cell memory.

    Science.gov (United States)

    Omilusik, Kyla D; Shaw, Laura A; Goldrath, Ananda W

    2013-10-01

    Upon infection, CD8(+) T cells proliferate and differentiate into armed effector cells capable of eliminating the assaulting pathogen. Although the majority of the antigen-specific T cells will die as the immune response wanes, a few will survive indefinitely to establish the memory population and provide long-lived protection against reinfection. E protein transcription factors and their inhibitors, ID proteins, operate to balance expression of genes that control CD8(+) T cell differentiation through this process. Here, we discuss the role of ID2 and ID3 in promoting the generation and survival of effector and memory populations, particularly highlighting their reciprocal roles in shaping the CD8(+) T cell response unique to the inflammatory milieu. We further examine this coordinated control of gene expression in the context of additional transcription factors within the transcriptional network that programs CD8(+) effector and memory T cell differentiation.

  12. The choice of foreign entry modes in a control perspective

    DEFF Research Database (Denmark)

    Boyd, Britta; Dyhr Ulrich, Anna Marie; Hollensen, Svend

    The aim of this article is to investigate the choice of entry modes for international markets in a control perspective. A survey from The Confederation of Danish Industry with 234 Danish small- and medium sized enterprises served as a data base. The entry modes are categorized into three groups d...... turnover. The factors: personal networks and the interruption of the international activities were the most significant factors for the choice of intermediate mode (joint ventures and strategic alliances)....

  13. Analysis list: ID1 [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available ID1 Digestive tract + hg19 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID...1.1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID1.5.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ID...1.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/ID1.Digestive_tract.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/Digestive_tract.gml ...

  14. Id transcriptional regulators in adipogenesis and adipose tissue metabolism.

    Science.gov (United States)

    Patil, Mallikarjun; Sharma, Bal Krishan; Satyanarayana, Ande

    2014-06-01

    Id proteins (Id1-Id4) are helix-loop-helix (HLH) transcriptional regulators that lack a basic DNA binding domain. They act as negative regulators of basic helix-loop-helix (bHLH) transcription factors by forming heterodimers and inhibit their DNA binding and transcriptional activity. Id proteins are implicated in the regulation of various cellular mechanisms such as cell proliferation, cellular differentiation, cell fate determination, angiogenesis and tumorigenesis. A handful of recent studies also disclosed that Id proteins have critical functions in adipocyte differentiation and adipose tissue metabolism. Here, we reviewed the progress made thus far in understanding the specific functions of Id proteins in adipose tissue differentiation and metabolism. In addition to reviewing the known mechanisms of action, we also discuss possible additional mechanisms in which Id proteins might participate in regulating adipogenic and metabolic pathways.

  15. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  16. Low Physical Fitness Levels in Older Adults with ID: Results of the HA-ID Study

    Science.gov (United States)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2012-01-01

    Physical fitness is as important to aging adults with ID as in the general population, but to date, the physical fitness levels of this group are unknown. Comfortable walking speed, muscle strength (grip strength), muscle endurance (30 s Chair stand) and cardiorespiratory endurance (10 m incremental shuttle walking test) were tested in a sample of…

  17. Low Physical Fitness Levels in Older Adults with ID: Results of the HA-ID Study

    Science.gov (United States)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2012-01-01

    Physical fitness is as important to aging adults with ID as in the general population, but to date, the physical fitness levels of this group are unknown. Comfortable walking speed, muscle strength (grip strength), muscle endurance (30 s Chair stand) and cardiorespiratory endurance (10 m incremental shuttle walking test) were tested in a sample of…

  18. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  19. Dynamics of Water Entry

    CERN Document Server

    Truscott, Tadd T; Techet, Alexandra H

    2008-01-01

    The hydrodynamics associated with water-entry of spheres can be highly variable with respect to the material and kinematic properties of the sphere. This series of five fluid dynamics videos illustrates several subtle but interesting variations that can be seen. The first series of videos contrasts the nature of impact ($Fr = U_o/\\sqrt{gd} = 5.15$) between a hydrophilic (wetting angle of $\\alpha$ = 60$^\\circ$) and hydrophobic sphere ($\\alpha$ = 120$^\\circ$), and illustrates how surface coating can affect whether or not an air cavity is formed; the views from the side and from above are synchronized in time. The second video series illustrates how spin and surface treatments can alter the splash and cavity formation following water entry. The spinning sphere ($S = \\omega r / U_o = 1.7$; $Fr = 5.15$) causes a wedge of fluid to be drawn into the cavity due to the no-slip condition and follows a curved trajectory. The non-spinning sphere ($Fr = 5.15$) has two distinct surface treatments on the left and right hemi...

  20. DriveID: safety innovation through individuation.

    Science.gov (United States)

    Sawyer, Ben; Teo, Grace; Mouloua, Mustapha

    2012-01-01

    The driving task is highly complex and places considerable perceptual, physical and cognitive demands on the driver. As driving is fundamentally an information processing activity, distracted or impaired drivers have diminished safety margins compared with non- distracted drivers (Hancock and Parasuraman, 1992; TRB 1998 a & b). This competition for sensory and decision making capacities can lead to failures that cost lives. Some groups, teens and elderly drivers for example, have patterns of systematically poor perceptual, physical and cognitive performance while driving. Although there are technologies developed to aid these different drivers, these systems are often misused and underutilized. The DriveID project aims to design and develop a passive, automated face identification system capable of robustly identifying the driver of the vehicle, retrieve a stored profile, and intelligently prescribing specific accident prevention systems and driving environment customizations.

  1. Id2 deletion attenuates Apc-deficient ileal tumor formation

    Directory of Open Access Journals (Sweden)

    Kyoko Biyajima

    2015-08-01

    Full Text Available The expression level of inhibitor of DNA binding 2 (Id2 is increased in colorectal carcinomas and is positively correlated with poor prognosis. However, the functional significance of Id2 in intestinal tumorigenesis has not been fully defined using genetic approaches. Here, we show that Id2 promotes ileal tumor initiation in Apc-deficient mice. Expression of Id2 was stimulated by Wnt signaling through the enhancer region of the Id2 promoter at the early stage of tumorigenesis in Apc+/Δ716 (ApcΔ716 mice. Genetic depletion of Id2 in ApcΔ716 mice caused ∼80% reduction in the number of ileal polyps, but had little effect on tumor size. Notably, the lack of Id2 increased the number of apoptotic cells in the normal crypt epithelium of the mice. Furthermore, DNA microarray analysis revealed that the expression level of Max dimerization protein 1 (Mxd1, known as a c-Myc antagonist, was specifically increased by Id2 deletion in the ileal intestinal epithelium of ApcΔ716 mice. In contrast, the protein level of c-Myc, but not the mRNA level, was decreased by loss of Id2 in these mice. These results indicate that loss of Id2 inhibits tumor initiation by up-regulation of Mxd1 and down-regulation of c-Myc in ApcΔ716 mice.

  2. VizieR Online Data Catalog: VPHAS+ DR2 survey (Drew+, 2016)

    Science.gov (United States)

    Drew, J. E.; Gonzalez-Solares, E.; Greimel, R.; Irwin, M. J.; Kupcu Yoldas, A.; Lewis, J.; Barentsen, G.; Eisloffel, J.; Farnhill, H. J.; Martin, W. E.; Walsh, J. R.; Walton, N. A.; Mohr-Smith, M.; Raddi, R.; Sale, S. E.; Wright, N. J.; Groot, P.; Barlow, M. J.; Corradi, R. L. M.; Drake, J. J.; Fabregat, J.; Frew, D. J.; Gansicke, B. T.; Knigge, C.; Mampaso, A.; Morris, R. A. H.; Naylor, T.; Parker, Q. A.; Phillipps, S.; Ruhland, C.; Steeghs, D.; Unruh, Y. C.; Vink, J. S.; Wesson, R.; Zijlstra, A. A.

    2016-10-01

    The Second VPHAS data release (DR2) covers the first 21 months of data-taking in which the survey progressed to 24 percent completion. Much of the Galactic mid-plane is now covered (especially in the r, i and Hα filters). This release supersedes DR1. For access to the release documents and ESO archive entry, see ESO's public survey pages (http://eso.org/rm/publicAccess#/dataReleases). The appropriate journal reference for the use of VPHAS+data is to: Drew et al., 2014MNRAS.440.2036D. If making use of data from this release, please use the following statement in the acknowledgements: "Based on data products from observations made with ESO Telescopes at the La Silla Paranal Observatory under public survey programme ID, 177.D-3023". (1 data file).

  3. 19 CFR 142.17 - One entry summary for multiple entries.

    Science.gov (United States)

    2010-04-01

    ...; DEPARTMENT OF THE TREASURY (CONTINUED) ENTRY PROCESS Entry Summary Documentation § 142.17 One entry summary... for which entries or immediate transportation entries have been filed. However, this provision is not.... (ii) Immediate transportation entries. Immediate transportation entries may be consolidated if the...

  4. Membrane fusion during poxvirus entry.

    Science.gov (United States)

    Moss, Bernard

    2016-12-01

    Poxviruses comprise a large family of enveloped DNA viruses that infect vertebrates and invertebrates. Poxviruses, unlike most DNA viruses, replicate in the cytoplasm and encode enzymes and other proteins that enable entry, gene expression, genome replication, virion assembly and resistance to host defenses. Entry of vaccinia virus, the prototype member of the family, can occur at the plasma membrane or following endocytosis. Whereas many viruses encode one or two proteins for attachment and membrane fusion, vaccinia virus encodes four proteins for attachment and eleven more for membrane fusion and core entry. The entry-fusion proteins are conserved in all poxviruses and form a complex, known as the Entry Fusion Complex (EFC), which is embedded in the membrane of the mature virion. An additional membrane that encloses the mature virion and is discarded prior to entry is present on an extracellular form of the virus. The EFC is held together by multiple interactions that depend on nine of the eleven proteins. The entry process can be divided into attachment, hemifusion and core entry. All eleven EFC proteins are required for core entry and at least eight for hemifusion. To mediate fusion the virus particle is activated by low pH, which removes one or more fusion repressors that interact with EFC components. Additional EFC-interacting fusion repressors insert into cell membranes and prevent secondary infection. The absence of detailed structural information, except for two attachment proteins and one EFC protein, is delaying efforts to determine the fusion mechanism.

  5. Shuttle entry guidance revisited

    Science.gov (United States)

    Mease, Kenneth D.; Kremer, Jean-Paul

    1992-08-01

    The Shuttle entry guidance concept is reviewed which is aimed at tracking a reference drag trajectory that leads to the specified range and velocity for the initiation of the terminal energy management phase. An approximate method of constructing the domain of attraction is proposed, and its validity is ascertained by simulation. An alternative guidance law yielding global exponential tracking in the absence of control saturation is derived using a feedback linearization method. It is noted that the alternative guidance law does not improve on the stability and performance of the current guidance law, for the operating domain and control capability of the Shuttle. It is suggested that the new guidance law with a larger operating domain and increased lift-to-drag capability would be superior.

  6. Shuttle entry guidance revisited

    Science.gov (United States)

    Mease, Kenneth D.; Kremer, Jean-Paul

    1992-01-01

    The Shuttle entry guidance concept is reviewed which is aimed at tracking a reference drag trajectory that leads to the specified range and velocity for the initiation of the terminal energy management phase. An approximate method of constructing the domain of attraction is proposed, and its validity is ascertained by simulation. An alternative guidance law yielding global exponential tracking in the absence of control saturation is derived using a feedback linearization method. It is noted that the alternative guidance law does not improve on the stability and performance of the current guidance law, for the operating domain and control capability of the Shuttle. It is suggested that the new guidance law with a larger operating domain and increased lift-to-drag capability would be superior.

  7. Memristor Crossbar-based Hardware Implementation of IDS Method

    OpenAIRE

    Merrikh-Bayat, Farnood; Bagheri-Shouraki, Saeed; Rohani, Ali

    2010-01-01

    Ink Drop Spread (IDS) is the engine of Active Learning Method (ALM), which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system subjected to modeling. In spite of its excellent potential in solving problems such as classification and modeling compared to other soft computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of IDS method based o...

  8. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  9. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  10. Evaluation of the chromogenic agar chromID C. difficile.

    Science.gov (United States)

    Eckert, Catherine; Burghoffer, Béatrice; Lalande, Valérie; Barbut, Frederic

    2013-03-01

    Three selective media (chromID C. difficile agar, taurocholate cycloserine cefoxitin agar [TCCA; homemade], and CLO medium) were compared from 406 stool samples of patients suspected of having Clostridium difficile infection. The sensitivities of chromID C. difficile agar at 24 h and 48 h, CLO medium, and TCCA were 74.1%, 87%, 85.2%, and 70.4%, respectively.

  11. Evaluation of the Chromogenic Agar chromID C. difficile

    OpenAIRE

    2013-01-01

    Three selective media (chromID C. difficile agar, taurocholate cycloserine cefoxitin agar [TCCA; homemade], and CLO medium) were compared from 406 stool samples of patients suspected of having Clostridium difficile infection. The sensitivities of chromID C. difficile agar at 24 h and 48 h, CLO medium, and TCCA were 74.1%, 87%, 85.2%, and 70.4%, respectively.

  12. ID Model Construction and Validation: A Multiple Intelligences Case

    Science.gov (United States)

    Tracey, Monica W.; Richey, Rita C.

    2007-01-01

    This is a report of a developmental research study that aimed to construct and validate an instructional design (ID) model that incorporates the theory and practice of multiple intelligences (MI). The study consisted of three phases. In phase one, the theoretical foundations of multiple Intelligences and ID were examined to guide the development…

  13. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  14. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali;

    2014-01-01

    antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired...... cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a....

  15. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  16. Classification of artificial intelligence ids for smurf attack

    CERN Document Server

    Ugtakhbayar, N; Sodbileg, Sh

    2012-01-01

    Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network attack information using IDS, then analysing the effect. Due to the nature of IDSs which are solely signature based, every new intrusion cannot be detected; so it is important to introduce artificial intelligence (AI) methods / techniques in IDS. Introduction of AI necessitates the importance of normalization in intrusions. This work is focused on classification of AI based IDS techniques which will help better design intrusion detection systems in the future. We have also proposed a support vector machine for IDS to detect Smurf attack with much reliable accuracy.

  17. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in I

  18. Written Language Skills of Entry-Level Accountants as Assessed by Experienced CPAs.

    Science.gov (United States)

    Nelson, Sandra J.; Moncada, Susan; Smith, Douglas C.

    1996-01-01

    Surveys experienced Certified Public Accountants to examine their perceptions of the written language skills of entry-level accountants. Finds that written language fundamentals in word selection and usage, sentence and paragraph construction, and grammar and mechanics remain a problem for entry-level accountants. Notes the value of these findings…

  19. Survey on contamination status of pathogenic microorganism at entry waste raw material in ports of Guangdong%广东口岸入境废物原料病原微生物污染状况调查

    Institute of Scientific and Technical Information of China (English)

    伊怀文; 黄吉城; 李小波; 相大鹏; 张顺和; 夏文英

    2011-01-01

    Objective: To know contamination status of pathogenic microorganism on entry waste raw material at ports of Guangdong, and to analyze the hazards of microorganism in entry waste raw material to the environmental hygiene of port. Methods:Collected entry waste raw material samples and port environmental samples. The microorganisms, including Aerobic plate count, Enumeration of molds, Enumeration of coliforms,Salmonella, Shigella, E. coli O157, Vibrio cholerae, Staphylococcus aureus , Hemolytic streptococcus, Pseudomonas aeruginosa , Bacillus cereus, Vibrio parahaemolyticus , Campylobacter jejuni were counted and identified by using the national standard method and so on. Results: We test 77 batches of samples of entry waste raw material samples and identified 1 strain of Burkholderia Mallei, 15 strains of Staphylococcus aureus, 3 strains of Pseudomonas aeruginosa, 1 strain of Salmonella, 1 strain of Shigell. We test 85 batches of samples of port environmental samples and identified 6 strains of Staphylococcus aureus, 1 strain of Pseudomonas aeruginosa. Conclusion:The degree of contamination of pathogenic microorganism on entry waste raw material in ports of Guangdong is relatively high. It also jeopardize the environmental hygiene of port.%目的:了解广东口岸入境废物原料病原微生物污染状况,分析入境废物原料中病原微生物对口岸环境卫生造成的危害.方法:采集入境废物原料和口岸环境样品,按照国标等方法对样品分别进行菌落总数、霉菌总数、肠道菌群数、沙门菌、志贺菌、致泻大肠埃希菌O157、霍乱弧菌、金葡菌、溶血性链球菌、绿脓杆菌、蜡样芽胞杆菌、副溶血弧菌、空肠弯曲菌的计数与鉴定.结果:检测入境废物原料样品77批次,检出鼻疽伯克霍尔德氏菌1株、金葡菌15株、绿脓杆菌3株、沙门菌1株、志贺菌1株.检测口岸环境样品共85批,检出金黄色葡萄球菌6株、绿脓杆菌1株.结论:广东

  20. Examining Trends and Coexisting Conditions Among Children Qualifying for SSI Under ADHD, ASD, and ID.

    Science.gov (United States)

    Pulcini, Christian D; Perrin, James M; Houtrow, Amy J; Sargent, John; Shui, Amy; Kuhlthau, Karen

    2015-01-01

    To examine the prevalence trends and coexisting conditions in attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder (ASD), and intellectual disability (ID) in the pediatric Supplemental Security Income (SSI) population and general population. The Social Security Administration (SSA) provided data on primary and secondary diagnoses of children qualifying for SSI for years 2000 to 2011. We compared SSA data with 2000-2011 National Health Interview Survey data on the prevalence of mental health diagnoses among children in the general population living between 0 and 199% of the federal poverty line. We utilized linear regression analysis to test the statistical significance of differences in the trends of the conditions' prevalence. Over this time period, the SSI population experienced increases in ADHD (5.8%) and ASD (7.2%) and a decrease in ID (-10.3%). Comparison with change in the general population indicated no significant difference in ADHD but significant differences in ASD and ID. Relative percentage changes reflect similar changes. The SSI population qualifying for SSI with ADHD (70.8%) had higher rates of coexisting conditions than the general population (66.1%), but lower rates of coexisting conditions for ASD and ID. ADHD is on the rise among children receiving SSI and in the general population. This suggests that the rise of ADHD in the SSI population is expected and does not represent a misallocation of resources. Changes described among the SSI population in ASD and ID may allude to diagnostic/coding trends and/or true changes in prevalence. Limitations arise from the comparability of the 2 data sets. Copyright © 2015 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  1. Tactile Data Entry System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Building on our successful Phase I Tactile Data Entry program, Barron Associates proposes development of a Glove-Enabled Computer Operations (GECO) system to permit...

  2. Entry, Descent, Landing Animation (Animation)

    Science.gov (United States)

    2005-01-01

    [figure removed for brevity, see original site] Click on the image for Entry, Descent, Landing animation This animation illustrates the path the Stardust return capsule will follow once it enters Earth's atmosphere.

  3. Entry, Descent, Landing Animation (Animation)

    Science.gov (United States)

    2005-01-01

    [figure removed for brevity, see original site] Click on the image for Entry, Descent, Landing animation This animation illustrates the path the Stardust return capsule will follow once it enters Earth's atmosphere.

  4. Idéologie : le mot, l’idée, la chose.

    Directory of Open Access Journals (Sweden)

    Pierre Macherey

    2008-04-01

    Full Text Available L’article examine les conditions dans lesquelles le néologisme « idéologie », entre 1796, date à laquelle il a été forgé par Destutt de Tracy, et 1845, date à laquelle il a été réutilisé par Marx, est passé d’une valeur positive (en tant que science générale des idées à une valeur connotée négativement (en tant que système social de croyances décalé par rapport à la réalité qu’il évoque.« Ideology : the word, the idea, the thing ». This paper studies the transvaluation of “ideology” as a neologism. Between 1796 (when the notion of “ideology” was invented by Destutt de Tracy and 1845 (when it was reused by Marx, “ideology” changed its positive value (it refers to a general science of ideas into a negative one (because it was referred to a social system of believes, shifted from the reality it mentions.

  5. Orion Entry Handling Qualities Assessments

    Science.gov (United States)

    Bihari, B.; Tiggers, M.; Strahan, A.; Gonzalez, R.; Sullivan, K.; Stephens, J. P.; Hart, J.; Law, H., III; Bilimoria, K.; Bailey, R.

    2011-01-01

    The Orion Command Module (CM) is a capsule designed to bring crew back from the International Space Station (ISS), the moon and beyond. The atmospheric entry portion of the flight is deigned to be flown in autopilot mode for nominal situations. However, there exists the possibility for the crew to take over manual control in off-nominal situations. In these instances, the spacecraft must meet specific handling qualities criteria. To address these criteria two separate assessments of the Orion CM s entry Handling Qualities (HQ) were conducted at NASA s Johnson Space Center (JSC) using the Cooper-Harper scale (Cooper & Harper, 1969). These assessments were conducted in the summers of 2008 and 2010 using the Advanced NASA Technology Architecture for Exploration Studies (ANTARES) six degree of freedom, high fidelity Guidance, Navigation, and Control (GN&C) simulation. This paper will address the specifics of the handling qualities criteria, the vehicle configuration, the scenarios flown, the simulation background and setup, crew interfaces and displays, piloting techniques, ratings and crew comments, pre- and post-fight briefings, lessons learned and changes made to improve the overall system performance. The data collection tools, methods, data reduction and output reports will also be discussed. The objective of the 2008 entry HQ assessment was to evaluate the handling qualities of the CM during a lunar skip return. A lunar skip entry case was selected because it was considered the most demanding of all bank control scenarios. Even though skip entry is not planned to be flown manually, it was hypothesized that if a pilot could fly the harder skip entry case, then they could also fly a simpler loads managed or ballistic (constant bank rate command) entry scenario. In addition, with the evaluation set-up of multiple tasks within the entry case, handling qualities ratings collected in the evaluation could be used to assess other scenarios such as the constant bank angle

  6. Effects ok ikea's entry into a furniture production cluster

    Directory of Open Access Journals (Sweden)

    Vasco Eiriz

    2016-04-01

    Full Text Available The entry of a multinational into a cluster, a geographic agglomeration in a given place or region of predominantly small and medium enterprises specialized in a given industry or related industries, impacts the incumbent in the cluster. Aiming to identify the main effects of a multinational entry on the firms’ strategy in a cluster, it was analyzed the entry of IKEA, a Swedish multinational, into the cluster of furniture production in Paços de Ferreira and Paredes, in Portugal. In this study, the data collection technique to access primary data was a survey. The sample has small enterprises, which is similar to the structure of firms in the studied cluster. Results show that more than half the sample thinks that the entry of the multinational had not affected them. However, the firms that acknowledge a significant impact, assess that impact as negative. The competitiveness factors that have improved more significantly after IKEA’s entry were new product development and exporting strategies. The main responses of incumbent firms to the multinational entry were internationalization and the development of generic strategies of differentiation and focus based on differentiation.

  7. Currency union entries and trade

    OpenAIRE

    Nitsch, Volker

    2005-01-01

    Recent research suggests that adopting a common currency increases bilateral trade. In this paper, I explore experiences of currency union entry in the post-war period and find no effect on trade. Previous results derived from a large panel data set (covering more than 200 countries from 1948 through 1997) appear to depend crucially on the assumption of symmetry between currency union exits and entries: While countries leaving a currency union experience significant declines in trade, currenc...

  8. Biometric authentication for ID cards with hologram watermarks

    Science.gov (United States)

    Croce Ferri, Lucilla; Mayerhoefer, Astrid; Frank, Marcus; Vielhauer, Claus; Steinmetz, Ralf

    2002-04-01

    We present an analysis of a new technique for the authentication of ID cardholders, based on the integration of a biometrics-based authentication system with digital watermarks. The chosen biometric authentication method is the dynamic signature verification of the ID cardholder, while we use a specific integrity watermark technique we developed, called Hologram Watermark, to embed and retrieve the off-line data onto an ID card. We take advantage of the fact, that two static biometric features (images of the user's face and signature) are already integral part of ID cards for manual verification and extent the stored biometric information by embedding on-line handwriting features of the signature as holographic watermarks in the overall image information of an ID card. Manipulation of any of the image information can be detected and will further disallow biometric verification of the forger. The Hologram Watermark technique produces content-related data using computer-generated hologram coding techniques. These data are embedded with watermarking techniques into the personal data printed on an ID card. The content-related data in this specific application are the dynamic features of the cardholder's signature. The main goal of this paper is to analyze the suitability of dynamic signature verification in combination with the Hologram Watermark technique, to facilitate automated user authentication based on information transparently embedded in ID cards.

  9. Improved ID-Based Signature Scheme Solving Key Escrow

    Institute of Scientific and Technical Information of China (English)

    LIAO Jian; QI Ying-hao; HUANG Pei-wei; RONG Men-tian; LI Sheng-hong

    2006-01-01

    Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e. , the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman(CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.

  10. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  11. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  12. 19 CFR 191.143 - Drawback entry.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) DRAWBACK Foreign-Built Jet Aircraft Engines Processed in the United States § 191.143 Drawback entry. (a) Filing of entry. Drawback entries covering these foreign-built jet aircraft engines shall be filed on Customs Form 7551, modified to show that the entry covers jet aircraft engines processed...

  13. Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm

    CERN Document Server

    Gavalas, Damianos; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Clustering is a promising approach for building hierarchies and simplifying the routing process in mobile ad-hoc network environments. The main objective of clustering is to identify suitable node representatives, i.e. cluster heads (CHs), to store routing and topology information and maximize clusters stability. Traditional clustering algorithms suggest CH election exclusively based on node IDs or location information and involve frequent broadcasting of control packets, even when network topology remains unchanged. More recent works take into account additional metrics (such as energy and mobility) and optimize initial clustering. However, in many situations (e.g. in relatively static topologies) re-clustering procedure is hardly ever invoked; hence initially elected CHs soon reach battery exhaustion. Herein, we introduce an efficient distributed clustering algorithm that uses both mobility and energy metrics to provide stable cluster formations. CHs are initially elected based on the time and cost-efficien...

  14. Role of yeast domination in Indian idli batter fermentation.

    Science.gov (United States)

    Soni, S K; Sandhu, D K

    1991-07-01

    Adding Saccharomyces cerevisiae, along with natural bacterial flora of the ingredients, was the best method for standardizing idli termentation in terms of improved organoleptic characteristics, leavening and nutritional constituents.

  15. Defining the safe current limit for opening ID photon shutter

    Energy Technology Data Exchange (ETDEWEB)

    Seletskiy, S. [Brookhaven National Lab. (BNL), Upton, NY (United States). Photon Sciences Dept.

    2015-12-14

    The NSLS-II storage ring is protected from possible damage from insertion devices (IDs) synchrotron radiation by a dedicated active interlock system (AIS). It monitors electron beam position and angle and triggers beam drop if beam orbit exceeds the boundaries of pre-calculated active interlock envelope (AIE). The beamlines (BL) and beamline frontends (FE) are designed under assumption that the electron beam is interlocked within the AIE. For historic reasons the AIS engages the ID active interlock (AI-ID) at any non-zero beam current whenever the ID photon shutter (IDPS) is getting opened. Such arrangement creates major inconveniences for BLs commissioning. Apparently there is some IDPS safe current limit (SCL) under which the IDPS can be opened without interlocking the e-beam. The goal of this paper is to find such limit.

  16. Scientists ID Key Fetal Cells Vulnerable to Zika

    Science.gov (United States)

    ... html Scientists ID Key Fetal Cells Vulnerable to Zika Lab study suggests possible mechanism for birth defects ... 29, 2016 (HealthDay News) -- The devastating mosquito-borne Zika virus can infect cells that play a role ...

  17. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  18. Genetics Experts Unite to I.D. Unknown Katrina Victims

    Science.gov (United States)

    ... Current Issue Past Issues Research News From NIH Genetics Experts Unite to I.D. Unknown Katrina Victims ... in the recent Advances in molecular biology and genetics," says team member Stephen Sherry, Ph.D., of ...

  19. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  20. idSpace: Supporting Designers to develop Innovative Products

    NARCIS (Netherlands)

    Sloep, Peter; Bitter-Rijpkema, Marlies; Retalis, Symeon; Georgiakakis, Petros; Dolog, Peter

    2009-01-01

    Sloep, P., Bitter-Rijpkema, M., Retalis, S., Georgiakakis, P., & Dolog, P. (2008). idSpace: Supporting Designers to develop Innovative Products. Presentation at Online Educa. December, 3, 2008. Berlin, Germany.

  1. Security analysis for biometric data in ID documents

    Science.gov (United States)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  2. Study IDs 2 Zika Virus Proteins Linked to Microcephaly

    Science.gov (United States)

    ... gov/news/fullstory_160386.html Study IDs 2 Zika Virus Proteins Linked to Microcephaly Discovery might one day ... say they've identified two proteins in the Zika virus linked to the severe birth defect microcephaly. Babies ...

  3. Narva Aleksandri kirikusse paigaldatakse vitraažid / Irina Tokareva

    Index Scriptorium Estoniae

    Tokareva, Irina

    2004-01-01

    1919.a. hävinud vitraažid asendatakse Dolores Hoffmanni originaalsete piiblipersoone kujutavate vitraažidega. Kasutatakse uudset tehnoloogiat. vitraaže on kiriku kaheksa akna jaoks. Villu Jürjo kommentaarid

  4. RadNet Air Data From Idaho Falls, ID

    Science.gov (United States)

    This page presents radiation air monitoring and air filter analysis data for Idaho Falls, ID from EPA's RadNet system. RadNet is a nationwide network of monitoring stations that measure radiation in air, drinking water and precipitation.

  5. 19 CFR 142.16 - Entry summary documentation.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry summary documentation. 142.16 Section 142.16... TREASURY (CONTINUED) ENTRY PROCESS Entry Summary Documentation § 142.16 Entry summary documentation. (a) Entry summary not filed at time of entry. When the entry documentation is filed before the entry...

  6. Biometrics and ID Cards — Enablers for Personal Security

    Science.gov (United States)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  7. Autonomous gliding entry guidance with

    Directory of Open Access Journals (Sweden)

    Guo Jie

    2015-10-01

    Full Text Available This paper presents a novel three-dimensional autonomous entry guidance for relatively high lift-to-drag ratio vehicles satisfying geographic constraints and other path constraints. The guidance is composed of onboard trajectory planning and robust trajectory tracking. For trajectory planning, a longitudinal sub-planner is introduced to generate a feasible drag-versus-energy profile by using the interpolation between upper boundary and lower boundary of entry corridor to get the desired trajectory length. The associated magnitude of the bank angle can be specified by drag profile, while the sign of bank angle is determined by lateral sub-planner. Two-reverse mode is utilized to satisfy waypoint constraints and dynamic heading error corridor is utilized to satisfy no-fly zone constraints. The longitudinal and lateral sub-planners are iteratively employed until all of the path constraints are satisfied. For trajectory tracking, a novel tracking law based on the active disturbance rejection control is introduced. Finally, adaptability tests and Monte Carlo simulations of the entry guidance approach are performed. Results show that the proposed entry guidance approach can adapt to different entry missions and is able to make the vehicle reach the prescribed target point precisely in spite of geographic constraints.

  8. Reconstruction of the Genesis Entry

    Science.gov (United States)

    Desai, Prasun N.; Qualls, Garry D.; Schoenenberger, Mark

    2007-01-01

    An overview of the reconstruction analyses performed for the Genesis capsule entry is described. The results indicate that the actual entry prior to the drogue deployment failure was very close to the pre-entry predictions. The capsule landed 8.3 km south of the desired target at Utah Test and Training Range. Analysis on infrared video footage (obtained from the tracking stations) during the descent estimated the onset of the capsule tumble at Mach 0.9. Frequency analysis on the infrared video data indicates that the aerodynamics generated for the Genesis capsule reasonably predicted the drag and static stability. Observations of the heatshield support the pre-entry simulation estimates of a small hypersonic angles-of-attack, since there is very little, if any, charring of the shoulder region or the aftbody. Through this investigation, an overall assertion can be made that all the data gathered from the Genesis entry is consistent with flight performance that was close to the nominal preentry prediction. Consequently, the design principles and methodologies utilized for the flight dynamics, aerodynamics, and aerothermodynamics analyses have been corroborated.

  9. Accelerated fermentation of 'idli' batter using soy residue okara.

    Science.gov (United States)

    Rekha, C R; Vijayalakshmi, G

    2011-06-01

    The aim of this work was to reduce the natural fermentation period of 'idli' from the conventional 14 h to 10 h by adding underutilized okara for the preparation of 'idli'. Black gram was partially substituted with soy residue okara in the ratio of (1:1). After 14 h of natural fermentation, the pH and total acidity of control 'idli' batter was 4.51 and 0.64% and that of okara fortified 'idli' batter was 4.53 and 0.43%, respectively. The amount of CO2 released by the control and okara fortified batter was 19.7% and 33.6% respectively. The viable count of yeast and mold, lactics and mesophilic bacteria in control & okara batter increased with time reaching 9.00 & 10.34, 8.66 & 7.69, and 8.65 & 9.47 log10 cfu/g, respectively at the end of 10 h of natural fermentation. Okara fortified 'idli' was soft and spongy compared to control 'idli' .

  10. BioID Identification of Lamin-Associated Proteins.

    Science.gov (United States)

    Mehus, Aaron A; Anderson, Ruthellen H; Roux, Kyle J

    2016-01-01

    A- and B-type lamins support the nuclear envelope, contribute to heterochromatin organization, and regulate a myriad of nuclear processes. The mechanisms by which lamins function in different cell types and the mechanisms by which lamin mutations cause over a dozen human diseases (laminopathies) remain unclear. The identification of proteins associated with lamins is likely to provide fundamental insight into these mechanisms. BioID (proximity-dependent biotin identification) is a unique and powerful method for identifying protein-protein and proximity-based interactions in living cells. BioID utilizes a mutant biotin ligase from bacteria that is fused to a protein of interest (bait). When expressed in living cells and stimulated with excess biotin, this BioID-fusion protein promiscuously biotinylates directly interacting and vicinal endogenous proteins. Following biotin-affinity capture, the biotinylated proteins can be identified using mass spectrometry. BioID thus enables screening for physiologically relevant protein associations that occur over time in living cells. BioID is applicable to insoluble proteins such as lamins that are often refractory to study by other methods and can identify weak and/or transient interactions. We discuss the use of BioID to elucidate novel lamin-interacting proteins and its applications in a broad range of biological systems, and provide detailed protocols to guide new applications.

  11. Membongkar Akuntansi Double Entry Systems

    Directory of Open Access Journals (Sweden)

    Whedy Prasetyo

    2013-08-01

    Full Text Available Double entry isa process of recording transactions that always involve at least two accounts ofwhich changes (increases or decreases have consequences to maintain a balance equation. This is a simple basic accounting, that the use of the funds must alwaysbe equal to the acquisition of funds. The equation is not able to include some business events that are responses to the development of business environment. A proposed view is based on the interaction of researcher (New Bond with accountant (Mrs M to dismantle the double entry accounting through Maurice Merleau Ponty's approach (1906-1961. The results prove that physical aspects of knowledge willcontinue to evolve according to environmental interactions.

  12. Multimodal biometrics for identity documents (MBioID).

    Science.gov (United States)

    Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej

    2007-04-11

    The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.

  13. Re-entry flight clearance

    NARCIS (Netherlands)

    Juliana, S.

    2006-01-01

    The objective of the research was to identify and evaluate promising mathematical techniques for re-entry flight clearance. To fulfil this objective, two mathematical methods were investigated and developed: μ analysis for linear models and interval analysis for both linear and non-linear model

  14. Components of Visual Prior Entry

    Science.gov (United States)

    Schneider, Keith A.; Bavelier, Daphne

    2003-01-01

    The prior entry hypothesis contends that attention accelerates sensory processing, shortening the time to perception. Typical observations supporting the hypothesis may be explained equally well by response biases, changes in decision criteria, or sensory facilitation. In a series of experiments conducted to discriminate among the potential…

  15. Entry Facilitation by Environmental Groups

    NARCIS (Netherlands)

    van der Made, Allard; Schoonbeek, Lambert

    We consider a model of vertical product differentiation where consumers care about the environmental damage their consumption causes. An environmental group is capable of increasing consumers' environmental concern via a costly campaign. We show that the prospect of such a campaign can induce entry

  16. Entry Facilitation by Environmental Groups

    NARCIS (Netherlands)

    van der Made, Allard; Schoonbeek, Lambert

    2009-01-01

    We consider a model of vertical product differentiation where consumers care about the environmental damage their consumption causes. An environmental group is capable of increasing consumers' environmental concern via a costly campaign. We show that the prospect of such a campaign can induce entry

  17. The Self- and Other-Deception Questionnaires-Intellectual Disabilities (SDQ-ID and ODQ-ID): component analysis and reliability.

    Science.gov (United States)

    Jobson, Laura; Stanbury, Alexandra; Langdon, Peter E

    2013-10-01

    The objectives of this research were to: (1) investigate the component structure and psychometric properties of the Self- and Other-Deception Questionnaires-Intellectual Disabilities (SDQ-ID and ODQ-ID), (2) examine the relationship between social desirability and IQ, and (3) compare social desirability scores of those with intellectual disabilities (IDs) and a history of criminal offending to the social desirability scores of participants with IDs and those without IDs and no such history, controlling for general intellectual functioning. Men with mild to borderline IDs detained within medium secure inpatient forensic mental health services (N=40) completed the SDQ-ID and ODQ-ID at Time 1 and then two-weeks later at Time 2. Data for the men with and without IDs and no known criminal offending history were taken from a previous study (N=60). Following exploratory Principal Components Analysis, the number of questionnaire items were reduced, and a two-factor structure was found for the SDQ-ID which was labelled: (1) Positive Self Representation and (2) Denial of Intrusive Thoughts. A two-factor structure was also found for the ODQ-ID and these two factors were labelled: (1) Denial of Negative Social Interaction and (2) Untrustworthiness. Both the SDQ-ID and ODQ-ID had acceptable internal consistency and test-retest reliability. Fifteen percent of the variance in SDQ-ID scores was explained by Full Scale IQ, while 21% of the variance in ODQ-ID scores was explained by Full Scale IQ. Between group comparisons controlling for intelligence did not yield any significant differences. The shortened SDQ-ID and ODQ-ID have promising psychometric properties, and their component structures appear robust. Differences between men with and without IDs on these two measures of social desirability can be accounted for by differences in general intellectual functioning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Novel ID-based anti-collision approach for RFID

    Science.gov (United States)

    Zhang, De-Gan; Li, Wen-Bin

    2016-09-01

    Novel correlation ID-based (CID) anti-collision approach for RFID under the banner of the Internet of Things (IOT) has been presented in this paper. The key insights are as follows: according to the deterministic algorithms which are based on the binary search tree, we propose a method to increase the association between tags so that tags can initiatively send their own ID under certain trigger conditions, at the same time, we present a multi-tree search method for querying. When the number of tags is small, by replacing the actual ID with the temporary ID, it can greatly reduce the number of times that the reader reads and writes to tag's ID. Active tags send data to the reader by the way of modulation binary pulses. When applying this method to the uncertain ALOHA algorithms, the reader can determine the locations of the empty slots according to the position of the binary pulse, so it can avoid the decrease in efficiency which is caused by reading empty slots when reading slots. Theory and experiment show that this method can greatly improve the recognition efficiency of the system when applied to either the search tree or the ALOHA anti-collision algorithms.

  19. 19 CFR 142.3a - Entry numbers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry numbers. 142.3a Section 142.3a Customs... (CONTINUED) ENTRY PROCESS Entry Documentation § 142.3a Entry numbers. (a) Placement on CBP forms. The importer or broker shall place an 11 character entry number on the entry and corresponding entry...

  20. Increasing Effectiveness of IDS to Improve Security in Intranet

    Directory of Open Access Journals (Sweden)

    Umesh K. Singh

    2005-01-01

    Full Text Available Today Intrusion Detection Systems (IDS are becoming one of the most important tools for intranet security. Research regarding Intrusion Detection Systems (IDSs has become more active with the recent increases in illegal accesses to computer systems. Many researchers focus only on the techniques or mechanisms for detecting intrusions automatically, without considering the security of IDSs themselves. When an intruder attacks and breaks into a system, he or she often deletes system logs and stops auditing processes. Thus, the security of an intrusion detection system is an important aspect of intrusion detection. This study explores the methods for increasing effectiveness in configurations of an IDS for obtaining maximum effects in security in an intranet. We also discuss the hurdles that have blocked successful measurements in this area and present suggestions for improving effectiveness of an IDS.

  1. A Dynamic ID-based Remote User Authentication Scheme

    CERN Document Server

    Das, Manik Lal; Gulati, Ved P

    2004-01-01

    Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.

  2. Effect of ingredients on sensory profile of idli.

    Science.gov (United States)

    Durgadevi, Manoharan; Shetty, Prathapkumar H

    2014-09-01

    Idli is a traditional fermented food and is consumed in India and Srilanka. The objective of the present study is to select the ingredients for optimum desirable product characteristics and to identify the optimum ratios of ingredients and fermentation time with respect to sensory attributes using Response Surface Methodology (RSM). The sensory attributes included were color, appearance, texture, taste and overall quality. Preliminary trials were conducted using five variants of rice and common black gram dhal before framing a model using Central Composite Rotatable Design (CCRD). From the study it was found that a desirable score of 0.7439 was obtained for sensory attributes of idli made with the ratio of 3: 1.475 for IR20 idli rice and ADT3 variety black gram (with husk removed after soaking) fermented for 10.2 h. Principal Component Analysis (PCA) helped to discriminate the samples and attributes within the data matrix, depending upon their inter relationships.

  3. Test and calibration of the IDS fast-timing electronics

    CERN Document Server

    AUTHOR|(CDS)2160817

    2016-01-01

    The ISOLDE decay station(IDS) is one of the permanent experimental setups at the ISOLDE facility of CERN. IDS is used to study decay properties of radioactive nuclei. Thus, fast-timing electronics are necessary for extracting nuclear half-lives. The aims of this work are testing and optimization of the IDS fast-timing electronics as well as measuring a nuclear level half-life in the decay of $^{152}$Eu. The energy resolution of LaBr$_3$ $\\gamma$-detectors was characterized and optimized. A nuclear level lifetime of $^{152}$Eu was measured after obtaining the best parameters for energy resolution and time walk. Dedicated sorting scripts were developed in ROOT in order of perform the characterization and optimization automatically.

  4. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    The focus of this article is to explain why there is still no qualified digital signature in Denmark as defined by the EU eSignatures Directive nor any other nationwide eID even though Denmark had an early start in eGovernment, and a high level of "e-readiness" compared to other nations. Laying out...... of intergovernmental coordination and lack of cooperation between public and private sector. However, with the recent tender on digital signatures won by the PBS and the roll-out of the NemID it seems that Denmark will finally - after twenty years of delay - have an eID which can be widely used in the public as well...

  5. Generating Decision Trees Method Based on Improved ID3 Algorithm

    Institute of Scientific and Technical Information of China (English)

    Yang Ming; Guo Shuxu1; Wang Jun3

    2011-01-01

    The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.

  6. Memristor Crossbar-based Hardware Implementation of IDS Method

    CERN Document Server

    Merrikh-Bayat, Farnood; Rohani, Ali

    2010-01-01

    Ink Drop Spread (IDS) is the engine of Active Learning Method (ALM), which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system subjected to modeling. In spite of its excellent potential in solving problems such as classification and modeling compared to other soft computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of IDS method based on the memristor crossbar structure. In addition of simplicity, being completely real-time, having low latency and the ability to continue working after the occurrence of power breakdown are some of the advantages of our proposed circuit.

  7. A Simple Quantum Integro-Differential Solver (SQuIDS)

    CERN Document Server

    Delgado, Carlos Alberto Arguelles; Weaver, Christopher N

    2014-01-01

    Simple Quantum Integro-Differential Solver (SQuIDS) is a C++ code designed to solve semi-analytically the evolution of a set of density matrices and scalar functions. This is done efficiently by expressing all operators in an SU(N) basis. SQuIDS provides a base class from which users can derive new classes to include new non-trivial terms from the right hand sides of density matrix equations. The code was designed in the context of solving neutrino oscillation problems, but can be applied to any problem that involves solving the quantum evolution of a collection of particles with Hilbert space of dimension up to six.

  8. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  9. Flavivirus Entry Receptors: An Update

    Directory of Open Access Journals (Sweden)

    Manuel Perera-Lecoin

    2013-12-01

    Full Text Available Flaviviruses enter host cells by endocytosis initiated when the virus particles interact with cell surface receptors. The current model suggests that flaviviruses use at least two different sets of molecules for infectious entry: attachment factors that concentrate and/or recruit viruses on the cell surface and primary receptor(s that bind to virions and direct them to the endocytic pathway. Here, we present the currently available knowledge regarding the flavivirus receptors described so far with specific attention to C-type lectin receptors and the phosphatidylserine receptors, T-cell immunoglobulin and mucin domain (TIM and TYRO3, AXL and MER (TAM. Their role in flavivirus attachment and entry as well as their implication in the virus biology will be discussed in depth.

  10. 19 CFR 122.42 - Aircraft entry.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Aircraft entry. 122.42 Section 122.42 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Aircraft Entry and Entry Documents; Electronic Manifest Requirements...

  11. Sunk costs, entry deterrence, and financial constraints

    NARCIS (Netherlands)

    Arping, S.; Diaw, K.M.

    2008-01-01

    This paper studies how sunk costs affect a financially constrained incumbent's ability to deter entry into its market. Sunk costs make it less attractive to the incumbent to accommodate entry by liquidating assets in place and exiting the market. This may render entry by a prospective rival

  12. Sport entries and qualification manual: Nanjing 2014

    OpenAIRE

    2014-01-01

    Sport entries constitute an important part of the delegation registration process of the Nanjing 2014 Summer Youth Olympic Games. This manual aims to introduce to NOCs the process, relevant policies and requirements regarding sport entries so as to ensure that NOCs can successfully complete the entries for their athletes to the Nanjing 2014 Youth Olympic Games.

  13. 19 CFR 143.36 - Form of immediate delivery, entry and entry summary.

    Science.gov (United States)

    2010-04-01

    ... Form of immediate delivery, entry and entry summary. (a) Electronic form of data. If Customs determines... 19 Customs Duties 2 2010-04-01 2010-04-01 false Form of immediate delivery, entry and entry summary. 143.36 Section 143.36 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF...

  14. A Survey of Postsecondary Education Programs for Students with Intellectual Disabilities in the United States

    Science.gov (United States)

    Grigal, Meg; Hart, Debra; Weir, Cate

    2012-01-01

    The authors present findings from a 2009 survey of postsecondary education (PSE) programs for students with an intellectual disability (ID) conducted in the United States. The survey was designed to collect descriptive information on characteristics and practices of existing PSE programs for students with an ID. The survey consisted of 63 items…

  15. Imagery Measures of Ego, Id, Superego, and Identity: Validity Studies.

    Science.gov (United States)

    Cartwright, D.; DeBruin, J.

    1988-01-01

    Five validity studies of the id, ego, superego, and identity scales of the Study of Imagery are reported, using undergraduate students. Multistage Bonferroni procedures are used to evaluate the significance of results. The scales are related to each other and to toughmindedness, self-control, and behavioral conflict. (TJH)

  16. 59 FR- Realty Action; Ada and Owyhee, ID

    Science.gov (United States)

    1994-05-03

    ...-332A-02; IDI-29516] Realty Action; Ada and Owyhee, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Realty Action--IDI-29516; Exchange of public and private lands in Ada and Owyhee.... Containing 640 acres, more or less, in Owyhee County. The purpose of this exchange is to dispose of...

  17. Chronic arsenic intoxication diagnostic score (CAsIDS).

    Science.gov (United States)

    Dani, Sergio Ulhoa; Walter, Gerhard Franz

    2017-08-31

    Arsenic and its compounds are well-established, potent, environmentally widespread and persistent toxicants with metabolic, genotoxic, mutagenic, teratogenic, epigenetic and carcinogenic effects. Arsenic occurs naturally in the Earth's crust, but anthropogenic arsenic emissions have surmounted the emissions from important natural sources such as volcanism. Inorganic arsenicals exhibit acute and chronic toxicities in virtually all cell types and tissues, and hence arsenic intoxication affects multiple systems. Whereas acute arsenic intoxication is rare and relatively easy to diagnose, chronic arsenic intoxication (CAsI) is common but goes often misdiagnosed. Based on a review of the literature as well as our own clinical experience, we propose a chronic arsenic intoxication diagnostic score (CAsIDS). A distinctive feature of CAsIDS is the use of bone arsenic load as an essential criterion for the individual risk assessment of chronic arsenic intoxication, combined with a systemic clinical assessment. We present clinical examples where CAsIDS is applied for the diagnosis of CAsI, review the main topics of the toxicity of arsenic in different cell and organ systems and discuss the therapy and prevention of disease caused or aggravated by chronic arsenic intoxication. CAsIDS can help physicians establish the diagnosis of CAsI and associated conditions. Copyright © 2017 John Wiley & Sons, Ltd.

  18. 76 FR 33651 - Approval and Promulgation of Implementation Plans; ID

    Science.gov (United States)

    2011-06-09

    ... AGENCY 40 CFR Part 52 Approval and Promulgation of Implementation Plans; ID AGENCY: Environmental... Implementation Plan (SIP) that were submitted to EPA by the State of Idaho on April 16, 2007. This SIP submittal... through 668. Sec. 52.670 Identification of plan. * * * * * (c) * * * EPA-Approved Idaho Regulations State...

  19. Evolution of the ID Process at Sprint: A Practitioner's Perspective.

    Science.gov (United States)

    Beard, Michael W.

    1999-01-01

    Provides instructional developers' (ID) insights and observations based on the experiences of a training and development organization, Sprint's University of Excellence (UE), as it evolved from a small group of 20-25 individuals in 1990 to a large business unit comprising almost 400 individuals in 1999. Discussion includes course development…

  20. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  1. LED-ID System: Coverage And Fast Link Recovery Technique

    Directory of Open Access Journals (Sweden)

    Muhammad Shahin Uddin

    2012-11-01

    Full Text Available Recently Light Emitting Diodes (LEDs are considered to represent the next generation of lighting and communication technology. LED-ID (Light Emitting Diode – Identification is one of the key technologies for identification, data transmission and illumination simultaneously. This is the new paradigm in theidentification technology environment. LED-ID system typically needs line of sight (LOS to support narrow FOV transceivers links to achieve high data rate but reduced the coverage, increase the disconnection rate of the link. Also when the receiver moves horizontally or vertically, in that case coverage also varied and LOS relies upon direct link between transmitter and receiver. Link recovery is a new challenge for reliable LED-ID system. Fast link recovery techniques are essential for the making the system robust. In this paper we discuss about the horizontal and vertical coverage variation in terms of received power and fast link recovery technique for the LED-ID system considering both LOS and NLOS reflection.

  2. Sequence ID and annotation information - Gclust Server | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us Gclust Server Sequence ID and annotation information Data detail Data name Sequence ID and ann...e specifying the ID, length and annotation information of the amino acid sequences of the predicted proteins...f amino acid sequence (Sequence ID) Field 2 Length of amino acid sequence Field 3 Ann...of This Database Site Policy | Contact Us Sequence ID and annotation information - Gclust Server | LSDB Archive ...

  3. Coupling approaches used in atmospheric entry models

    Science.gov (United States)

    Gritsevich, M. I.

    2012-09-01

    While a planet orbits the Sun, it is subject to impact by smaller objects, ranging from tiny dust particles and space debris to much larger asteroids and comets. Such collisions have taken place frequently over geological time and played an important role in the evolution of planets and the development of life on the Earth. Though the search for near-Earth objects addresses one of the main points of the Asteroid and Comet Hazard, one should not underestimate the useful information to be gleaned from smaller atmospheric encounters, known as meteors or fireballs. Not only do these events help determine the linkages between meteorites and their parent bodies; due to their relative regularity they provide a good statistical basis for analysis. For successful cases with found meteorites, the detailed atmospheric path record is an excellent tool to test and improve existing entry models assuring the robustness of their implementation. There are many more important scientific questions meteoroids help us to answer, among them: Where do these objects come from, what are their origins, physical properties and chemical composition? What are the shapes and bulk densities of the space objects which fully ablate in an atmosphere and do not reach the planetary surface? Which values are directly measured and which are initially assumed as input to various models? How to couple both fragmentation and ablation effects in the model, taking real size distribution of fragments into account? How to specify and speed up the recovery of a recently fallen meteorites, not letting weathering to affect samples too much? How big is the pre-atmospheric projectile to terminal body ratio in terms of their mass/volume? Which exact parameters beside initial mass define this ratio? More generally, how entering object affects Earth's atmosphere and (if applicable) Earth's surface? How to predict these impact consequences based on atmospheric trajectory data? How to describe atmospheric entry

  4. Entry Level Systems Analysts: What Does the Industry Want?

    Directory of Open Access Journals (Sweden)

    Donna M. Grant

    2016-06-01

    Full Text Available This study investigates the skill sets necessary for entry level systems analysts. Towards this end, the study combines two sources of data, namely, a content analysis of 200 systems analysts’ online job advertisements and a survey of 20 senior Information Systems (IS professionals. Based on Chi-square tests, the results reveal that most employers prefer entry level systems analysts with an undergraduate Computer Science degree. Furthermore, most of the employers prefer entry level systems analysts to have some years of experience as well as industry certifications. The results also reveal that there is a higher preference for entry level systems analysts who have non-technical and people skills (e.g., problem solving and oral communication. The empirical results from this study will inform IS educators as they develop future systems analysts. Additionally, the results will be useful to the aspiring systems analysts who need to make sure that they have the necessary job skills before graduating and entering the labor market.

  5. Atmospheric Entry Experiments at IRS

    Science.gov (United States)

    Auweter-Kurtz, M.; Endlich, P.; Herdrich, G.; Kurtz, H.; Laux, T.; Löhle, S.; Nazina, N.; Pidan, S.

    2002-01-01

    Entering the atmosphere of celestial bodies, spacecrafts encounter gases at velocities of several km/s, thereby being subjected to great heat loads. The thermal protection systems and the environment (plasma) have to be investigated by means of computational and ground facility based simulations. For more than a decade, plasma wind tunnels at IRS have been used for the investigation of TPS materials. Nevertheless, ground tests and computer simulations cannot re- place space flights completely. Particularly, entry mission phases encounter challenging problems, such as hypersonic aerothermodynamics. Concerning the TPS, radiation-cooled materials used for reuseable spacecrafts and ablator tech- nologies are of importance. Besides the mentioned technologies, there is the goal to manage guidance navigation, con- trol, landing technology and inflatable technologies such as ballutes that aim to keep vehicles in the atmosphere without landing. The requirement to save mass and energy for planned interplanetary missions such as Mars Society Balloon Mission, Mars Sample Return Mission, Mars Express or Venus Sample Return mission led to the need for manoeuvres like aerocapture, aero-breaking and hyperbolic entries. All three are characterized by very high kinetic vehicle energies to be dissipated by the manoeuvre. In this field flight data are rare. The importance of these manoeuvres and the need to increase the knowledge of required TPS designs and behavior during such mission phases point out the need of flight experiments. As result of the experience within the plasma diagnostic tool development and the plasma wind tunnel data base, flight experiments like the PYrometric RE-entry EXperiment PYREX were developed, fully qualified and successfully flown. Flight experiments such as the entry spectrometer RESPECT and PYREX on HOPE-X are in the conceptual phase. To increase knowledge in the scope of atmospheric manoeuvres and entries, data bases have to be created combining both

  6. Subgroups associated with lower physical fitness in older adults with ID : Results of the HA-ID study

    NARCIS (Netherlands)

    Hilgenkamp, Thessa I. M.; van Wijck, Ruud; Evenhuis, Heleen M.

    2014-01-01

    Although physical fitness is generally very low in older adults with intellectual disabilities (ID), levels may differ across subgroups. It is important to identify which subgroups need to be targeted specifically in physical activity and fitness interventions and reference values. Physical fitness

  7. Differential regulation of granulopoiesis by the basic helix-loop-helix transcriptional inhibitors Id1 and Id2

    NARCIS (Netherlands)

    Buitenhuis, M; van Deutekom, HWM; Verhagen, LP; Castor, A; Jacobsen, SEW; Lammers, JWJ; Koenderman, L; Coffer, PJ

    2005-01-01

    Inhibitor of DNA binding (Id) proteins function as inhibitors of members of the basic helix-loop-helix family of transcription factors and have been demonstrated to play an important role in regulating lymphopoiesis. However, the role of these proteins in regulation of myelopoiesis is currently

  8. Matrix Completion from Noisy Entries

    CERN Document Server

    Keshavan, Raghunandan H; Oh, Sewoong

    2009-01-01

    Given a matrix M of low-rank, we consider the problem of reconstructing it from noisy observations of a small, random subset of its entries. The problem arises in a variety of applications, from collaborative filtering (the `Netflix problem') to structure-from-motion and positioning. We study a low complexity algorithm introduced by Keshavan et al.(2009), based on a combination of spectral techniques and manifold optimization, that we call here OptSpace. We prove performance guarantees that are order-optimal in a number of circumstances.

  9. ID-Based Fair Off-Line Electronic Cash System with Multiple Banks

    Institute of Scientific and Technical Information of China (English)

    Chang-Ji Wang; Yong Tang; Qing Li

    2007-01-01

    ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptog-raphy (CA-PKC), and has drawn researchers’ extensive attention in recent years. However, the existing electronic cash schemes are constructed under CA-PKC, and there seems no electronic cash scheme under ID-PKC up to now to the best of our knowledge. It is important to study how to construct electronic cash schemes based on ID-PKC from views on both practical perspective and pure research issue. In this paper, we present a simpler and provably secure ID-based restrictive partially blind signature (RPBS), and then propose an ID-based fair off-line electronic cash (ID-FOLC) scheme with multiple banks based on the proposed ID-based RPBS. The proposed ID-FOLC scheme with multiple banks is more efficient than existing electronic cash schemes with multiple banks based on group blind signature.

  10. Entitlement Management: Ready to Enter the IdM Mainstream

    Science.gov (United States)

    Gebel, Gerry; Wang, Alice

    Externalizing authorization processing from business applications has been a goal for architects and developers for many years. Recent compliance demands for more granular access control and policy transparency have increased the urgency to adopt an architectural model where authorization and entitlement management are consumed as a service rather than embedded within business applications. Major software vendors, such as Microsoft, Oracle, and SAP, are making significant steps to separate IdM functionality, including entitlement management from application logic. The market has also responded with a plethora of products that provide entitlement management and authorization functionality for commercial or custom-built application environments. Finally, the Extensible Access Control Markup Language (XACML) has emerged as the consensus authorization standard being supported by a growing number of IT and application vendors. Collectively, these forces form the basis of a nascent IdM market segment referred to as entitlement management.

  11. La I+D en las pymes: Intensidad y estrategia

    Directory of Open Access Journals (Sweden)

    Anna Arbussà

    2004-01-01

    Full Text Available ¿Es importante la innovación en las pequeñas y medianas empresas? ¿De qué dependen sus estrategias de inversión en I+D? En este artículo respondemos a estas preguntas basándonos en nuevos datos obtenidos sobre una muestra de pymes catalanas. Explicamos cómo varía la intensidad de la I+D según sean la demanda, la oportunidad tecnológica y las condiciones de apropiabilidad en el sector industrial donde se halle la empresa; y presentamos las estrategias de desarrollo interno y adquisición externa de tecnología seguidas por las empresas más competitivas.

  12. De l'idée au businessplan

    OpenAIRE

    Frey, Urs

    2012-01-01

    La création est l'une des nombreuses voies pour arriver à sa propre entreprise. Si vous choisissez cette voie, il est déterminant, pour le succès ultérieur de votre jeune entreprise, que la planification et la mise en oeuvre soient optimales. Le businessplan a pour but de détailler pas à pas l'idée d'entreprise, d'opposer les opportunités aux risques et d'élaborer des budgets. Nous vous indiquons les obstacles que vous pouvez rencontrer sur ce chemin, de l'idée à la création d'une entreprise ...

  13. A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME

    Institute of Scientific and Technical Information of China (English)

    Ming Yang; Wang Yumin

    2008-01-01

    In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment, etc. Recently, Zheng, et al. presented an IDentity (ID)-based proxy blind signature. In this paper, a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed, which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng, et al.'s scheme. The proposed scheme is more practical in the real world.

  14. Tailoring a corporate compliance program for an IDS.

    Science.gov (United States)

    Berkey, M F

    1999-01-01

    Integrated delivery systems (IDSs) face a particular challenge in implementing a corporate compliance program--that of ensuring the program addresses issues of compliance with payment rules and regulations consistently across every component of the health system. To successfully implement an effective compliance program, the various components of the IDS first must understand what such a program is intended to accomplish, and any internal resistance to developing the program must be overcome. The IDS then can undertake identifying and assessing areas of the health system at risk of being in noncompliance, designing and implementing the program, auditing claims processing and cost reporting throughout the health system to ensure systemwide compliance, and maintaining the program through ongoing monitoring and training.

  15. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  16. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  17. FastID: Extremely Fast Forensic DNA Comparisons

    Science.gov (United States)

    2017-05-19

    FastID: Extremely Fast Forensic DNA Comparisons Darrell O. Ricke, PhD Bioengineering Systems & Technologies Massachusetts Institute of...Technology Lincoln Laboratory Lexington, MA USA Darrell.Ricke@ll.mit.edu Abstract—Rapid analysis of DNA forensic samples can have a critical impact on...time sensitive investigations. Analysis of forensic DNA samples by massively parallel sequencing is creating the next gold standard for DNA

  18. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  19. El sistema español de I+D

    Directory of Open Access Journals (Sweden)

    López Facal, Javier

    1997-06-01

    Full Text Available Not available.Para centrar el lugar que ocupan las Bibliotecas y Centros de documentación en el Sistema de I+D, se resume la evolución de la política científica española desde los años cincuenta y se describe la estructura actual de este sistema, sus magnitudes principales y sus deficiencias.

  20. Can technology help to reduce underage drinking? Evidence from the false ID laws with scanner provision.

    Science.gov (United States)

    Yörük, Barış K

    2014-07-01

    Underage drinkers often use false identification to purchase alcohol or gain access into bars. In recent years, several states have introduced laws that provide incentives to retailers and bar owners who use electronic scanners to ensure that the customer is 21 years or older and uses a valid identification to purchase alcohol. This paper is the first to investigate the effects of these laws using confidential data from the National Longitudinal Survey of Youth, 1997 Cohort (NLSY97). Using a difference-in-differences methodology, I find that the false ID laws with scanner provision significantly reduce underage drinking, including up to a 0.22 drink decrease in the average number of drinks consumed by underage youth per day. This effect is observed particularly in the short-run and more pronounced for non-college students and those who are relatively younger. These results are also robust under alternative model specifications. The findings of this paper highlight the importance of false ID laws in reducing alcohol consumption among underage youth.

  1. Applying Fuzzy ID3 Decision Tree for Software Effort Estimation

    CERN Document Server

    Elyassami, Sanaa

    2011-01-01

    Web Effort Estimation is a process of predicting the efforts and cost in terms of money, schedule and staff for any software project system. Many estimation models have been proposed over the last three decades and it is believed that it is a must for the purpose of: Budgeting, risk analysis, project planning and control, and project improvement investment analysis. In this paper, we investigate the use of Fuzzy ID3 decision tree for software cost estimation; it is designed by integrating the principles of ID3 decision tree and the fuzzy set-theoretic concepts, enabling the model to handle uncertain and imprecise data when describing the software projects, which can improve greatly the accuracy of obtained estimates. MMRE and Pred are used as measures of prediction accuracy for this study. A series of experiments is reported using two different software projects datasets namely, Tukutuku and COCOMO'81 datasets. The results are compared with those produced by the crisp version of the ID3 decision tree.

  2. Applying Fuzzy ID3 Decision Tree for Software Effort Estimation

    Directory of Open Access Journals (Sweden)

    Ali Idri

    2011-07-01

    Full Text Available Web Effort Estimation is a process of predicting the efforts and cost in terms of money, schedule and staff for any software project system. Many estimation models have been proposed over the last three decades and it is believed that it is a must for the purpose of: Budgeting, risk analysis, project planning and control, and project improvement investment analysis. In this paper, we investigate the use of Fuzzy ID3 decision tree for software cost estimation; it is designed by integrating the principles of ID3 decision tree and the fuzzy set-theoretic concepts, enabling the model to handle uncertain and imprecise data when describing the software projects, which can improve greatly the accuracy of obtained estimates. MMRE and Pred are used as measures of prediction accuracy for this study. A series of experiments is reported using two different software projects datasets namely, Tukutuku and COCOMO'81 datasets. The results are compared with those produced by the crisp version of the ID3 decision tree.

  3. SMEs, Competition and Entry - A developing country perspective

    DEFF Research Database (Denmark)

    Jensen, Camilla

    with a sizeable informal sector in developing countries and corruption. Other leading transition researchers such as Andrei Shleifer offer a variety of views on the informal sector from the romantic to the parasitic. This paper leans on the realist interpretation of de Soto grounded in institutional theory. High...... entry barriers push the entrepreneurs towards the informal sector. Whether entrepreneurs succeed in the transition towards the formal sector depends on the size of the entry barriers which are indirectly regulated both by informal institutions such as corruption and formal institutions...... such as competition policy. The model is tested using the World Bank's BEEPS dataset which is a repeated cross section survey of firms across countries in development and transition. This data gives access to observe among other firm size and whether firms pay a bribe or not. This data is combined with Stephan Voigt...

  4. Adaptive Text Entry for Mobile Devices

    DEFF Research Database (Denmark)

    Proschowsky, Morten Smidt

    for mobile devices and a framework for adaptive context-aware language models. Based on analysis of current text entry methods, the requirements to the new text entry methods are established. Transparent User guided Prediction (TUP) is a text entry method for devices with one dimensional touch input. It can......The reduced size of many mobile devices makes it difficult to enter text with them. The text entry methods are often slow or complicated to use. This affects the performance and user experience of all applications and services on the device. This work introduces new easy-to-use text entry methods...... to improve the models of human motor behaviour. TUP-Key is a variant of TUP, designed for 12 key phone keyboards. It is introduced in the thesis but has not been implemented or evaluated. Both text entry methods support adaptive context-aware language models. YourText is a framework for adaptive context...

  5. Preventing re-entry to foster care.

    Science.gov (United States)

    Carnochan, Sarah; Rizik-Baer, Daniel; Austin, Michael J

    2013-01-01

    Re-entry to foster care generally refers to circumstances in which children who have been discharged from foster care to be reunified with their family of origin, adopted, or provided kinship guardianship are returned to foster care. In the context of the federal performance measurement system, re-entry refers specifically to a return to foster care following an unsuccessful reunification. The federal Children and Family Services Review measures re-entry to foster care with a single indicator, called the permanency of reunification indicator, one of four indicators comprising the reunification composite measure. This review focuses on research related to the re-entry indicator, including the characteristics of children, caregivers and families, as well as case and child welfare services that are associated with a higher or lower risk of re-entry to foster care. Promising post-reunification services designed to prevent re-entry to foster care are described.

  6. 基于SAS的出入境交通工具食源性疾病暴发流行快速溯源调查研究%Tracing survey based on SAS on food-borne disease outbreaks on entry-exit transport

    Institute of Scientific and Technical Information of China (English)

    裘炯良; 郑剑宁; 施惠祥; 张锜

    2012-01-01

    Objective To explore the tracing survey of food-bome disease outbreaks on entry-exit conveyances. Methods Four kind of chi square tests were employed for the analysis of food-bome disease outbreaks on the passenger liner after using relative epidemical survey tables. All of the procedures were executed by computer based on SAS program. Results The latent period was 28.94 h and exposure date was estimated as 9:33 on Sep. 5, 2009. Fresh milk was recognized as contaminated food, the value of OR was 9.03(93% CI = 2.2-33.63). Conclusion The tracing survey of food-borne disease outbreaks and relative SAS programs can provide a convenient, quick and effective tool for the prevention and control of food-bome diseases.%[目的]建立基于数据统计分析系统(SAS)的出入境交通工具食源性疾病暴发流行快速溯源调查方法.[方法]应用4种x2检验法,结合食源性疾病暴发流行调查样表,分析某口岸国际大型豪华邮轮上暴发的食源性疾病.并采用国际权威的统计分析标准软件SAS分析平台进行编程实现.[结果]经流行病学快速溯源调查,潜伏期为28.94h,暴露日期估计为2009年9月5日9时33分,鲜奶作为污染食品列为高风险因素,其OR值为9.03 (95% Cl=2.2~33.63).[结论]食源性疾病暴发流行快速溯源调查方法及SAS程序为口岸食源性疾病的防控提供了一种简便、快捷且客观有效的工具.

  7. Border Crossing/Entry Data - Border Crossing/Entry Data Time Series tool

    Data.gov (United States)

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  8. Entry Into a Care Trajectory

    Directory of Open Access Journals (Sweden)

    Normand Carpentier

    2013-06-01

    Full Text Available A broad range of services are developing in response to the needs of an aging population. Although most interventions are carried out in the patient’s living environment—at the heart of society—few studies on service utilization refer to social theory. This paper suggests that studies on older people with chronic health conditions would benefit from a stronger theoretical foundation. Drawing on 15 in-depth interviews, it highlights the relevance of individualization processes and the network society, 2 central theoretical concerns in sociology. The research provides a unique perspective on the entry into the care trajectory and expands our comprehension of the emergence of a social organization that can respond to the needs of elderly patients. Data of this nature may be useful in service planning and the development of a care-centered approach.

  9. Market Survey for Business Expansion

    OpenAIRE

    Kocsis, Mate

    2016-01-01

    In order to find new customers abroad the company should analyze the market situation precisely in the desired market. This is necessary with a well-made market research, based on several survey methods. The answers collected by the survey should be analyzed and taken into consideration about the product and about the way of entry.

  10. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    .../ Information Delivery Services (IDS)/Corporate & Financial Reporting Group, Hartford, CT; Notice of Negative... Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial... Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services...

  11. Iron deficiency (ID) at both birth and 9 months predicts right frontal EEG asymmetry in infancy.

    Science.gov (United States)

    Armony-Sivan, Rinat; Zhu, Bingquan; Clark, Katy M; Richards, Blair; Ji, Chai; Kaciroti, Niko; Shao, Jie; Lozoff, Betsy

    2016-05-01

    This study considered effects of timing and duration of iron deficiency (ID) on frontal EEG asymmetry in infancy. In healthy term Chinese infants, EEG was recorded at 9 months in three experimental conditions: baseline, peek-a-boo, and stranger approach. Eighty infants provided data for all conditions. Prenatal ID was defined as low cord ferritin or high ZPP/H. Postnatal ID was defined as ≥ two abnormal iron measures at 9 months. Study groups were pre- and postnatal ID, prenatal ID only, postnatal ID only, and not ID. GLM repeated measure analysis showed a main effect for iron group. The pre- and postnatal ID group had negative asymmetry scores, reflecting right frontal EEG asymmetry (mean ± SE: -.18 ± .07) versus prenatal ID only (.00 ± .04), postnatal ID only (.03 ± .04), and not ID (.02 ± .04). Thus, ID at both birth and 9 months was associated with right frontal EEG asymmetry, a neural correlate of behavioral withdrawal and negative emotions.

  12. 6 CFR 37.25 - Renewal of REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.25 Renewal of REAL ID driver's licenses and identification cards. (a) In-person renewals. States must require holders of REAL ID driver's licenses and identification cards to renew...

  13. 6 CFR 37.23 - Reissued REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum Documentation, Verification, and Card Issuance Requirements § 37.23 Reissued REAL ID driver's licenses and identification cards. (a) State... time a REAL ID driver's license or identification card is reissued, to ensure that the...

  14. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  15. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by th

  16. A role for Id2 in regulating photic entrainment of the mammalian circadian system.

    Science.gov (United States)

    Duffield, Giles E; Watson, Nathan P; Mantani, Akio; Peirson, Stuart N; Robles-Murguia, Maricela; Loros, Jennifer J; Israel, Mark A; Dunlap, Jay C

    2009-02-24

    Inhibitor of DNA binding genes (Id1-Id4) encode helix-loop-helix (HLH) transcriptional repressors associated with development and tumorigenesis [1, 2], but little is known concerning the function(s) of these genes in normal adult animals. Id2 was identified in DNA microarray screens for rhythmically expressed genes [3-5], and further analysis revealed a circadian pattern of expression of all four Id genes in multiple tissues including the suprachiasmatic nucleus. To explore an in vivo function, we generated and characterized deletion mutations of Id2 and of Id4. Id2(-/-) mice exhibit abnormally rapid entrainment and an increase in the magnitude of the phase shift of the pacemaker. A significant proportion of mice also exhibit disrupted rhythms when maintained under constant darkness. Conversely, Id4(-/-) mice did not exhibit a noticeable circadian phenotype. In vitro studies using an mPer1 and an AVP promoter reporter revealed the potential for ID1, ID2, and ID3 proteins to interact with the canonical basic HLH clock proteins BMAL1 and CLOCK. These data suggest that the Id genes may be important for entrainment and operation of the mammalian circadian system, potentially acting through BMAL1 and CLOCK targets.

  17. Basic Initial Entry Training (BIET) Test Attitude Survey

    Science.gov (United States)

    1978-09-01

    training courses. The fourth set consists of one item on the cadre’ ratings of the goodness of the main ele- mnents of the BIET program. Cadre Teachin ...cont) RESULTS FOR " TEACHIN {; TACTICAL IRAINING": Drill in:structor Commi ttee, member Males Females Ma,1 es Females 20 43 20 g Frequency/(percentage

  18. [Epidemiological survey of dysphonia in children at primary school entry].

    Science.gov (United States)

    Lecoq, M; Drape, F

    1996-01-01

    The study of 259 children in primary school revealed a prevalence of dysphonia of 10%, often undiagnosed, untreated or considered as benign. It would seem desirable to draw attention to this symptom, which may be an indication of organic pathology or of psychological problems, the early treatment of which may avoid later sequelae. It is sometimes necessary to allow a period for reflection in order to gain the cooperation of the child and his parents.

  19. Foreign Entry and Heterogeneous Growth of Firms

    DEFF Research Database (Denmark)

    Deng, Paul Duo; Jefferson, Gary H.

    We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technological...

  20. Predicting the Diversity of Foreign Entry Modes

    DEFF Research Database (Denmark)

    Hashai, Niron; Geisler Asmussen, Christian; Benito, Gabriel;

    2007-01-01

    diversity across value chain activities and host markets. Analyzing a sample of Israeli based firms we show that larger firms exhibit a higher degree of entry mode diversity both across value chain activities and across host markets. Higher levels of knowledge intensity are also associated with more...... diversity in firms' entry modes across both dimensions....

  1. Foreign Entry and Heterogeneous Growth of Firms

    DEFF Research Database (Denmark)

    Deng, Paul Duo; Jefferson, Gary H.

    We adopt the framework of Schumpeterian creative destruction formalized by Aghion et al. (2009) to analyze the impact of foreign entry on the productivity growth of domestic firms. In the face of foreign entry, domestic firms exhibit heterogeneous patterns of growth depending on their technologic...

  2. The Id, the Ego and the Superego of The Simpsons

    OpenAIRE

    Stefán Birgir Stefánsson 1985

    2013-01-01

    The purpose of this essay is to explore three main characters from the popular television series The Simpsons in regards to Sigmund Freud’s theories in psychoanalytical analysis. This exploration is done because of great interest by the author and the lack of psychoanalytical analysis found connected to The Simpsons television show. The main aim is to show that these three characters, Homer Simpson, Marge Simpson and Ned Flanders, represent Freud’s three parts of the psyche, the id, the ego a...

  3. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  4. Thermal Soak Analysis of Earth Entry Vehicles

    Science.gov (United States)

    Agrawal, Parul; Sepka, Steven A.; Aliaga, Jose F.; Venkatapathy, Ethiraj; Samareh, Jamshid A.

    2012-01-01

    The Multi-Mission Earth Entry Vehicle project is developing an integrated tool called Multi Mission System Analysis for Planetary Entry Descent and Landing that will provide key technology solutions including mass sizing, aerodynamics, aerothermodynamics, and thermal and structural analysis for any given sample return mission. Thermal soak analysis and temperature predictions of various components including the payload container of the entry vehicle are part of the solution that this tool will offer to mission designers. The present paper focuses on the thermal soak analysis of an entry vehicle design based on the Mars Sample Return entry vehicle geometry and discusses a technical approach to develop parametric models for thermal soak analysis that will be integrated into the tool.

  5. SMEs, Competition and Entry - A developing country perspective

    DEFF Research Database (Denmark)

    Jensen, Camilla

    . The main research question is why it is so difficult for new entrepreneurs to enter markets, or in other words, why are the barriers to entry seemingly higher in developing countries? Development writers such as Hernando de Soto and Daron Acemoglu suggest that this question is closely related...... such as competition policy. The model is tested using the World Bank's BEEPS dataset which is a repeated cross section survey of firms across countries in development and transition. This data gives access to observe among other firm size and whether firms pay a bribe or not. This data is combined with Stephan Voigt...

  6. 19 CFR 142.3 - Entry documentation required.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry documentation required. 142.3 Section 142.3... TREASURY (CONTINUED) ENTRY PROCESS Entry Documentation § 142.3 Entry documentation required. (a) Contents. Except as provided in paragraph (b) of this section, the entry documentation required to secure...

  7. Shock Radiation Tests for Saturn and Uranus Entry Probes

    Science.gov (United States)

    Cruden, Brett A.; Bogdanoff, David W.

    2014-01-01

    This paper describes a test series in the Electric Arc Shock Tube at NASA Ames Research Center with the objective of quantifying shock-layer radiative heating magnitudes for future probe entries into Saturn and Uranus atmospheres. Normal shock waves are measured in Hydrogen/Helium mixtures (89:11 by mole) at freestream pressures between 13-66 Pa (0.1-0.5 Torr) and velocities from 20-30 km/s. No shock layer radiation is detected below 25 km/s, a finding consistent with predictions for Uranus entries. Between 25-30 km/s, radiance is quantified from the Vacuum Ultraviolet through Near Infrared, with focus on the Lyman-alpha and Balmer series lines of Hydrogen. Shock profiles are analyzed for electron number density and electronic state distribution. The shocks do not equilibrate over several cm, and distributions are demonstrated to be non-Boltzmann. Radiation data are compared to simulations of Decadal survey entries for Saturn and shown to be significantly lower than predicted with the Boltzmann radiation model.

  8. Risk factors for mosquito house entry in the Lao PDR.

    Directory of Open Access Journals (Sweden)

    Alexandra Hiscox

    Full Text Available BACKGROUND: Construction of the Nam Theun 2 hydroelectric project and flooding of a 450 km(2 area of mountain plateau in south-central Lao PDR resulted in the resettlement of 6,300 people to newly built homes. We examined whether new houses would have altered risk of house entry by mosquitoes compared with traditional homes built from poorer construction materials. METHODOLOGY/PRINCIPAL FINDINGS: Surveys were carried out in the Nam Theun 2 resettlement area and a nearby traditional rice farming area in 2010. Mosquitoes were sampled in bedrooms using CDC light traps in 96 resettlement houses and 96 traditional houses and potential risk factors for mosquito house entry were recorded. Risk of mosquito house entry was more than twice as high in traditional bamboo houses compared with those newly constructed from wood (Putative Japanese Encephalitis (JE vector incidence rate ratio (IRR = 2.26, 95% CI 1.38-3.70, P = 0.001; Anopheline IRR = 2.35, 95% CI: 1.30-4.23, P = 0.005. Anophelines were more common in homes with cattle compared against those without (IRR = 2.32, 95% CI: 1.29-4.17, P = 0.005.Wood smoke from cooking fires located under the house or indoors was found to be protective against house entry by both groups of mosquito, compared with cooking in a separate room beside the house (Putative JE vector IRR = 0.43, 95% CI: 0.26-0.73, P = 0.002; Anopheline IRR = 0.22, 95% CI: 0.10-0.51, P<0.001. CONCLUSIONS/SIGNIFICANCE: Construction of modern wooden homes should help reduce human-mosquito contact in the Lao PDR. Reduced mosquito contact rates could lead to reduced transmission of diseases such as JE and malaria. Cattle ownership was associated with increased anopheline house entry, so zooprophylaxis for malaria control is not recommended in this area. Whilst wood smoke was protective against putative JE vector and anopheline house entry we do not recommend indoor cooking since smoke inhalation can enhance

  9. ATF3 suppresses ESCC via downregulation of ID1

    Science.gov (United States)

    Li, Jian; Yang, Zishan; Chen, Zhiuguo; Bao, Yonghua; Zhang, Huijuan; Fang, Xinhui; Yang, Wancai

    2016-01-01

    Esophageal cancer is one of the most prevalent forms of cancer and has a particularly high mortality rate due to early metastasis; however, the underlying mechanisms of its formation and progression remain unclear. The present study performed immunohistochemical analysis and observed that the expression of activating transcription factor 3 (ATF3) was reduced in esophageal squamous cell carcinoma (ESCC) in comparison with non-tumor adjacent tissues. By contrast, inhibitor of DNA binding 1 (ID1) was overexpressed in ESCC tissues, demonstrating an inverse correlation with ATF3 (P<0.01). In ESCC EC109 and KYSE450 cells lines, transfection with an ATF3-overexpression plasmid resulted in the inhibition of cell proliferation, motility and migration, which was associated with the induction of E-cadherin expression and inhibition of cyclin D1 and Twist. Notably, ATF3 exerted an inverse regulatory interaction with ID1. The results of the present study provide additional evidence of the tumor suppressive features of ATF3 and demonstrate a novel mechanism of ATF3-mediated inhibition of cancer metastasis in esophageal cancer. PMID:27602100

  10. Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE

    Directory of Open Access Journals (Sweden)

    Basappa B. Kodada

    2012-01-01

    Full Text Available Grid Computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. It is based on networks and able to enable large scale aggregation and sharing of computational, data, sensors and other resources across institutional boundaries. Integrated Globus Tool Kit with Web services is to present OGSA (Open Grid Services Architecture as the standardservice grid architecture. In OGSA, everything is abstracted as a service, including computers, applications, data as well as instruments. The services and resources in Grid are heterogeneous and dynamic, and they also belong to different domains. Grid Services are still new to business system & asmore systems are being attached to it, any threat to it could bring collapse and huge harm. May be intruder come with a new form of attack. Grid Computing is a Global Infrastructure on the internet has led to asecurity attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System are available which are designed to handle the specific types of attacks. The technique of [27] will protect future attacks in Service Grid Computing Environment at the Grid Infrastructure but there is no technique can protect these types of attacks inside the grid at the node level. So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System – Inside Grid Computing Environment which can provide the protection against the complete threats inside the Grid Environment.

  11. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  12. LABORATORY VOICE DATA ENTRY SYSTEM.

    Energy Technology Data Exchange (ETDEWEB)

    PRAISSMAN,J.L.SUTHERLAND,J.C.

    2003-04-01

    We have assembled a system using a personal computer workstation equipped with standard office software, an audio system, speech recognition software and an inexpensive radio-based wireless microphone that permits laboratory workers to enter or modify data while performing other work. Speech recognition permits users to enter data while their hands are holding equipment or they are otherwise unable to operate a keyboard. The wireless microphone allows unencumbered movement around the laboratory without a ''tether'' that might interfere with equipment or experimental procedures. To evaluate the potential of voice data entry in a laboratory environment, we developed a prototype relational database that records the disposal of radionuclides and/or hazardous chemicals Current regulations in our laboratory require that each such item being discarded must be inventoried and documents must be prepared that summarize the contents of each container used for disposal. Using voice commands, the user enters items into the database as each is discarded. Subsequently, the program prepares the required documentation.

  13. Id3 induces an Elk-1–caspase-8-dependent apoptotic pathway in squamous carcinoma cells

    OpenAIRE

    Chen, You-Shin; Aubee, Joseph; Divito, Kyle A.; Zhou, Hengbo; Zhang, Weiyi; Chou, Fen-Pi; Simbulan-Rosenthal, Cynthia M.; Rosenthal, Dean S.

    2015-01-01

    Inhibitor of differentiation/DNA-binding (Id) proteins are helix–loop–helix (HLH) transcription factors. The Id protein family (Id1–Id4) mediates tissue homeostasis by regulating cellular processes including differentiation, proliferation, and apoptosis. Ids typically function as dominant negative HLH proteins, which bind other HLH proteins and sequester them away from DNA promoter regions. Previously, we have found that Id3 induced apoptosis in immortalized human keratinocytes upon UVB expos...

  14. Id4 Promotes Senescence and Sensitivity to Doxorubicin-induced Apoptosis in DU145 Prostate Cancer Cells

    OpenAIRE

    Carey, Jason P; Knowell, Ashley Evans; Chinaranagari, Swathi; Chaudhary, Jaideep

    2013-01-01

    Inhibitor of differentiation proteins (Id1, 2, 3 and 4) are dominant negative regulators of basic helix loop helix transcription factors and play dominant roles in cancer cells, spanning several molecular pathways including senescence, invasion, metastasis, proliferation and apoptosis. In contrast to high Id1, Id2 and Id3 expression, the expression of Id4 is epigenetically silenced in prostate cancer. In the present study we demonstrated a novel role of Id4, that of promotion of cellular sene...

  15. Impaired Thermogenesis and a Molecular Signature for Brown Adipose Tissue in Id2 Null Mice

    Directory of Open Access Journals (Sweden)

    Peng Zhou

    2016-01-01

    Full Text Available Inhibitor of DNA binding 2 (ID2 is a helix-loop-helix transcriptional repressor rhythmically expressed in many adult tissues. Our previous studies have demonstrated that Id2 null mice have sex-specific elevated glucose uptake in brown adipose tissue (BAT. Here we further explored the role of Id2 in the regulation of core body temperature over the circadian cycle and the impact of Id2 deficiency on genes involved in insulin signaling and adipogenesis in BAT. We discovered a reduced core body temperature in Id2−/− mice. Moreover, in Id2−/− BAT, 30 genes including Irs1, PPARs, and PGC-1s were identified as differentially expressed in a sex-specific pattern. These data provide valuable insights into the impact of Id2 deficiency on energy homeostasis of mice in a sex-specific manner.

  16. Novel Approaches to Inhibit HIV Entry

    Directory of Open Access Journals (Sweden)

    Chukwuka A. Didigu

    2012-02-01

    Full Text Available Human Immunodeficiency Virus (HIV entry into target cells is a multi-step process involving binding of the viral glycoprotein, Env, to its receptor CD4 and a coreceptor—either CCR5 or CXCR4. Understanding the means by which HIV enters cells has led to the identification of genetic polymorphisms, such as the 32 base-pair deletion in the ccr5 gene (ccr5∆32 that confers resistance to infection in homozygous individuals, and has also resulted in the development of entry inhibitors—small molecule antagonists that block infection at the entry step. The recent demonstration of long-term control of HIV infection in a leukemic patient following a hematopoietic stem cell transplant using cells from a ccr5∆32 homozygous donor highlights the important role of the HIV entry in maintaining an established infection and has led to a number of attempts to treat HIV infection by genetically modifying the ccr5 gene. In this review, we describe the HIV entry process and provide an overview of the different classes of approved HIV entry inhibitors while highlighting novel genetic strategies aimed at blocking HIV infection at the level of entry.

  17. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  18. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  19. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  20. Microbe-ID: an open source toolbox for microbial genotyping and species identification

    Directory of Open Access Journals (Sweden)

    Javier F. Tabima

    2016-08-01

    Full Text Available Development of tools to identify species, genotypes, or novel strains of invasive organisms is critical for monitoring emergence and implementing rapid response measures. Molecular markers, although critical to identifying species or genotypes, require bioinformatic tools for analysis. However, user-friendly analytical tools for fast identification are not readily available. To address this need, we created a web-based set of applications called Microbe-ID that allow for customizing a toolbox for rapid species identification and strain genotyping using any genetic markers of choice. Two components of Microbe-ID, named Sequence-ID and Genotype-ID, implement species and genotype identification, respectively. Sequence-ID allows identification of species by using BLAST to query sequences for any locus of interest against a custom reference sequence database. Genotype-ID allows placement of an unknown multilocus marker in either a minimum spanning network or dendrogram with bootstrap support from a user-created reference database. Microbe-ID can be used for identification of any organism based on nucleotide sequences or any molecular marker type and several examples are provided. We created a public website for demonstration purposes called Microbe-ID (microbe-id.org and provided a working implementation for the genus Phytophthora (phytophthora-id.org. In Phytophthora-ID, the Sequence-ID application allows identification based on ITS or cox spacer sequences. Genotype-ID groups individuals into clonal lineages based on simple sequence repeat (SSR markers for the two invasive plant pathogen species P. infestans and P. ramorum. All code is open source and available on github and CRAN. Instructions for installation and use are provided at https://github.com/grunwaldlab/Microbe-ID.

  1. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  2. Advances in spacecraft atmospheric entry guidance

    Science.gov (United States)

    Benito Manrique, Joel

    In order to advance entry guidance technology two different research areas have been explored with the objective of increasing the reachable landing area and the landing accuracy for future Mars missions. Currently only the northern hemisphere of Mars is available for landing due to its low elevation. Only low elevation landing sites have the necessary atmospheric density to allow landing using current Entry, Descent and Landing (EDL) technology. In order to reach most of the Ancient Highlands, the majority of the southern hemisphere, advanced EDL technology is needed in multiple fields, including entry guidance. The first research area is the definition and applications of reachable and controllable sets for entry. The definition of the reachable and controllable sets provides a framework for the study of the capabilities of an entry vehicle in a given planet. Reachable and controllable sets can be used to comprehensively characterize the envelope of trajectories that a vehicle can fly, the sites it can reach and the entry states that can be accommodated. The sets can also be used for the evaluation of trajectory planning algorithms and to assist in the selection of the entry or landing sites. In essence, the reachable and controllable sets offer a powerful vehicle and trajectory analysis and design framework that allows for better mission design choices. In order to illustrate the use of the sets, they are computed for a representative Mars mission using two different vehicle configurations. The sets characterize the impact of the vehicle configuration on the entry capability. Furthermore, the sets are used to find the best skip-entry trajectory for a return from the Moon mission, highlighting the utility of the sets in atmospheric maneuvers other than entry. The second research area is the development of the components of an entry guidance algorithm that allow high elevation landing and provide as well high landing accuracy. The approach taken follows the

  3. Entry Regulation under Asymmetric Information about Demand

    Directory of Open Access Journals (Sweden)

    Paula Sarmento

    2010-01-01

    Full Text Available We investigate how an incumbent firm can use the regulatory policy about entry and the informational advantage to protect his market position. This question is studied through the construction of a signalling game where we assume that the regulator has less information about demand than the firms. We conclude that there is a pooling equilibrium and partially separating equilibria in which entry is deterred and, if demand is high, there will be insufficient entry. The final effect on welfare depends on the tradeoff between short-run benefits (lower price and long-run losses (weaker competition.

  4. Market entry strategies into the BRIC countries

    DEFF Research Database (Denmark)

    Boyd, Britta; Dyhr Ulrich, Anna Marie

    2014-01-01

    Based on a sample of 177 exporting SMEs, this study investigates what market entry strategy is used by Danish family and non-family businesses. From a resource-based view, three critical internal factors (risk, flexibility and control) affecting the entry mode choice into the BRIC markets...... when entering the BRIC markets. In contrast, family firms choose high commitment entry modes which involve high risk and low flexibility when entering the BRIC markets. Further implications discuss the suitability of export strategies to BRIC markets for managers of Danish family and non-family firms....

  5. Texting while driving: is speech-based text entry less risky than handheld text entry?

    Science.gov (United States)

    He, J; Chaparro, A; Nguyen, B; Burge, R J; Crandall, J; Chaparro, B; Ni, R; Cao, S

    2014-11-01

    Research indicates that using a cell phone to talk or text while maneuvering a vehicle impairs driving performance. However, few published studies directly compare the distracting effects of texting using a hands-free (i.e., speech-based interface) versus handheld cell phone, which is an important issue for legislation, automotive interface design and driving safety training. This study compared the effect of speech-based versus handheld text entries on simulated driving performance by asking participants to perform a car following task while controlling the duration of a secondary text-entry task. Results showed that both speech-based and handheld text entries impaired driving performance relative to the drive-only condition by causing more variation in speed and lane position. Handheld text entry also increased the brake response time and increased variation in headway distance. Text entry using a speech-based cell phone was less detrimental to driving performance than handheld text entry. Nevertheless, the speech-based text entry task still significantly impaired driving compared to the drive-only condition. These results suggest that speech-based text entry disrupts driving, but reduces the level of performance interference compared to text entry with a handheld device. In addition, the difference in the distraction effect caused by speech-based and handheld text entry is not simply due to the difference in task duration.

  6. An Application of Fuzzy Theory to Technical Competency Analysis for the Entry-Level Electronic Technician.

    Science.gov (United States)

    Chang, Liang-Te; And Others

    A study was conducted to develop the electronic technical competencies of duty and task analysis by using a revised DACUM (Developing a Curriculum) method, a questionnaire survey, and a fuzzy synthesis operation. The revised DACUM process relied on inviting electronics trade professionals to analyze electronic technology for entry-level…

  7. Employer Perceptions of the Academic Preparation of Entry-Level Certified Athletic Trainers

    Science.gov (United States)

    Massie, J. Brett; Strang, Adam J.; Ward, Rose Marie

    2009-01-01

    Objective: To determine employers' (clinic based ATs) perceived satisfaction of the academic preparation of entry-level ATs, and to identify perceived inadequacies of the (ATEP) curriculum. Design and Setting: Athletic trainers employed in clinical setting completed an online survey instrument. Subjects: One-hundred-four ATs serving in the NATA…

  8. The Intergenerational Relationship of Occupational Status and Sex-Typing at Children's Labour Market Entry

    NARCIS (Netherlands)

    Korupp, S.E.; Sanders, K.; Ganzeboom, H.B.G.

    2002-01-01

    To what extent do the mother's and father's jobs and occupational sex-typing influence the status and sex-typing of their children's occupation at first entry into the labour market? Referring to a database containing 5027 respondents of two merged Dutch surveys held between 1992 and 1995, this stud

  9. The Intergenerational Relationship of Occupational Status and Sex-Typing at Children's Labour Market Entry

    NARCIS (Netherlands)

    Korupp, S.E.; Sanders, K.; Ganzeboom, H.B.G.

    2002-01-01

    To what extent do the mother's and father's jobs and occupational sex-typing influence the status and sex-typing of their children's occupation at first entry into the labour market? Referring to a database containing 5027 respondents of two merged Dutch surveys held between 1992 and 1995, this stud

  10. The intergenerational transmission of occupational status and sex-typing at children's labour market entry

    NARCIS (Netherlands)

    Korupp, SE; Sanders, K; Ganzeboom, HBG

    2002-01-01

    To what extent do the mother's and father's jobs and occupational sex-typing influence the status and sex-typing of their children's occupation at first entry into the labour market? Referring to a database containing 5027 respondents of two merged Dutch surveys held between 1992 and 1995, this stud

  11. Entry-Level Information Services and Support Personnel: Needed Workplace and Technology Skills.

    Science.gov (United States)

    Awang, Faridah; Anderson, Marcia A.; Baker, Clora Mae

    2003-01-01

    Responses to an Illinois survey by 19 human resource managers and 26 university and 71 community college information systems instructors rated the importance of workplace and technology skills for entry-level information services and support personnel. Both groups ranked nontechnical/soft skills and information technology certification as…

  12. The intergenerational transmission of occupational status and sex-typing at children's labour market entry

    NARCIS (Netherlands)

    Korupp, SE; Sanders, K; Ganzeboom, HBG

    To what extent do the mother's and father's jobs and occupational sex-typing influence the status and sex-typing of their children's occupation at first entry into the labour market? Referring to a database containing 5027 respondents of two merged Dutch surveys held between 1992 and 1995, this

  13. The Intergenerational Relationship of Occupational Status and Sex-Typing at Children's Labour Market Entry

    NARCIS (Netherlands)

    Korupp, S.E.; Sanders, K.; Ganzeboom, H.B.G.

    2002-01-01

    To what extent do the mother's and father's jobs and occupational sex-typing influence the status and sex-typing of their children's occupation at first entry into the labour market? Referring to a database containing 5027 respondents of two merged Dutch surveys held between 1992 and 1995, this

  14. Predicting Students’ Performance using Modified ID3 Algorithm

    Directory of Open Access Journals (Sweden)

    Ramanathan L

    2013-06-01

    Full Text Available The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain as well as by giving weights to each attribute at every decision making point. Several other algorithms like J48 and Naive Bayes classification algorithm are alsoapplied on the dataset. The WEKA tool was used for the analysis of J48 and Naive Bayes algorithms. The results are compared and presented. The dataset used in our study is taken from the School of Computing Sciences and Engineering (SCSE, VIT University.

  15. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  16. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  17. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  18. Improvement of the ID model for quantitative network data

    DEFF Research Database (Denmark)

    Sørensen, Peter Borgen; Damgaard, Christian Frølund; Dupont, Yoko Luise

    2015-01-01

    )1. This presentation will illustrate the application of the ID method based on a data set which consists of counts of visits by 152 pollinator species to 16 plant species. The method is based on two definitions of the underlying probabilities for each combination of pollinator and plant species: (1), pi...... reproduce the high number of zero valued cells in the data set and mimic the sampling distribution. 1 Sørensen et al, Journal of Pollination Ecology, 6(18), 2011, pp129-139......Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks...

  19. Integrated Entry Guidance for Reusable Launch Vehicle

    Institute of Scientific and Technical Information of China (English)

    NING Guo-dong; ZHANG Shu-guang; FANG Zhen-ping

    2007-01-01

    A method for the implementation of integrated three-degree-of-freedom constrained entry guidance for reusable launch vehicle is presented. Given any feasible entry conditions, terminal area energy management interface conditions, and the reference trajectory generated onboard then, the method can generate a longitudinal guidance profile rapidly, featuring linear quadratic regular method and a proportional-integral-derivative tracking law with time-varying gains, which satisfies all the entry corridor constraints and meets the requirements with high precision. Afterwards, by utilizing special features of crossrange parameter, establishing bank-reversal corridor,and determining bank-reversals according to dynamically adjusted method, the algorithm enables the lateral entry guidance system to fly a wide range of missions and provides reliable and good performance in the presence of significant aerodynamic modeling uncertainty.Fast trajectory guidance profiles and simulations with a reusable launch vehicle model for various missions and aerodynamic uncertainties are presented to demonstrate the capacity and reliability of this method.

  20. Border Crossing/Entry Data - Boarder Crossing

    Data.gov (United States)

    Department of Transportation — Border Crossing/Entry Data provides summary statistics for incoming crossings at the U.S.-Canadian and the U.S.-Mexican border at the port level. Data are available...

  1. Entry Mode and Performance of Nordic Firms

    DEFF Research Database (Denmark)

    Wulff, Jesper

    2015-01-01

    This study investigates whether the relationship between mode of international market entry and non-location bound international experience is weaker for firms that are large or have a high foreign to total sales ratio, labeled multinational experience. Empirical evidence based on 250 foreign...... market entries made by Norwegian, Danish and Swedish firms suggests that the association between equity mode choice and non-location bound international experience diminishes in the presence of higher levels of multinational experience. Furthermore, firms whose entry mode choice is predicted by the model...... including the proposed moderating effect, on average, yield higher post-entry performance. This study sheds light on inconsistent results found in previous research investigating the impact of international experience and has practical implications for managerial decision-making....

  2. The Effects of Entry in Bilateral Oligopoly

    Directory of Open Access Journals (Sweden)

    Alex Dickson

    2013-06-01

    Full Text Available The purpose of this paper is to study the effects of entry into the market for a single commodity in which both sellers and buyers are permitted to interact strategically. With the inclusion of an additional seller, the market is quasi-competitive: the price falls and volume of trade increases, as expected. However, contrary to the conventional wisdom, existing sellers’ payoffs may increase. The conditions under which entry by new sellers raises the equilibrium payoffs of existing sellers are derived. These depend in an intuitive way on the elasticity of a strategic analog of demand and the market share of existing sellers, and encompass entirely standard economic environments. Similar results are derived relating to the entry of additional buyers and the effects of entry on both sides of the market are investigated.

  3. Entry and exit decisions under uncertainty

    DEFF Research Database (Denmark)

    Kongsted, Hans Christian

    1996-01-01

    This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result......This paper establishes the general deterministic limit that corresponds to Dixit's model of entry and exit decisions under uncertainty. The interlinked nature of decisions is shown to be essential also in the deterministic limit. A numerical example illustrates the result...

  4. 2006-2011年新疆口岸出入境人群中HIV感染者的流行病学调查分析%Analysis on the epidemical survey of HIV-infected persons among entry-exit personnel at Xinjiang ports from 2006 to 2011

    Institute of Scientific and Technical Information of China (English)

    阿不都扎依尔·阿不都卡德尔; 郭刚; 古丽努尔; 何冰

    2012-01-01

    Objective To understand the epidemic situation and ways of HIV transmission among entry-exit personnel, and to provide scientific basis for the prevention and control of AIDS at Xinjiang ports. Methods The data of the positive 237 737 cases detected at Xinjiang ports from 2006 to 2011 were collected and analyzed. Results A total of 195 cases were found with HIV-infected, the infection rate was 0.082% . The age of the infected persons was mainly concentrated in the 20-40 year-old crowd. The proportion of infected males was higher than that of females (3.5:1). There was a high proportion of HIV-infection in ethnic minorities. The business and transport drivers were the high risk groups. The route of transmissions was sexually transmitted. Conclusion It is crucial for the control of the transmission of AIDS at the frontier port to carry out epidemiological survey and analysis, and to disseminate the knowledge of AIDS prevention.%目的 了解新疆各口岸出入境人群中艾滋病病毒(HIV)感染者的流行趋势和传播途径,为今后国境口岸艾滋病防控提供科学依据.方法 对收集的2006-2011年新疆口岸出入境人群237737人HIV监测阳性资料进行统计病学的统计分析.结果 共检出HIV病毒感染者195例,总感染率0.082%;感染者年龄主要集中在20~40岁的人群;其中,男性感染比例高于女性(男女比为3.5∶1);少数民族感染比例高;商务人员和交通工具驾驶员为高危人群;传播途径以性传播为主.结论 做好HIV感染者的流行病学调查、分析和防止艾滋病传播知识的宣传是在国境口岸控制艾滋病传播的重要环节.

  5. Hypersonic and planetary entry flight mechanics

    Science.gov (United States)

    Vinh, N. X.; Busemann, A.; Culp, R. D.

    1980-01-01

    The book treats hypersonic flight trajectories and atmospheric entry flight mechanics in light of their importance for space shuttle entry. Following a review of the structures of planetary atmospheres and aerodynamic forces, equations are derived for flight over a spherical planet, and the performance of long-range hypervelocity vehicles in extra-atmospheric flight is analyzed. Consideration is then given to vehicle trajectories in the powered and atmospheric reentry phases of flight, and several first-order solutions are derived for various planetary entry situations. The second-order theory of Loh for entry trajectories is presented along with the classical theories of Yaroshevskii and Chapman for entry into planetary atmospheres, and the thermal problems encountered in hypersonic flight are analyzed. A unified theory for entry into planetary atmospheres is then introduced which allows the performance of a general type of lifting vehicle to be studied, and applied to the analysis of orbit contraction due to atmospheric drag, flight with lift modulation and lateral maneuvers.

  6. A survey on anomaly and signature based intrusion detection system (IDS

    Directory of Open Access Journals (Sweden)

    Mrs.Anshu Gangwar

    2014-04-01

    Full Text Available Security is considered as one of the most critical parameter for the acceptance of any networking technology. Information in transit must be protected from unauthorized release and modification, and the connection itself must be established and maintained securely malicious users have taken advantage of this to achieve financial gain or accomplish some corporate or personal agenda. Denial of Service (DoS and distributed DoS (DDoS attacks are evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money. Combination of Intrusion detection System and Firewall is used by Business Organizations to detect and p revent Organizations‟ network from these attacks. Signatures to detect them are not available. This paper presents a light-Weight mechanism to detect novel DoS/DDoS (Resource Consumption attacks and automatic signature generation process to represent them in real time. Experimental results are provided to support the proposed mechanism.

  7. Business Strategy and Perceived Benefits of Internet Banking: Their Impact on Banks' Strategic Responses to China's Entry to WTO

    Institute of Scientific and Technical Information of China (English)

    刘春红; 江静; 李杰

    2003-01-01

    With the entry to WRO and development of IT, banks in China are adjusting their competitive strategies to meet the competition. Internet banking has become a kind of strategic choice to response to the entry to WTO. Based on relevantly selective reviews of literature of strategy theory and research, a model is developed to study banks' strategic response to entry to WTO. According to a survey of 192 sets of questionnaires, this study finds that external pressure, business strategy and perceived benefits of Internet banking would influence banks' perceived increase in Internet banking investment. And banks'perceived increase in Internet banking investment has no difference between big banks and small banks.

  8. Planetary/DOD entry technology flight experiments. Volume 2: Planetary entry flight experiments

    Science.gov (United States)

    Christensen, H. E.; Krieger, R. J.; Mcneilly, W. R.; Vetter, H. C.

    1976-01-01

    The technical feasibility of launching a high speed, earth entry vehicle from the space shuttle to advance technology for the exploration of the outer planets' atmospheres was established. Disciplines of thermodynamics, orbital mechanics, aerodynamics propulsion, structures, design, electronics and system integration focused on the goal of producing outer planet environments on a probe shaped vehicle during an earth entry. Major aspects of analysis and vehicle design studied include: planetary environments, earth entry environment capability, mission maneuvers, capabilities of shuttle upper stages, a comparison of earth entry planetary environments, experiment design and vehicle design.

  9. Inhibitor of differentiation 4 (Id4 is a potential tumor suppressor in prostate cancer

    Directory of Open Access Journals (Sweden)

    Carey Jason PW

    2009-06-01

    Full Text Available Abstract Background Inhibitor of differentiation 4 (Id4, a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Methods Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS, expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Results Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR, p21, p27 and p53 expression in DU145 cells. Conclusion The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously

  10. Characterizing and Managing Intrusion Detection System (IDS) Alerts with Multi-Server/Multi-Priority Queuing Theory

    Science.gov (United States)

    2014-12-26

    IDS called SNORT®. ( Roesch & Green, 2014) .......... 3 Figure 2. A basic queuing theory diagram calling out the six defining characteristics of a...particular format is from the popular open source IDS called SNORT®. ( Roesch & Green, 2014) The set of signatures within an IDS is called its rule-set...nicol/ece541/slides/queueing.pdf Roesch , M., & Green, C. (2014). SNORT Users Manual. Retrieved August 2014, from SNORT: http://manual.snort.org/ Saad

  11. The Implementation of C-ID, R2D2 Model on Learning Reading Comprehension

    Science.gov (United States)

    Rayanto, Yudi Hari; Rusmawan, Putu Ngurah

    2016-01-01

    The purposes of this research are to find out, (1) whether C-ID, R2D2 model is effective to be implemented on learning Reading comprehension, (2) college students' activity during the implementation of C-ID, R2D2 model on learning Reading comprehension, and 3) college students' learning achievement during the implementation of C-ID, R2D2 model on…

  12. 6 CFR 37.29 - Prohibition against holding more than one REAL ID card or more than one driver's license.

    Science.gov (United States)

    2010-01-01

    ... ID card or more than one driver's license. 37.29 Section 37.29 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Minimum... REAL ID card or more than one driver's license. (a) An individual may hold only one REAL ID card....

  13. 19 CFR 142.44 - Entry number range.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry number range. 142.44 Section 142.44 Customs... (CONTINUED) ENTRY PROCESS Line Release § 142.44 Entry number range. After an application for Line Release has received final approval, filers must provide the port director, in writing, with a range of entry...

  14. 77 FR 5681 - Establishment of Global Entry Program

    Science.gov (United States)

    2012-02-06

    ... assist in developing a marketing strategy. The firm has created a new Global Entry logo and tag line... SENTRI II. Analysis of Comments A. Program Performance and Entry Process B. Marketing of Global Entry C.... Marketing of Global Entry Comment: CBP received two comments suggesting that CBP should expand marketing...

  15. Gulf of Mexico killer whale photo-ID catalog

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Photo-identification data on killer whales occupying the northern Gulf of Mexico have been collected in association with large vessel surveys since 1991. Photographs...

  16. Gulf of Mexico sperm whale photo-ID catalog

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Photo-identification data on sperm whales occupying the north central Gulf of Mexico have been collected during vessel surveys. Photographs of sperm whales are taken...

  17. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  18. Id expression in amphioxus and lamprey highlights the role of gene cooption during neural crest evolution

    Science.gov (United States)

    Meulemans, Daniel; McCauley, David; Bronner-Fraser, Marianne

    2003-01-01

    Neural crest cells are unique to vertebrates and generate many of the adult structures that differentiate them from their closest invertebrate relatives, the cephalochordates. Id genes are robust markers of neural crest cells at all stages of development. We compared Id gene expression in amphioxus and lamprey to ask if cephalochordates deploy Id genes at the neural plate border and dorsal neural tube in a manner similar to vertebrates. Furthermore, we examined whether Id expression in these cells is a basal vertebrate trait or a derived feature of gnathostomes. We found that while expression of Id genes in the mesoderm and endoderm is conserved between amphioxus and vertebrates, expression in the lateral neural plate border and dorsal neural tube is a vertebrate novelty. Furthermore, expression of lamprey Id implies that recruitment of Id genes to these cells occurred very early in the vertebrate lineage. Based on expression in amphioxus we postulate that Id cooption conferred sensory cell progenitor-like properties upon the lateral neurectoderm, and pharyngeal mesoderm-like properties upon cranial neural crest. Amphioxus Id expression is also consistent with homology between the anterior neurectoderm of amphioxus and the presumptive placodal ectoderm of vertebrates. These observations support the idea that neural crest evolution was driven in large part by cooption of multipurpose transcriptional regulators from other tissues and cell types.

  19. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  20. Achieving Payoffs from an Industry Cloud Ecosystem at BankID

    DEFF Research Database (Denmark)

    Eaton, Ben; Hallingby, Hanne Kristine; Nesse, Per-Jonny

    2014-01-01

    BankID is an industry cloud owned by Norwegian banks. It provides electronic identity, authentication and electronic signing capabilities for banking, merchant and government services. More than 60% of the population uses BankID services. As the broader ecosystem around BankID evolved, challenges......—arising from tensions between different parts of the ecosystem—had to be resolved. The four lessons learned from the BankID case will help others to build an industry cloud and establish a healthy ecosystem to service a broad user base....

  1. Lessons learned from planetary entry probe missions

    Science.gov (United States)

    Niemann, Hasso; Atreya, Sushil K.; Kasprzak, Wayne

    Probing the atmospheres and surfaces of the planets and their moons with fast moving entry probes has been a very useful and essential technique to obtain in situ or quasi in situ scientific data (ground truth) which could not otherwise be obtained from fly by or orbiter only missions and where balloon, aircraft or lander missions are too complex and too costly. Planetary entry probe missions have been conducted successfully on Venus, Mars, Jupiter and Titan after having been first demonstrated in the Earth's atmosphere. Future planetary missions should also include more entry probe missions back to Venus and to the outer planets. The success of and science returns from past missions, the need for more and unique data, and a continuously advancing technology generate confidence that future missions will be even more successful with respect to science return and technical performance. There are, however, unique challenges associated with entry probe missions and with building instruments for an entry probe, as compared to orbiters, landers, or rovers. Conditions during atmospheric entry are extreme. There are operating time constraints due to the usually short duration of the probe descent, and the instruments experience rapid environmental changes in temperature and pressure. In addition, there are resource limitations, i.e. mass, power, size and bandwidth. Because of the protective heat shield and the high acceleration the probe experiences during entry, the ratio of payload to total probe mass is usually much smaller than in other missions. Finally, the demands on the instrument design are determined in large part by conditions (pressure, temperature, composition) unique to the particular body under study, and as a result, there is no one-size-fits-all instrument for an atmospheric probe. Many of these requirements are more easily met by miniaturizing the probe instrumentation and consequently reducing the required size of the probe. Improved heat shield

  2. 76 FR 82315 - Agency Information Collection Activities: Entry/Immediate Delivery Application and Simplified Entry

    Science.gov (United States)

    2011-12-30

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Entry/Immediate... Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act: Entry/Immediate... process is conducted in accordance with 5 CFR 1320.10. DATES: Written comments should be received on or...

  3. Autonomous gliding entry guidance with geographic constraints

    Institute of Scientific and Technical Information of China (English)

    Guo Jie; Wu Xuzhong; Tang Shengjing

    2015-01-01

    This paper presents a novel three-dimensional autonomous entry guidance for relatively high lift-to-drag ratio vehicles satisfying geographic constraints and other path constraints. The guidance is composed of onboard trajectory planning and robust trajectory tracking. For trajectory planning, a longitudinal sub-planner is introduced to generate a feasible drag-versus-energy profile by using the interpolation between upper boundary and lower boundary of entry corridor to get the desired trajectory length. The associated magnitude of the bank angle can be specified by drag profile, while the sign of bank angle is determined by lateral sub-planner. Two-reverse mode is utilized to satisfy waypoint constraints and dynamic heading error corridor is utilized to satisfy no-fly zone constraints. The longitudinal and lateral sub-planners are iteratively employed until all of the path constraints are satisfied. For trajectory tracking, a novel tracking law based on the active disturbance rejection control is introduced. Finally, adaptability tests and Monte Carlo simulations of the entry guidance approach are performed. Results show that the proposed entry guidance approach can adapt to different entry missions and is able to make the vehicle reach the prescribed target point precisely in spite of geographic constraints.

  4. Molecular characterization of lactobacilli isolated from fermented idli batter

    Directory of Open Access Journals (Sweden)

    Perumal Jayaprabha Agaliya

    2013-12-01

    Full Text Available Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  5. Molecular characterization of lactobacilli isolated from fermented idli batter.

    Science.gov (United States)

    Agaliya, Perumal Jayaprabha; Jeevaratnam, Kadirvelu

    2013-12-01

    Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  6. L’idéologie : une notion bien embarrassante

    OpenAIRE

    Dominique Maingueneau

    2007-01-01

    Je ne pense pas être la personne la mieux placée pour réfléchir sur l’intérêt que présente la notion d’idéologie pour ceux qui étudient la littérature. Le travail conceptuel sur cette notion a plutôt été le fait de la génération antérieure à la mienne. Je suppose que si l’on m’a sollicité pour en parler, c’est parce que de l’intérieur de l’analyse du discours j’ai été amené à me confronter – quoique dans un cadre théorique et méthodologique très différent – à des questions du même ordre. Fau...

  7. Generating unique IDs from patient identification data using security models

    Directory of Open Access Journals (Sweden)

    Emad A Mohammed

    2016-01-01

    Full Text Available Background: The use of electronic health records (EHRs has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5 and secure hashing algorithm (SHA as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  8. Application of Statistical Process Control Methods for IDS

    Directory of Open Access Journals (Sweden)

    Muhammad Sadiq Ali Khan

    2012-11-01

    Full Text Available As technology improves, attackers are trying to get access to the network system resources by so many means. Open loop holes in the network allow them to penetrate in the network more easily; statistical methods have great importance in the area of computer and network security, in detecting the malfunctioning of the network system. Development of internet security solution needed to protect the system and to with stand prolonged and diverse attack. In this paper Statistical approach has been used, conventionally Statistical Control Charts has been used for quality characteristics however in IDS abnormal access can be easily detected and appropriate control limit can be established. Two different charts are investigated and Shewhart chart based on average has produced better accuracy. The approach used here for intrusion detection in such a way that if the data packet is drastically different from normal variation then it can be classified as attack. In other words a system variation may be due to some special reason. If these causes are investigated then natural variation and abnormal variation can be distinguished which can be used for distinction of behaviors of the system.

  9. L’idéologie : une notion bien embarrassante

    Directory of Open Access Journals (Sweden)

    Dominique Maingueneau

    2007-02-01

    Full Text Available Je ne pense pas être la personne la mieux placée pour réfléchir sur l’intérêt que présente la notion d’idéologie pour ceux qui étudient la littérature. Le travail conceptuel sur cette notion a plutôt été le fait de la génération antérieure à la mienne. Je suppose que si l’on m’a sollicité pour en parler, c’est parce que de l’intérieur de l’analyse du discours j’ai été amené à me confronter – quoique dans un cadre théorique et méthodologique très différent – à des questions du même ordre. Faut...

  10. Precise Location Acquisition of Mobility Data Using Cell ID

    Directory of Open Access Journals (Sweden)

    Shafqat Ali Shad

    2012-05-01

    Full Text Available Cellular network data has become a hot source of study for extraction of user-mobility and spatio-temporal trends. Location binding in mobility data can be done through different methods like GPS, service provider assisted faux-GPS and Cell Global Identity (CGI. Among these Cell Global Identity is most inexpensive method and readily available solution for mobility extraction; however exact spatial extraction is somehow a problem in it. This paper presents the spatial extraction technique of mobile phone user raw data which carries the information like location information, proximity location and activity of subjects. This work mainly focuses on the data pre-processing methodology and technique to interpret the low level mobility data into high level mobility information using the designed clustering methodology and publically available Cell-IDs databases. Work proposed the semi- supervised strategy to derive the missing locations thorough the usage of semantic tag information and removal of spatial outliers for precise mobility profile building.

  11. Shuttle program. MCC Level C formulation requirements: Entry guidance and entry autopilot

    Science.gov (United States)

    Harpold, J. C.; Hill, O.

    1980-01-01

    A set of preliminary entry guidance and autopilot software formulations is presented for use in the Mission Control Center (MCC) entry processor. These software formulations meet all level B requirements. Revision 2 incorporates the modifications required to functionally simulate optimal TAEM targeting capability (OTT). Implementation of this logic in the MCC must be coordinated with flight software OTT implementation and MCC TAEM guidance OTT. The entry guidance logic is based on the Orbiter avionics entry guidance software. This MCC requirements document contains a definition of coordinate systems, a list of parameter definitions for the software formulations, a description of the entry guidance detailed formulation requirements, a description of the detailed autopilot formulation requirements, a description of the targeting routine, and a set of formulation flow charts.

  12. Conventional Chiralpak ID vs. capillary Chiralpak ID-3 amylose tris-(3-chlorophenylcarbamate)-based chiral stationary phase columns for the enantioselective HPLC separation of pharmaceutical racemates.

    Science.gov (United States)

    Ahmed, Marwa; Gwairgi, Marina; Ghanem, Ashraf

    2014-11-01

    A comparative enantioselective analysis using immobilized amylose tris-(3-chlorophenylcarbamate) as chiral stationary phase in conventional high-performance liquid chromatography (HPLC) with Chiralpak ID (4.6 mm ID × 250 mm, 5 µm silica gel) and micro-HPLC with Chiralpak ID-3 (0.30 mm ID × 150 mm, 3 µm silica gel) was conducted. Pharmaceutical racemates of 12 pharmacological classes, namely, α- and β-blockers, anti-inflammatory drugs, antifungal drugs, dopamine antagonists, norepinephrine-dopamine reuptake inhibitors, catecholamines, sedative hypnotics, diuretics, antihistaminics, anticancer drugs, and antiarrhythmic drugs were screened under normal phase conditions. The effect of an organic modifier on the analyte retentions and enantiomer recognition was investigated. Baseline separation was achieved for 1-acenaphthenol, carprofen, celiprolol, cizolirtine carbinol, miconazole, tebuconazole, 4-hydroxy-3-methoxymandelic acid, 1-indanol, 1-(2-chlorophenyl)ethanol, 1-phenyl-2-propanol, flavanone, 6-hydroxyflavanone, 4-bromogluthethimide, and pentobarbital on the 4.6 mm ID packed with a 5 µm silica column using conventional HPLC. Nonetheless, baseline separation was achieved for aminoglutethimide, naftopidil, and thalidomide on the 0.3 mm ID packed with a 3 µm silica capillary column.

  13. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    Full Text Available BACKGROUND: The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized. METHODOLOGY/PRINCIPAL FINDINGS: An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice. CONCLUSIONS/SIGNIFICANCE: In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  14. Mechanism of store-operated calcium entry

    Indian Academy of Sciences (India)

    Devkanya Dutta

    2000-12-01

    Activation of receptors coupled to the phospholipase C/IP3 signalling pathway results in a rapid release of calcium from its intracellular stores, eventually leading to depletion of these stores. Calcium store depletion triggers an influx of extracellular calcium across the plasma membrane, a mechanism known as the store-operated calcium entry or capacitative calcium entry. Capacitative calcium current plays a key role in replenishing calcium stores and activating various physiological processes. Despite considerable efforts, very little is known about the molecular nature of the capacitative channel and the signalling pathway that activates it. This review summarizes our current knowledge about store operated calcium entry and suggests possible hypotheses for its mode of activation.

  15. Modes and orders of market entry

    DEFF Research Database (Denmark)

    Ulhøi, John Parm

    2012-01-01

    This paper focuses on the initial questions of how and when to enter a market from the perspective of a firm. By entry mode is meant a firm’s strategy (innovation or imitation) for entering the market in response to environmental changes. Entry order refers to the related issue of market timing...... strategies are more ambiguous. Based on a corporate technology and innovation strategy perspective, the paper reconceptualises and extends existing modes and orders of market entry, and in particular clarifies the ambiguity associated with imitative strategies. Four distinct imitator strategies...... are identified. The paper closes with a brief discussion of limitations, avenues for future research, and implications for managers and affected policymakers....

  16. Automated Re-Entry System using FNPEG

    Science.gov (United States)

    Johnson, Wyatt R.; Lu, Ping; Stachowiak, Susan J.

    2017-01-01

    This paper discusses the implementation and simulated performance of the FNPEG (Fully Numerical Predictor-corrector Entry Guidance) algorithm into GNC FSW (Guidance, Navigation, and Control Flight Software) for use in an autonomous re-entry vehicle. A few modifications to FNPEG are discussed that result in computational savings -- a change to the state propagator, and a modification to cross-range lateral logic. Finally, some Monte Carlo results are presented using a representative vehicle in both a high-fidelity 6-DOF (degree-of-freedom) sim as well as in a 3-DOF sim for independent validation.

  17. Form, its meaning, and dictionary entries

    Directory of Open Access Journals (Sweden)

    Violetta Koseska-Toszewa

    2015-11-01

    It is worth stressing that distinguishing between the form and its meaning in comparing the material 6 languages belonging to three different groups of Slavic languages (as is the case in the MONDILEX Project will allow us to avoid numeorus substantiva mistakes and erroneous conclusions. Hence dictionary entries should be verified and made uniform in that respect before they are “digitalized”... Distinction between the form and its meaning in a dictionary entry is fully possible, as shown by works of Z. Saloni (2002 and A.Przepiórkowski (2008.

  18. Project Prometheus and Future Entry Probe Missions

    Science.gov (United States)

    Spilker, Thomas R.

    2005-01-01

    A viewgraph presentation on project Prometheus and future entry probe missions is shown. The topics include: 1) What Is Project Prometheus?; 2) What Capabilities Can Project Prometheus Offer? What Mission Types Are Being Considered?; 3) Jupiter Icy Moons Orbiter (JIMO); 4) How Are Mission Opportunities Changing?; 5) Missions Of Interest a Year Ago; 6) Missions Now Being Considered For Further Study; 7) Galileo-Style (Conventional) Probe Delivery; 8) Galileo-Style Probe Support; 9) Conventional Delivery and Support of Multiple Probes; 10) How Entry Probe Delivery From an NEP Vehicle Is Different; and 11) Concluding Remarks.

  19. "Generic Entry and the Pricing of Pharmaceuticals"

    OpenAIRE

    Frank, Richard G.; David S. Salkever

    1995-01-01

    During the 1980s the share of prescriptions sold by retail pharmacies that was accounted for by generic products roughly doubled. The price response to generic entry of brand-name products has been a source of controversy. In this paper we estimate models of price responses to generic entry in the market for brand-name and generic drugs. We study a sample of 32 drugs that lost patent protection during the early to mid-1980s. Our results provide strong evidence that brand-name prices increase ...

  20. Cyberbullying sensitivity and awareness among entry-level university students

    Directory of Open Access Journals (Sweden)

    Rıdvan Ata

    2016-10-01

    Full Text Available With increased usage of the Internet and social media, cyberbullying among young people has recently come to the fore worldwide, and Turkey has seen no exception to this. The numbers of young people subjected to bullying on digital platforms increases daily, which has a significant impact on their lives. It is therefore vital to raise awareness about cyberbullying, both in terms of taking precautions against its threats and to foster behavioural changes that may lead to reduced exposure to cyberbullying. The purpose of this study is to investigate entry level university students’ past and present experiences of cyberbullying, specifically within digital social environments. A survey method was adopted, with participation of entry level undergraduate students from various departments of a public university in Turkey during the 2015-2016 academic year. The ‘Cyberbullying Sensitivity Scale’, developed by Tanrıkulu, Kınay, and Arıcak (2013, was the instrument applied. Findings from the study aim to shed light on the current status of sensitivity and awareness about cyberbullying, with important implications for the introduction and fostering of healthier and more informed use of information and communication technologies.

  1. 75 FR 22695 - Establishment of Class E Airspace; Bonners Ferry, ID

    Science.gov (United States)

    2010-04-30

    ... Federal Aviation Administration 14 CFR Part 71 Establishment of Class E Airspace; Bonners Ferry, ID AGENCY... E airspace at Bonners Ferry, ID, to accommodate aircraft using a new Area Navigation (RNAV) Global... improve the safety and management of Instrument Flight Rules (IFR) operations at the airport. DATES...

  2. The Mathematica package TopoID and its application to the Higgs boson production cross section

    Energy Technology Data Exchange (ETDEWEB)

    Hoff, Jens

    2016-07-15

    We present the Mathematica package TopoID which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of TopoID are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  3. Id2a is required for hepatic outgrowth during liver development in zebrafish.

    Science.gov (United States)

    Khaliq, Mehwish; Choi, Tae-Young; So, Juhoon; Shin, Donghun

    2015-11-01

    During development, inhibitor of DNA binding (Id) proteins, a subclass of the helix-loop-helix family of proteins, regulate cellular proliferation, differentiation, and apoptosis in various organs. However, a functional role of Id2a in liver development has not yet been reported. Here, using zebrafish as a model organism, we provide in vivo evidence that Id2a regulates hepatoblast proliferation and cell death during liver development. Initially, in the liver, id2a is expressed in hepatoblasts and after their differentiation, id2a expression is restricted to biliary epithelial cells. id2a knockdown in zebrafish embryos had no effect on hepatoblast specification or hepatocyte differentiation. However, liver size was greatly reduced in id2a morpholino-injected embryos, indicative of a hepatic outgrowth defect attributable to the significant decrease in proliferating hepatoblasts concomitant with the significant increase in hepatoblast cell death. Altogether, these data support the role of Id2a as an important regulator of hepatic outgrowth via modulation of hepatoblast proliferation and survival during liver development in zebrafish.

  4. Manual of spIds, a software package for parameter identification in dynamic systems

    NARCIS (Netherlands)

    Everaars, C.T.H.; Hemker, P.W.; Stortelder, W.J.H.

    1995-01-01

    This report contains the manual of spIds, version 1.0, a software package for parameter identification in dynamic systems. SpIdslabel{ab:spIds is an acronym of underline{simulation and underline{parameter underline{identification in underline{dynamic underline {systems. It can be applied on wide var

  5. 81 FR 16198 - Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington Counties, ID, and...

    Science.gov (United States)

    2016-03-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Fish and Wildlife Service Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington..., 1010 Dearborn St., Caldwell, ID 83605. Homedale Public Library, 125 W Owyhee Ave., Homedale, ID...

  6. 75 FR 41232 - Deer Flat National Wildlife Refuge, Canyon, Owyhee, Payette, and Washington Counties, ID; Malheur...

    Science.gov (United States)

    2010-07-15

    ... Fish and Wildlife Service Deer Flat National Wildlife Refuge, Canyon, Owyhee, Payette, and Washington...). The Refuge has units located in Canyon, Owyhee, Payette, and Washington Counties, ID, and Malheur... the Snake River located in Canyon, Payette, Owyhee, and Washington Counties in ID; and Malheur...

  7. Ubiquitin-SUMO Circuitry Controls Activated Fanconi Anemia ID Complex Dosage in Response to DNA Damage

    DEFF Research Database (Denmark)

    Gibbs-Seymour, Ian; Oka, Yasuyoshi; Rajendra, Eeson

    2015-01-01

    We show that central components of the Fanconi anemia (FA) DNA repair pathway, the tumor suppressor proteins FANCI and FANCD2 (the ID complex), are SUMOylated in response to replication fork stalling. The ID complex is SUMOylated in a manner that depends on the ATR kinase, the FA ubiquitin ligase...

  8. 75 FR 47515 - Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other...

    Science.gov (United States)

    2010-08-06

    ... Services, Their Dependents, and Other Eligible Individuals AGENCY: Office of the Under Secretary of Defense... DoD ID cards. The ID cards shall be issued to uniformed service members, their dependents, and other.... The general policy for comments and other submissions from members of the public is to make...

  9. Wicked ID: Conceptual Framework for Considering Instructional Design as a Wicked Problem

    Science.gov (United States)

    Becker, Katrin

    2007-01-01

    The process of instructional design has parallels in other design disciplines. Software design is one that has experienced intense attention in the last 30 or so years, and many lessons learned there can be applied to ID. Using software design as a springboard, this concept paper seeks to propose a new approach to ID. It suggests that…

  10. The ID23-2 structural biology microfocus beamline at the ESRF

    Energy Technology Data Exchange (ETDEWEB)

    Flot, David, E-mail: flot@esrf.fr [European Molecular Biology Laboratory, 6 rue Jules Horowitz, BP 181, 38042 Grenoble (France); Mairs, Trevor; Giraud, Thierry; Guijarro, Matias; Lesourd, Marc; Rey, Vicente; Brussel, Denis van; Morawe, Christian; Borel, Christine; Hignette, Olivier; Chavanne, Joel; Nurizzo, Didier; McSweeney, Sean; Mitchell, Edward [European Synchrotron Radiation Facility, 6 rue Jules Horowitz, BP 181, 38043 Grenoble (France)

    2010-01-01

    Beamline ID23-2, the first dedicated and highly automated high-throughput monochromatic macromolecular crystallography microfocus beamline, is described. The first phase of the ESRF beamline ID23 to be constructed was ID23-1, a tunable MAD-capable beamline which opened to users in early 2004. The second phase of the beamline to be constructed is ID23-2, a monochromatic microfocus beamline dedicated to macromolecular crystallography experiments. Beamline ID23-2 makes use of well characterized optical elements: a single-bounce silicon (111) monochromator and two mirrors in Kirkpatrick–Baez geometry to focus the X-ray beam. A major design goal of the ID23-2 beamline is to provide a reliable, easy-to-use and routine microfocus beam. ID23-2 started operation in November 2005, as the first beamline dedicated to microfocus macromolecular crystallography. The beamline has taken the standard automated ESRF macromolecular crystallography environment (both hardware and software), allowing users of ID23-2 to be rapidly familiar with the microfocus environment. This paper describes the beamline design, the special considerations taken into account given the microfocus beam, and summarizes the results of the first years of the beamline operation.

  11. Extending the Intermediate Data Structure (IDS for longitudinal historical databases to include geographic data

    Directory of Open Access Journals (Sweden)

    Finn Hedefalk

    2014-09-01

    Full Text Available The Intermediate Data Structure (IDS is a standardised database structure for longitudinal historical databases. Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. The geographic data that will be stored in IDS-Geo are primarily buildings and/or property units, and the purpose of these geographic data is mainly to link individuals to places in space. When we want to assign such detailed spatial locations to individuals (in times before there were any detailed house addresses available, we often have to create tailored geographic datasets. In those cases, there are benefits of storing geographic data in the same structure as the demographic data. Moreover, we propose the export of data from IDS-Geo using an eXtensible Markup Language (XML Schema. IDS-Geo is implemented in a case study using historical property units, for the period 1804 to 1913, stored in a geographically extended version of the Scanian Economic Demographic Database (SEDD. To fit into the IDS-Geo data structure, we included an object lifeline representation of all of the property units (based on the snapshot time representation of single historical maps and poll-tax registers. The case study verifies that the IDS-Geo model is capable of handling geographic data that can be linked to demographic data.

  12. Sexual abuse involving children with an intellectual disability (ID): a narrative review

    NARCIS (Netherlands)

    Wissink, I.B.; van Vugt, E.S.; Moonen, X.; Stams, G.J.J.M.; Hendriks, J.

    2015-01-01

    The current paper provides a narrative review of the literature on sexual abuse, involving children with Intellectual Disability (ID). The thirteen articles that were found and met our criteria vary in their definitions of sexual abuse and in how ID was determined. Still, they do paint a general pic

  13. Overexpression of Id1 in transgenic mice promotes mammary basal stem cell activity and breast tumorigenesis.

    Science.gov (United States)

    Shin, Dong-Hui; Park, Ji-Hye; Lee, Jeong-Yeon; Won, Hee-Young; Jang, Ki-Seok; Min, Kyueng-Whan; Jang, Si-Hyong; Woo, Jong-Kyu; Oh, Seung Hyun; Kong, Gu

    2015-07-10

    Inhibitor of differentiation/DNA binding (Id)1 is a crucial regulator of mammary development and breast cancer progression. However, its effect on stemness and tumorigenesis in mammary epithelial cells remains undefined. Herein, we demonstrate that Id1 induces mammary tumorigenesis by increasing normal and malignant mammary stem cell (MaSC) activities in transgenic mice. MaSC-enriched basal cell expansion and increased self-renewal and in vivo regenerative capacity of MaSCs are observed in the mammary glands of MMTV-Id1 transgenic mice. Furthermore, MMTV-Id1 mice develop ductal hyperplasia and mammary tumors with highly expressed basal markers. Id1 also increases breast cancer stem cell (CSC) population and activity in human breast cancer lines. Moreover, the effects of Id1 on normal and malignant stem cell activities are mediated by the Wnt/c-Myc pathway. Collectively, these findings provide in vivo genetic evidence of Id1 functions as an oncogene in breast cancer and indicate that Id1 regulates mammary basal stem cells by activating the Wnt/c-Myc pathway, thereby contributing to breast tumor development.

  14. Cloning and shake flask expression of hrIDS-Like in Pichia pastoris

    African Journals Online (AJOL)

    STORAGESEVER

    2009-06-17

    Jun 17, 2009 ... characterized by a wide spectrum of clinical manifesta- tions, ranging from mild to ... The native IDS processing has been studied after .... the membrane was incubated overnight with a monoclonal antibody anti-IDS (1:250 in ...

  15. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  16. Clarté des idées innées ?

    DEFF Research Database (Denmark)

    Schøsler, Jørn

    2013-01-01

    Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer.......Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer....

  17. 76 FR 9266 - Proposed Amendment of Class D and Class E Airspace; Idaho Falls, ID

    Science.gov (United States)

    2011-02-17

    ... Falls, ID AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of proposed rulemaking (NPRM). SUMMARY: This action proposes to amend the Class D and Class E airspace areas at Idaho Falls, ID, by changing the name of the airport to Idaho Falls Regional Airport, and adjusting the...

  18. 76 FR 28306 - Amendment of Class D and Class E Airspace; Idaho Falls, ID

    Science.gov (United States)

    2011-05-17

    ... Federal Aviation Administration 14 CFR Part 71 Amendment of Class D and Class E Airspace; Idaho Falls, ID... existing Class D and Class E airspace at Idaho Falls, ID, by changing the name of the airport to Idaho Falls Regional Airport, and adjusting the geographic coordinates of the airport. This action also...

  19. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ... Federal Aviation Administration 14 CFR Part 71 Proposed Modification of Class E Airspace; Twin Falls, ID...: This action proposes to modify Class E airspace at Twin Falls Joslin Field-Magic Valley Regional Airport, Twin Falls, ID. Controlled airspace is necessary to accommodate aircraft using the...

  20. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... Federal Aviation Administration 14 CFR Part 71 Modification of Class D and E Airspace; Twin Falls, ID... Class E airspace at Twin Falls Joslin Field-Magic Valley Regional Airport, Twin Falls, ID, to... areas, as well as corrects the airport name to Twin Falls Joslin Field-Magic Valley Regional...

  1. 77 FR 56241 - Board Meeting; October 17, 2012; Idaho Falls, ID

    Science.gov (United States)

    2012-09-12

    ... REVIEW BOARD Board Meeting; October 17, 2012; Idaho Falls, ID The U.S. Nuclear Waste Technical Review... 1987, the U.S. Nuclear Waste Technical Review Board will hold a public meeting in Idaho Falls, Idaho... Board meeting will be held at the Hilton Garden Inn, 700 Lindsay Boulevard, Idaho Falls, ID 83402;...

  2. Long-range optical character recognition for product ID

    Science.gov (United States)

    Banta, Larry E.; Pertl, Franz A.; Rosenberry-Friend, Kimberly A.

    1998-10-01

    An automated product tag reading system based on CCD cameras and computer image processing has been developed by West Virginia University and demonstrated at the Weirton Steel Corporation. The system reads both a 50-mil barcode and a string of six numbers on a four-inch by six-inch tag fastened to the end of a steel slab. Feedback from the image is used to point and zoom the camera, making the system effective at ranges up to thirty feet, and in bright sunlight-situations where handheld barcode scanners are ineffective. A video camera is mounted on a pan/tilt head and connected to a personal computer through a frame grabber board. The whole system is mounted on a slab hauler--a huge wheeled machine for carrying 100 tons of steel slabs at a time. The slab hauler backs into position and presses `start' on a touchscreen operator interface. A wide-angle image is grabbed, and the computer analyzes the images to find product ID tags in scene. The camera is then zoomed and pointed one-by-one at the tags for closeup images. Geometric warping is done on the closeup images to correct for viewing angle distortion, and both the barcode and the alphanumeric code are read by the software and reported to the inventory management system via radio modern. This paper discusses the neural network-based system for reading the characters on the tag. The camera pointing system and barcode reader are discussed in a companion paper.

  3. Position-optimization on retained entry and backfilling wall in gob-side entry retaining techniques

    Institute of Scientific and Technical Information of China (English)

    Xiaowei Feng; Nong Zhang

    2015-01-01

    This study investigates the stability problem of gob-side entry retaining (GER) and backfilling wall which located under the key block B. Based on the combined research of elastic–plastic mechanics, structure mechanics and modern theory of mining-induced pressure, the caving characteristic and roof structure over the GER were analyzed, and the vertical force and the torque on retained entry roof were also derived as the position for the retained entry varies. On the basis of the specific geology in Huainan mining area, the results indicate that a relatively more stable position for retained entry neighbors the hinge point of block A and B, and it also located at a scope ranging from this point to the one-third length of block B in horizontal direction. As to appropriate position for backfilling wall, this study recommends partial-road-in backfilling method for GER. Field trial conducted at panel face 12418 of Xieqiao Mine demonstrates that the recommended width for original entry is 3.6 m and the preferred width proportion between original retained entry and original entry is 75%or so whereas the avoidable one is 88%or so. These findings provide qualitative references to the mines which share similar geology as what Huainan mining area characterized.

  4. ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications.

  5. A Survey of Artificial Immune System Based Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Hua Yang

    2014-01-01

    Full Text Available In the area of computer security, Intrusion Detection (ID is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS. The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs. This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  6. ID3算法在汽车售后服务中的应用%Application of ID3 Algorithm in Automotive After-sale Service

    Institute of Scientific and Technical Information of China (English)

    郭春丽; 李明东; 赵刚

    2011-01-01

    Decision tree algorithm has been successfully applied in much classification issue.ID3 algorithm is the representative algorithm.The application of algorithm has been given an instance study for the analysis of the customer features in the automotive after-sale service.Describing the principle and implementation of the ID3 algorithm and analyzing the features of the clients,also explaining concretely the approach of how to use ID3 to manage the clients in the automotive after-sale service.At the end,setting up the customer characteristics analysis model of automotive after-sale services.Through those strategies,the companies can realize the maximization of their total profits.%决策树算法被成功应用到很多分类问题上,其中ID3算法是其典型算法.文中就该算法在汽车售后服务企业客户特征分析中的应用做了实例研究.阐述了ID3算法的原理以及实现算法,分析了客户的特征.以一个具体的案例讲解了ID3算法在汽车售后服务企业中客户管理的具体应用流程.文中实现ID3算法作用于汽车售后客户的数据,得到一个客户特征分析模型,可以帮助汽车企业根据不同特征的客户采取不同的策略,从而获得较大利润.

  7. Olympic athletes’ job market entry strategies. A typology

    Directory of Open Access Journals (Sweden)

    Anna Vilanova

    2017-05-01

    Full Text Available The aim of this study was to establish a typology of job market entry strategies among Olympic athletes. Guided by rational choice theory and social reproduction theory, we conducted a telephone survey among 94 athletes (68 men and 26 women. Hierarchical cluster analysis was used to identify four distinct groups, which we called parallel life strategists, freelance strategists, lifetime athletes, and non-strategists: it’s a job. The results show that athletes from families with greater economic and cultural capital implement career transition strategies further in advance and achieve greater career success and satisfaction. These findings can be used to develop support programs tailored to the needs of athletes according to their profile.

  8. Id-1 promotes osteosarcoma cell growth and inhibits cell apoptosis via PI3K/AKT signaling pathway

    Energy Technology Data Exchange (ETDEWEB)

    Hao, Liang; Liao, Qi; Tang, Qiang [Department of Orthopaedic Surgery, The Second Affiliated Hospital of Nanchang University, Nanchang 300006 (China); Deng, Huan [Department of Pathology, The Fourth Affiliated Hospital of Nanchang University, Nanchang 330006 (China); Chen, Lu, E-mail: chenlu0578@163.com [Department of Orthopaedic Surgery, The Second Affiliated Hospital of Nanchang University, Nanchang 300006 (China)

    2016-02-12

    Accumulating evidence reveals that Id-1 is upregulated and functions as a potential tumor promoter in several human cancer types. However, the role of Id-1 in osteosarcoma (OS) is unknown. In present study, we found that Id-1 expression was elevated in OS tissues than adjacent normal bone tissues. More importantly, we demonstrated that overexpression of Id-1 is significantly correlated with tumor progression and poor survival in OS patients. Furthermore, increased expression of Id-1 was observed in OS cell lines and ectopic expression of Id-1 significantly enhanced in vitro cell proliferation and promoted in vivo tumor growth, whereas knockdown of Id-1 suppressed OS cells growth. Moreover, our experimental data revealed that Id-1 promotes cell proliferation by facilitating cell cycle progression and inhibits cell apoptosis. Mechanistically, the effects of Id-1 in OS cells is at least partly through activation of PI3K/Akt signaling pathway. Therefore, we identified a tumorigenic role of Id-1 in OS and suggested a potential therapeutic target for OS patients. - Highlights: • Id-1 expression is positively correlated in OS patients with poor prognosis. • Overexpression of Id-1 promotes OS cell growth in vitro and in vivo. • Id-1induces cell cycle progression and inhibits cell apoptosis. • PI3K/Akt signaling pathway contributed to the oncogenic effects of Id-1 in OS cells.

  9. Postings recent entries from our blogs

    CERN Multimedia

    Tierney, John

    2008-01-01

    you have any brilliant predictions for either 2008 or 2108, I'd like to offer you a prize (a copy of James Rasenberger's book ''America 1908''). But I can guarantee delivery only for the 2008 winner. Kyle replies: My prediction is that researchers and scientists will finally find a cure for Alzheimer's Disease [in 2008]. Ian T replies: Mammoths will see the light of day again.

  10. Civil Technology. Surveying. Post Secondary Curriculum Guide.

    Science.gov (United States)

    Fitzpatrick, Beverley J.; And Others

    This curriculum guide was designed for use in postsecondary civil technology--surveying education programs in Georgia. Its purpose is to provide for development of entry level skills in surveying in the areas of knowledge, theoretical structure, tool usage, diagnostic ability, related supportive skills, and occupational survival skills. The first…

  11. 19 CFR 4.8 - Preliminary entry.

    Science.gov (United States)

    2010-04-01

    ... electronic equivalent of a complete Customs Form 1302 (Cargo Declaration), in the manner provided in § 4.7(b... 19 Customs Duties 1 2010-04-01 2010-04-01 false Preliminary entry. 4.8 Section 4.8 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE...

  12. 19 CFR 145.25 - Entry correct.

    Science.gov (United States)

    2010-04-01

    ... director believes the duty originally assessed was correct, he shall send the addressee a notice in writing... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry correct. 145.25 Section 145.25 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE...

  13. Continuous Aerodynamic Modelling of Entry Shapes

    NARCIS (Netherlands)

    Dirkx, D.; Mooij, E.

    2011-01-01

    During the conceptual design phase of a re-entry vehicle, the vehicle shape can be varied and its impact on performance evaluated. To this end, the continuous modeling of the aerodynamic characteristics as a function of the shape is useful in exploring the full design space. Local inclination method

  14. Radon entry into a simple test structure

    DEFF Research Database (Denmark)

    Andersen, C.E.; Søgaard-Hansen, J.; Majborn, B.

    1992-01-01

    A simple test structure for studies of radon entry into houses has been constructed at a field site at Riso National Laboratory. It consists of a 40 1, stainless-steel cylinder placed in a 0.52 m deep quadratic excavation with a side length of 2.4 m. The excavation is lined with an airtight...

  15. Flavivirus cell entry and membrane fusion

    NARCIS (Netherlands)

    Smit, Jolanda M.; Moesker, Bastiaan; Rodenhuis-Zybert, Izabela; Wilschut, Jan

    2011-01-01

    Flaviviruses, such as dengue virus and West Nile virus, are enveloped viruses that infect cells through receptor-mediated endocytosis and fusion from within acidic endosomes. The cell entry process of flaviviruses is mediated by the viral E glycoprotein. This short review will address recent advance

  16. Processes with multiple entries and exits

    NARCIS (Netherlands)

    Bergstra, J.A.; Stefanescu, G.

    1995-01-01

    This paper is an attempt to integrate the algebra of communicating processes (ACP) and the algebra of flownomials (AF). Basically, this means to combine axiomatized parallel and looping operators. To this end we introduce a model of process graphs with multiple entries and exits. In this model the u

  17. HIV-1 Entry Inhbitors: An Overview

    Science.gov (United States)

    Kuritzkes, Daniel R.

    2009-01-01

    Purpose of review This review provides an overview of HIV-1 entry inhibitors, with a focus on chemokine receptor antagonists. Recent findings Entry of HIV-1 into target cells is an ordered multi-step process involving attachment, co-receptor binding and fusion. Inhibitors of each step have been identified and shown to have antiviral activity in clinical trials. Phase 1-2 trials of monoclonal antibodies and small-molecule attachment inhibitors have demonstrated activity in HIV-1-infected subjects, but none has progressed to later phase clinical trials. The post-attachment inhibitor ibalizumab has shown activity in phase 1 and 2 trials; further studies are anticipated. The CCR5 antagonists maraviroc (now been approved for clinical use) and vicriviroc (in phase 3 trials) have shown significant benefit in controlled trials in treatment-experienced subjects; additional CCR5 antagonists are in various stages of clinical development. Targeting CXCR4 has proven to be more challenging. Although proof of concept has been demonstrated in phase 1-2 trials of two compounds, neither proved suitable for chronic administration. Little progress has been reported in developing longer acting or orally bioavailable fusion inhibitors. Summary ACCR5 antagonist and a fusion inhibitor are approved for use as HIV-1 entry inhibitors. Development of drugs targeting other steps in HIV-1 entry is ongoing. PMID:19339945

  18. Duopoly Dynamics with a Barrier to Entry

    NARCIS (Netherlands)

    Abbring, J.H.; Campbell, Jeffrey R.

    2007-01-01

    This paper considers the effects of raising the cost of entry for a potential competitor on infinite-horizon Markov-perfect duopoly dynamics with ongoing demand uncertainty. All entrants serving the model industry incur sunk costs, and exit avoids future fixed costs. We focus on the unique equilibri

  19. Entry modes of European firms in Vietnam

    Directory of Open Access Journals (Sweden)

    Daniel Simonet

    2012-09-01

    Full Text Available Purpose: The purpose of the paper is to explore the entry modes of EU firms setting up operations in Vietnam. Design/methodology/approach: we use a case study approach on Haymarket, Cadbury, Creative Education, Fairchild, Aventis and Artemisinin and Farming International using interviews from managerial professionals in Vietnam. Findings: Despite the fact that Vietnam has been opening up for more than 20 years, licensing is the preferred entry mode because of the risks involved in venturing with local firms; that preference signals a low level commitment and a high perception of risk and state interference. In line with Vietnam transition to state - rather than private market - capitalism, a foreign company opting for a joint-venture will do so with a state-owned rather than privately-owned company. The choice of a subsidiary can be explained by the lack of trust in partners and institutions, not by improvement in the socio-political environment. Limitations: In determining the entry mode strategy, the paper focuses on the Uppsala school’s “psychic distance” (e.g. cultural distance, lack of trust rather than on firm-specific advantages (Rugman, 1980; 2006. Key-words: international entry mode; emerging markets; subsidiary; joint-venture; India; Vietnam

  20. Internet portals as portfolios of entry options

    NARCIS (Netherlands)

    Perotti, E.C.; Rossetto, S.

    2000-01-01

    We investigate the valuation of platform investment, such as a software operating system or an Internet portal WebPage. Platform investment is the creation of an innovative distribution and production infrastructure, which increases access to customers; as a result it reduces entry costs in related

  1. Internet portals as portfolios of entry options

    NARCIS (Netherlands)

    Perotti, E.C.; Rossetto, S.

    2000-01-01

    We investigate the valuation of platform investment, such as a software operating system or an Internet portal WebPage. Platform investment is the creation of an innovative distribution and production infrastructure, which increases access to customers; as a result it reduces entry costs in related

  2. Flavivirus cell entry and membrane fusion

    NARCIS (Netherlands)

    Smit, Jolanda M.; Moesker, Bastiaan; Rodenhuis-Zybert, Izabela; Wilschut, Jan

    2011-01-01

    Flaviviruses, such as dengue virus and West Nile virus, are enveloped viruses that infect cells through receptor-mediated endocytosis and fusion from within acidic endosomes. The cell entry process of flaviviruses is mediated by the viral E glycoprotein. This short review will address recent advance

  3. Foreign Entry and Heterogeneous Growth of Firms

    DEFF Research Database (Denmark)

    Deng, Paul Duo; Jefferson, Gary H.

    distance from foreign firms. Domestic firms with smaller technological distance from their foreign counterparts tend to experience faster productivity growth, while firms with larger technological distance tend to lag further behind. We test this hypothesis using a unique firm-level data of Chinese...... manufacturing. Our empirical results confirm that foreign entry indeed generates strong heterogeneous growth patterns among domestic firms....

  4. Pragmatic evaluation of the Toyota Production System (TPS analysis procedure for problem solving with entry-level nurses

    Directory of Open Access Journals (Sweden)

    Lukasz Maciej Mazur

    2008-12-01

    Full Text Available Medication errors occurring in hospitals are a growing national concern. These medication errors and their related costs (or wastes are seen as major factors leading to increased patient safety risks and increased waste in the hospital setting.  This article presents a study in which sixteen entry-level nurses utilized a Toyota Production System (TPS analysis procedure to solve medication delivery problems at one community hospital. The objective of this research was to study and evaluate the TPS analysis procedure for problem solving with entry-level nurses. Personal journals, focus group discussions, and a survey study were used to collect data about entry-level nurses’ perceptions of using the TPS problem solving approach to study medication delivery. A regression analysis was used to identify characteristics that enhance problem solving efforts. In addition, propositions for effective problem solving by entry-level nurses to aid in the reduction of medication errors in healthcare delivery settings are offered.

  5. Heatshield for Extreme Entry Environment Technology (HEEET) Development Status

    Science.gov (United States)

    Ellerby, Don; Gage, Peter; Kazemba, Cole; Mahzari, Milad; Nishioka, Owen; Peterson, Keith; Stackpoole, Mairead; Venkatapathy, Ethiraj; Young, Zion; Poteet, Carl; Splinter, Scott; Fowler, Mike; Kellerman, Charles

    2016-01-01

    The Heat shield for Extreme Entry Environment Technology (HEEET) Project is a NASA STMD and SMD co-funded effort. The goal is to develop and mission infuse a new ablative Thermal Protection System that can withstand extreme entry. It is targeted to support NASAs high priority missions, as defined in the latest decadal survey, to destinations such as Venus and Saturn in-situ robotic science missions. Entry into these planetary atmospheres results in extreme heating. The entry peak heat-flux and associated pressure are estimated to be between one and two orders of magnitude higher than those experienced by Mars Science Laboratory or Lunar return missions. In the recent New Frontiers community announcement NASA has indicated that it is considering providing an increase to the PI managed mission cost (PIMMC) for investigations utilizing the Heat Shield for Extreme Entry Environment Technology (HEEET) and in addition, NASA is considering limiting the risk assessment to only their accommodation on the spacecraft and the mission environment. The HEEET ablative TPS utilizes 3D weaving technology to manufacture a dual layer material architecture. The 3-D weaving allows for flat panels to be woven. The dual layer consists of a top layer designed to withstand the extreme external environment while the inner or insulating layer by design, is designed to achieve low thermal conductivity, and it keeps the heat from conducting towards the structure underneath. Both arc jet testing combined with material properties have been used to develop thermal response models that allows for comparison of performance with heritage carbon phenolic. A 50 mass efficiency is achieved by the dual layer construct compared to carbon phenolic for a broad range of missions both to Saturn and Venus. The 3-D woven flat preforms are molded to achieve the shape as they are compliant and then resin infusion with curing forms a rigid panels. These panels are then bonded on to the aeroshell structure. Gaps

  6. Tobacco outlet density, retailer cigarette sales without ID checks and enforcement of underage tobacco laws: associations with youths' cigarette smoking and beliefs.

    Science.gov (United States)

    Lipperman-Kreda, Sharon; Grube, Joel W; Friend, Karen B; Mair, Christina

    2016-03-01

    To estimate the relationships of tobacco outlet density, cigarette sales without ID checks and local enforcement of underage tobacco laws with youth's life-time cigarette smoking, perceived availability of tobacco and perceived enforcement of underage tobacco laws and changes over time. The study involved: (a) three annual telephone surveys, (b) two annual purchase surveys in 2000 tobacco outlets and (c) interviews with key informants from local law enforcement agencies. Analyses were multi-level models (city, individual, time). A sample of 50 mid-sized non-contiguous cities in California, USA. A total of 1478 youths (aged 13-16 at wave 1, 52.2% male); 1061 participated in all waves. Measures at the individual level included life-time cigarette smoking, perceived availability and perceived enforcement. City-level measures included tobacco outlet density, cigarette sales without ID checks and compliance checks. Outlet density was associated positively with life-time smoking [OR = 1.12, P smoking at the earlier waves when respondents were younger. Greater density was associated positively with perceived availability (β = 0.02, P smoking among youths. Density, sales without ID checks and enforcement levels may influence beliefs about access to cigarettes and enforcement of underage tobacco sales laws. © 2015 Society for the Study of Addiction.

  7. Bio-fortification and shelf-life extension of idli batter using curry leaves (Murraya koenigii).

    Science.gov (United States)

    Chelliah, R; Ramakrishnan, S R; Premkumar, D; Antony, U

    2016-06-01

    Among several traditional foods of India, idli is one of the most popular and commonly consumed steamed products. A new method of adding Murraya koenigii (curry leaves) to idli batter as a vehicle for fortification and extension of shelf-life has been developed. Dried curry leaves powder was incorporated with other ingredients like rice and dehusked black gram in different proportions to optimize the most palatable formulation. Rate of fermentation and microbial changes in the batter; nutritional qualities, texture and sensory properties of the prepared product were assessed. Incorporation of curry leaves powder (5 %) in idli batter increased the shelf-life and also increased the flavour, texture and appearance of the idli. The calcium content of the prepared idli was 10 times more than that of the control idli, while dietary fiber content increased by 18.6 %. Anti-microbial activity of the curry leaves in idli batter extended the shelf-life from 2 to 5 days when stored at 30 °C.

  8. Smad3 mediates immediate early induction of Id1 by TGF-β

    Institute of Scientific and Technical Information of China (English)

    Yao-Yun Liang; F Charles Brunicardi; Xia Lin

    2009-01-01

    Id1 is a member of the inhibitor of diflferentiation(Id) protein family that regulates a wide range of cell functions.Previous studies have shown that expression of the ID1 gene is down-regulated by TGF-β in epithelial cells,whereas it is up-regulated by BMP in a variety of cell types.During our study of the biological function of TGF-β1,we found that ldl can be strongly up-regulated by TGF-β1 in the human mammary gland epithelial cell line MCF10A.Quanti-taftve real-time RT-PCR has revealed as high as 7.5-fold induction of ID1 mRNA by TGF-β1 in MCFlOA cells after 1 h of TGF-β1 stimulation,and this induction does not require de novo protein synthesis.Using Smad knockdown and knockout approaches.we have identiffed Smad3 as the responsible R-Smad for mediating transcriptional activation of the Id1 gene.Chromatin immunoprecipitation assay confirms that Smad3 and Smad4 bind to the upstream region of the Id1 gene.Our resuIts demonstrate that Smad3,but not Smad2,mediates TGF-β1-dependent early transcrip-tional induction of Id1.

  9. Id1 restrains p21 expression to control endothelial progenitor cell formation.

    Directory of Open Access Journals (Sweden)

    Alessia Ciarrocchi

    Full Text Available Loss of Id1 in the bone marrow (BM severely impairs tumor angiogenesis resulting in significant inhibition of tumor growth. This phenotype has been associated with the absence of circulating endothelial progenitor cells (EPCs in the peripheral blood of Id1 mutant mice. However, the manner in which Id1 loss in the BM controls EPC generation or mobilization is largely unknown. Using genetically modified mouse models we demonstrate here that the generation of EPCs in the BM depends on the ability of Id1 to restrain the expression of its target gene p21. Through a series of cellular and functional studies we show that the increased myeloid commitment of BM stem cells and the absence of EPCs in Id1 knockout mice are associated with elevated p21 expression. Genetic ablation of p21 rescues the EPC population in the Id1 null animals, re-establishing functional BM-derived angiogenesis and restoring normal tumor growth. These results demonstrate that the restraint of p21 expression by Id1 is one key element of its activity in facilitating the generation of EPCs in the BM and highlight the critical role these cells play in tumor angiogenesis.

  10. Engagement of membrane immunoglobulin enhances Id3 promoter activity in WEHI-231 B lymphoma cells

    Institute of Scientific and Technical Information of China (English)

    Xiao-jun LI; Kikumi HATA; Junichiro MIZUGUCHI

    2005-01-01

    Aim: We have recently shown that engagement of membrane immunoglobulin (mIg) induced upregulation of inhibitor of differentiation 3 (Id3) mRNA, resulting in growth arrest at G1 phase in WEHI-231 cells. In the present study, we examined whether engagement of mIg will affect promoter activity of the Id3 gene in WEHI231 cells. Methods: DNA fragments corresponding to the 5′-flanking region of mId3 gene were amplified by polymerase chain reaction (PCR) using genomic DNA as the template. Three DNA fragments upstream of the transcription start site (+ 1) of the mId3 gene were subcloned into the luciferase reporter vector PGVB2. The recombinant constructs were transiently transfected into WEHI-231 cells by an electroporation method. After incubation for 24 h, WEHI-231 cells were stimulated with 10 mg/L anti-IgM or irradiated CD40L-expressing NIH3T3 cells or control NIH3T3 cells for further 24 h, followed by assay for luciferase activity. Results: The luciferase analysis demonstrated that basal promoter activity of the Id3 gene was found in the region between -200 and +54. The Id3 promoter activity was increased 2-fold following stimulation with anti-IgM, but not CD40L, compared with medium alone. Conclusion: The mIg-mediated upregulation of Id3 expression is controlled, at least in part, through transcriptional regulation, as assessed by luciferase assay.

  11. Assessment of elderly people on entry to residential homes and continuing care arrangements.

    Science.gov (United States)

    Hoad-Reddick, G

    1992-08-01

    Increasing numbers of elderly people are entering private residential homes in the UK. Results of surveys show poor oral health in this group. A survey was therefore conducted of 50 residential homes (housing 1337 residents) to determine assessment on entry and continuing care provision. In 38 per cent of homes no written notes were made of the initial assessment. Topics of dental interests were infrequently assessed on entry (only 16 per cent of carers examined the oral cavity, 52 per cent assessed the subject's ability to care for their dentures). Medical topics (mobility, incontinence, eyesight, etc) were all assessed in more than 80 per cent of subjects. Suggestions are made for utilization of an easy assessment questionnaire and improved denture naming arrangements. The importance of regular check-ups, education and publicity for this group is stressed.

  12. Analytic Guidance for the First Entry in a Skip Atmospheric Entry

    Science.gov (United States)

    Garcia-Llama, Eduardo

    2007-01-01

    This paper presents an analytic method to generate a reference drag trajectory for the first entry portion of a skip atmospheric entry. The drag reference, expressed as a polynomial function of the velocity, will meet the conditions necessary to fit the requirements of the complete entry phase. The generic method proposed to generate the drag reference profile is further simplified by thinking of the drag and the velocity as density and cumulative distribution functions respectively. With this notion it will be shown that the reference drag profile can be obtained by solving a linear algebraic system of equations. The resulting drag profile is flown using the feedback linearization method of differential geometric control as guidance law with the error dynamics of a second order homogeneous equation in the form of a damped oscillator. This approach was first proposed as a revisited version of the Space Shuttle Orbiter entry guidance. However, this paper will show that it can be used to fly the first entry in a skip entry trajectory. In doing so, the gains in the error dynamics will be changed at a certain point along the trajectory to improve the tracking performance.

  13. An Improved ID3 Decision Tree Mining Algorithm%一种改进 ID3型决策树挖掘算法

    Institute of Scientific and Technical Information of China (English)

    潘大胜; 屈迟文

    2016-01-01

    By analyzing the problem of ID3 decision tree mining algorithm,the entropy calculation process is improved, and a kind of improved ID3 decision tree mining algorithm is built.Entropy calculation process of decision tree is rede-signed in order to obtain global optimal mining results.The mining experiments are carried out on the UCI data category 6 data set.Experimental results show that the improved mining algorithm is much better than the ID3 type decision tree mining algorithm in the compact degree and the accuracy of the decision tree construction.%分析经典 ID3型决策树挖掘算法中存在的问题,对其熵值计算过程进行改进,构建一种改进的 ID3型决策树挖掘算法。重新设计决策树构建中的熵值计算过程,以获得具有全局最优的挖掘结果,并针对 UCI 数据集中的6类数据集展开挖掘实验。结果表明:改进后的挖掘算法在决策树构建的简洁程度和挖掘精度上,都明显优于 ID3型决策树挖掘算法。

  14. Adaptive Deployable Entry and Placement Technology (ADEPT) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The ADEPT Project is developing a mechanically deployable low-ballistic coefficient aeroshell entry system to perform entry descent landing (EDL) functions for...

  15. Design and Simulation Tools for Planetary Atmospheric Entry Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Atmospheric entry is one of the most critical phases of flight during planetary exploration missions. During the design of an entry vehicle, experimental and...

  16. Improvement and analysis of ID3 algorithm in decision-making tree

    Science.gov (United States)

    Xie, Xiao-Lan; Long, Zhen; Liao, Wen-Qi

    2015-12-01

    For the cooperative system under development, it needs to use the spatial analysis and relative technology concerning data mining in order to carry out the detection of the subject conflict and redundancy, while the ID3 algorithm is an important data mining. Due to the traditional ID3 algorithm in the decision-making tree towards the log part is rather complicated, this paper obtained a new computational formula of information gain through the optimization of algorithm of the log part. During the experiment contrast and theoretical analysis, it is found that IID3 (Improved ID3 Algorithm) algorithm owns higher calculation efficiency and accuracy and thus worth popularizing.

  17. The paradox of IDs: an account of an ethnographic experience in the US

    Directory of Open Access Journals (Sweden)

    Mariza Peirano

    2008-01-01

    Full Text Available In the modern world, IDs are indispensable objects, without which we cannot prove that we are who we say we are. We need material substantiation that attests to the authenticity of our self-identification. This paper is an account of an ethnographic experience about IDs and identification processes in the US, based on the examination of two events in which Eliot Spitzer, the New York State governor from January 2007 to March 2008, was a central figure. A comparison with the Brazilian scenario is present throughout the paper, and it ends by focusing on the ID theft phenomenon.

  18. 62 FR 28104 - Union Pacific Railroad CompanyAbandonment Exemptionin Malheur County, OR and Owyhee County, ID...

    Science.gov (United States)

    1997-05-22

    ... and Owyhee County, ID (Homedale Branch) On May 2, 1997, Union Pacific Railroad Company (UP) filed with..., and Owyhee County, ID, and includes the non-agency stations of Napton, OR-- milepost 16.90;...

  19. The treatable intellectual disability APP www.treatable-id.org: a digital tool to enhance diagnosis & care for rare diseases

    National Research Council Canada - National Science Library

    van Karnebeek, Clara D M; Houben, Roderick F A; Lafek, Mirafe; Giannasi, Wynona; Stockler, Sylvia

    2012-01-01

    .... Freely available as a WebAPP via http://www.treatable-id.org and end 2012 via the APP store, this diagnostic tool is designed for all specialists evaluating children with global delay / ID and laboratory scientists...

  20. Dependency of radon entry on pressure difference

    Science.gov (United States)

    Kokotti, H.; Kalliokoski, P.; Jantunen, M.

    Radon levels, ventilation rate and pressure differences were monitored continuously in four apartment houses with different ventilation systems. Two of them were ventilated by mechanical exhaust, one by mechanical supply and exhaust, and one by natural ventilation. The two-storey houses were constructed from concrete elements on a slab and located on a gravel esker. It was surprising to find that increasing the ventilation rate increased levels of radon in the apartments. Increased ventilation caused increased outdoor-indoor pressure difference, which in turn increased the entry rate of radon and counteracted the diluting effect of ventilation. The increase was significant when the outdoor-indoor pressure difference exceeded 5 Pa. Especially in the houses with mechanical exhaust ventilation the pressure difference was the most important factor of radon entry rate, and contributed up to several hundred Bq m -3 h -1.

  1. Prototipicality in entries of school dictionaries

    Directory of Open Access Journals (Sweden)

    Everton Castro de Almeida

    2015-01-01

    Full Text Available Theoretical Lexicography is the discipline which, in a general way, studies and criticizes the dictionaries. It is open to the theoretical contribution from other fields of research, such as Text Linguistics, Pragmatics, and Multimodality, once they may show another lexical dimension. Thus, we base our analysis on the theoretical support from Prototypes Theory, from cognitive sciences. In that sense, this paper aims to identify and describe the prototypicality in entries from the five type 3 dictionaries from the PNLD 2012 (National Plan for the Didactic Books. In order to do so, we use theories from Pontes (2008; 2009 and Geeraerts (2007. We analyze five entries, one from each dictionary type 3.

  2. 14 CFR 375.24 - Entry and clearance.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Entry and clearance. 375.24 Section 375.24 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL... Entry and clearance. All U.S. entry and clearance requirements for aircraft, passengers, crews,...

  3. 19 CFR 143.35 - Procedure for electronic entry summary.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Procedure for electronic entry summary. 143.35 Section 143.35 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) SPECIAL ENTRY PROCEDURES Electronic Entry Filing § 143.35...

  4. 77 FR 17492 - Expansion of Global Entry to Additional Airports

    Science.gov (United States)

    2012-03-26

    ... selection process, and the initial airport locations. See 77 FR 5681 and 8 CFR 235.12. Travelers who wish to... SECURITY U.S. Customs and Border Protection Expansion of Global Entry to Additional Airports AGENCY: U.S... as Global Entry, at twenty major U.S. airports. Global Entry allows pre-approved,...

  5. 40 CFR 90.1207 - Entry and access.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Entry and access. 90.1207 Section 90... § 90.1207 Entry and access. (a) To allow the Administrator to determine whether a manufacturer is... maintenance. (c) The provisions of § 90.705(c), (d), (e), (f) and (g) also apply to entry and access...

  6. Maximum Atmospheric Entry Angle for Specified Retrofire Impulse

    Directory of Open Access Journals (Sweden)

    T. N. Srivastava

    1969-07-01

    Full Text Available Maximum atmospheric entry angles for vehicles initially moving in elliptic orbits are investigated and it is shown that tangential retrofire impulse at the apogee results in the maximum entry angle. Equivalence of maximizing the entry angle and minimizing the retrofire impulse is also established.

  7. 19 CFR 143.16 - Substitution of warehouse entry.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Substitution of warehouse entry. 143.16 Section 143.16 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT... warehouse entry. The importer may substitute an entry for warehouse at any time within 1 year from the...

  8. 50 CFR 91.16 - Submission procedures for entry.

    Science.gov (United States)

    2010-10-01

    ... (CONTINUED) MISCELLANEOUS PROVISIONS MIGRATORY BIRD HUNTING AND CONSERVATION STAMP CONTEST Procedures for.... Each entry must be accompanied by a non-refundable entrance fee and a completed and signed Reproduction... the Reproduction Rights Agreement must be attached to the back of the entry. (b) Each entry should...

  9. 31 CFR 337.6 - Conversions to book-entry.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Conversions to book-entry. 337.6... HOUSING ADMINISTRATION DEBENTURES Certificated Debentures § 337.6 Conversions to book-entry. Upon implementation of the book-entry debenture system, to be announced in advance by separate public notice, all...

  10. Sport entries & qualification manual: Innsbruck 2012 Youth Olympic Games

    OpenAIRE

    2015-01-01

    Sport entries constitute an important part of the delegation registration process of the Innsbruck 2012 Winter Youth Olympic Games. This manual aims to introduce to NOCs the process, relevant policies and requirements regarding sport entries so as to ensure that NOCs can successfully complete the entries for their athletes to the Innsbruck 2012 Winter Youth Olympic Games.

  11. The Double-entry Bookkeeping Committee of 1914 and the Brazilian Public Accounting System

    Directory of Open Access Journals (Sweden)

    Tiago Villac Adde

    2014-12-01

    Full Text Available The history of Brazilian accounting has not been explored at length. Through a historical survey, this article presents the history of the Double-entry Bookkeeping Committee of 1914. After the Proclamation of the Republic was announced in 1889, the government started to expand its administrative bodies, necessitating the introduction of a bureaucracy able to perform new functions. In the same period, Brazil experienced a strong economic development with the development of its coffee industry. In 1905, under the leadership of Carlos de Carvalho, São Paulo State Treasury bookkeeping tasks were introduced under a double-entry bookkeeping system and through accrual and financial accounting. Double-entry bookkeeping practices in the federal public accounting system, although enshrined in law since 1808, were only fully realized after the creation of the Double-entry Bookkeeping Committee in 1914. In that same year, due to the negotiation of a second funding loan, English creditor bank auditors requested a balance of the National Treasury from the Minister of Finance Rivadávia Corrêa. Because the balance had not been prepared in eight years, the Double-entry Bookkeeping Committee was established in June of 1914, and this body completed a technical audit of Revenues and Expenditures. The committee also conducted the state administration's first Asset and Liability audit since the colonial era. The Double-entry Bookkeeping Committee of 1914 spearheaded changes to the Brazilian public accounting system, including the creation of the Public Accounting Code in 1922 and the approval of Central Accounting Office of the Republic regulation in 1924, strengthening and ascribing perpetuity to practices adopted after 1914.

  12. Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-08-19

    A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

  13. Hypersonic Flight Mechanics. [for atmospheric entry trajectories

    Science.gov (United States)

    Busemann, A.; Vinh, N. X.; Culp, R. D.

    1976-01-01

    The effects of aerodynamic forces on trajectories at orbital speeds are discussed in terms of atmospheric models. The assumptions for the model are spherical symmetry, nonrotating, and an exponential atmosphere. The equations of flight, and the performance in extra-atmospheric flight are discussed along with the return to the atmosphere, and the entry. Solutions of the exact equations using directly matched asymptotic expansions are presented.

  14. Unified treatment of lifting atmospheric entry

    Science.gov (United States)

    Nachtsheim, P. R.; Lehman, L. L.

    1980-01-01

    This paper presents a unified treatment of the effect of lift on peak acceleration during atmospheric entry. Earlier studies were restricted to different regimes because of approximations invoked to solve the same transcendental equation. This paper shows the connection between the earlier studies by employing a general expression for the peak acceleration and obtains solutions to the transcendental equation without invoking the earlier approximations. Results are presented and compared with earlier studies where appropriate.

  15. Nuclear Chk1 prevents premature mitotic entry.

    Science.gov (United States)

    Matsuyama, Makoto; Goto, Hidemasa; Kasahara, Kousuke; Kawakami, Yoshitaka; Nakanishi, Makoto; Kiyono, Tohru; Goshima, Naoki; Inagaki, Masaki

    2011-07-01

    Chk1 inhibits the premature activation of the cyclin-B1-Cdk1. However, it remains controversial whether Chk1 inhibits Cdk1 in the centrosome or in the nucleus before the G2-M transition. In this study, we examined the specificity of the mouse monoclonal anti-Chk1 antibody DCS-310, with which the centrosome was stained. Conditional Chk1 knockout in mouse embryonic fibroblasts reduced nuclear but not centrosomal staining with DCS-310. In Chk1(+/myc) human colon adenocarcinoma (DLD-1) cells, Chk1 was detected in the nucleus but not in the centrosome using an anti-Myc antibody. Through the combination of protein array and RNAi technologies, we identified Ccdc-151 as a protein that crossreacted with DCS-310 on the centrosome. Mitotic entry was delayed by expression of the Chk1 mutant that localized in the nucleus, although forced immobilization of Chk1 to the centrosome had little impact on the timing of mitotic entry. These results suggest that nuclear but not centrosomal Chk1 contributes to correct timing of mitotic entry.

  16. Cell entry by human pathogenic arenaviruses.

    Science.gov (United States)

    Rojek, Jillian M; Kunz, Stefan

    2008-04-01

    The arenaviruses Lassa virus (LASV) in Africa and Machupo (MACV), Guanarito (GTOV) and Junin viruses (JUNV) in South America cause severe haemorrhagic fevers in humans with fatality rates of 15-35%. The present review focuses on the first steps of infection with human pathogenic arenaviruses, the interaction with their cellular receptor molecules and subsequent entry into the host cell. While similarities exist in genomic organization, structure and clinical disease caused by pathogenic Old World and New World arenaviruses these pathogens use different primary receptors. The Old World arenaviruses employ alpha-dystroglycan, a cellular receptor for proteins of the extracellular matrix, and the human pathogenic New World arenaviruses use the cellular cargo receptor transferrin receptor 1. While the New World arenavirus JUNV enters cells via clathrin-dependent endocytosis, evidence occurred for clathrin-independent entry of the prototypic Old World arenavirus lymphocytic choriomeningitis virus. Upon internalization, arenaviruses are delivered to the endosome, where pH-dependent membrane fusion is mediated by the envelope glycoprotein (GP). While arenavirus GPs share characteristics with class I fusion GPs of other enveloped viruses, unusual mechanistic features of GP-mediated membrane fusion have recently been discovered for arenaviruses with important implications for viral entry.

  17. Kinetics of virus entry by endocytosis

    Science.gov (United States)

    Zhdanov, Vladimir P.

    2015-04-01

    Entry of virions into the host cells is either endocytotic or fusogenic. In both cases, it occurs via reversible formation of numerous relatively weak bonds resulting in wrapping of a virion by the host membrane with subsequent membrane rupture or scission. The corresponding kinetic models are customarily focused on the formation of bonds and do not pay attention to the energetics of the whole process, which is crucially dependent, especially in the case of endocytosis, on deformation of actin filaments forming the cytoskeleton of the host cell. The kinetic model of endocytosis, proposed by the author, takes this factor into account and shows that the whole process can be divided into a rapid initial transient stage and a long steady-state stage. The entry occurs during the latter stage and can be described as a first-order reaction. Depending on the details of the dependence of the grand canonical potential on the number of bonds, the entry can be limited either by the interplay of bond formation and membrane rupture (or scission) or by reaching a maximum of this potential.

  18. Filovirus tropism: Cellular molecules for viral entry

    Directory of Open Access Journals (Sweden)

    Ayato eTakada

    2012-02-01

    Full Text Available In human and nonhuman primates, filoviruses (Ebola and Marburg viruses cause severe hemorrhagic fever.Recently, other animals such as pigs and some species of fruit bats have also been shown to be susceptible to these viruses. While having a preference for some cell types such as hepatocytes, endothelial cells, dendritic cells, monocytes, and macrophages, filoviruses are known to be pantropic in infection of primates. The envelope glycoprotein (GP is responsible for both receptor binding and fusion of the virus envelope with the host cell membrane. It has been demonstrated that filovirus GP interacts with multiple molecules for entry into host cells, whereas none of the cellular molecules so far identified as a receptor/coreceptor fully explains filovirus tissue tropism and host range. Available data suggest that the mucin-like region (MLR on GP plays an important role in attachment to the preferred target cells, whose infection is likely involved in filovirus pathogenesis, whereas the MLR is not essential for the fundamental function of the GP in viral entry into cells in vitro. Further studies elucidating the mechanisms of cellular entry of filoviruses may shed light on the development of strategies for prophylaxis and treatment of Ebola and Marburg hemorrhagic fevers.

  19. Intrusion Detection System using Self Organizing Map: A Survey

    Directory of Open Access Journals (Sweden)

    Kruti Choksi

    2014-12-01

    Full Text Available Due to usage of computer every field, Network Security is the major concerned in today’s scenario. Every year the number of users and speed of network is increasing, along with it online fraud or security threats are also increasing. Every day a new attack is generated to harm the system or network. It is necessary to protect the system or networks from various threats by using Intrusion Detection System which can detect “known” as well as “unknown” attack and generate alerts if any unusual behavior in the traffic. There are various approaches for IDS, but in this paper, survey is focused on IDS using Self Organizing Map. SOM is unsupervised, fast conversion and automatic clustering algorithm which is able to handle novelty detection. The main objective of the survey is to find and address the current challenges of SOM. Our survey shows that the existing IDS based on SOM have poor detection rate for U2R and R2L attacks. To improve it, proper normalization technique should be used. During the survey we also found that HSOM and GHSOM are advance model of SOM which have their own unique feature for better performance of IDS. GHSOM is efficient due to its low computation time. This survey is beneficial to design and develop efficient SOM based IDS having less computation time and better detection rate.

  20. Experimental wake survey behind Viking 1975 entry vehicle at angles of attack of 0 deg and 5 deg, Mach numbers from 1.60 to 3.95, and longitudinal stations from 1.0 to 8.39 body diameters

    Science.gov (United States)

    Brown, C. A., Jr.; Campbell, J. F.; Tudor, D. H.

    1971-01-01

    An investigation was conducted to obtain flow properties in the wake of the Viking '75 entry vehicle at Mach numbers from 1.60 to 3.95 and at angles of attack of 0 deg and 5 deg. The wake flow properties were calculated from total and static pressures measured with a pressure rake at longitudinal stations varying from 1.0 to 8.39 body diameters and lateral stations varying from -0.42 to 3.0 body diameters. These measurements showed a a consistent trend throughout the range of Mach numbers and longitudinal distances and an increase in dynamic pressure with increasing downstream position.

  1. Toward operation of series IDs at BL43LXU of SPring-8

    Energy Technology Data Exchange (ETDEWEB)

    Baron, A. Q. R.; Tanaka, T.; Soutome, K.; Takao, M.; Nakamura, T.; Kobayashi, K.; Fujita, T.; Takahashi, S.; Aoyagi, H.; Shimosaki, Y.; Seike, T.; Uchiyama, H.; Ishikawa, D.; Chuang, T.-H.; Kimura, H.; Tanaka, H.; Kitamura, H.; Ishikawa, T. [SPring-8, 1-1-1 Kouto, Sayo, Hyogo, 679 (Japan)

    2016-07-27

    This paper discusses two issues relating to using 3 small gap insertion devices in series at BL43LXU of SPring-8 to make a uniquely powerful source in the 15-26 keV region of the x-ray spectrum. The issues discussed are (1) damage to the covers of the downstream IDs by radiation from the upstream IDs and (2) proper steering of the electron beam to get the best photon beam properties. After tests in several configurations, including one where an ID was run without an impedance-reducing cover, the damage issue was solved by installing a distributed absorber in the most downstream ID. The steering issues were mostly resolved by the introduction of appropriate corrector magnets and feedback. The paper is written from the viewpoint of an interested beamline scientist impressed with the cooperation of different groups to make a source for new science possible.

  2. 76 FR 16367 - Implementation of the Truth in Caller ID Act of 2009

    Science.gov (United States)

    2011-03-23

    ...IP service,'' and defining ``Caller identification service'' to mean ``any service or device designed... identification information in technologies that are successor or replacement technologies to telecommunications... from causing any caller identification service to knowingly transmit misleading or inaccurate caller ID...

  3. ID migraine questionnaire in temporomandibular disorders with craniofacial pain: a study by using a multidisciplinary approach.

    Science.gov (United States)

    Di Paolo, Carlo; Di Nunno, Anna; Vanacore, Nicola; Bruti, Gianluca

    2009-08-01

    To evaluate the prevalence of migraine and related disability and the role of ID migraine questionnaire as a screening tool in patients with temporomandibular disorders (TMDs) and craniofacial pain (CFP). TMDs patients with CFP underwent stomatognathic (RDC/TMD criteria) and neurological visits (IHS criteria, 2004). ID migraine questionnaire and MIgraine Disability Assessment Scale (MIDAS) were also administered. Out of 45 patients, 69% met diagnosis of migraine plus chronic tension-type headache (CTTH); 9% presented CTTH and 20% were migraineurs. Out of 39 migraineurs who completed MIDAS, 56% presented the highest disability grade. Out of 37 patients who completed ID migraine questionnaire, 32 resulted affected by probable migraine with a diagnostic sensibility and specificity of 94% and 100%, respectively. Our findings showed a clinical association between TMDs and migraine. We support a clinical role of ID migraine and MIDAS in TMDs patients with CFP and we underline the importance of a multidisciplinary evaluation in this group of migraineurs.

  4. 80 FR 9279 - Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and Washington Counties, ID, and...

    Science.gov (United States)

    2015-02-20

    ...-2013-N279; 1265-0000-10137-S3] Deer Flat National Wildlife Refuge, Canyon, Payette, Owyhee, and..., 1010 Dearborn St, Caldwell, ID 83605. [ssquf] Homedale Public Library, 125 W Owyhee Ave, Homedale,...

  5. 76 FR 78940 - Minidoka National Wildlife Refuge, Blaine, Cassia, Minidoka, and Power Counties, ID...

    Science.gov (United States)

    2011-12-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Fish and Wildlife Service Minidoka National Wildlife Refuge, Blaine, Cassia, Minidoka, and Power Counties, ID; Comprehensive Conservation Plan and Environmental Assessment AGENCY: Fish and...

  6. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Employment and Training Administration Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial Reporting Group, Hartford, CT; Notice of Affirmative... workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery...

  7. Infant-directed speech (IDS) vowel clarity and child language outcomes.

    Science.gov (United States)

    Hartman, Kelly M; Ratner, Nan Bernstein; Newman, Rochelle S

    2017-09-01

    There have been many studies examining the differences between infant-directed speech (IDS) and adult-directed speech (ADS). However, investigations asking whether mothers clarify vowel articulation in IDS have reached equivocal findings. Moreover, it is unclear whether maternal speech clarification has any effect on a child's developing language skills. This study examined vowel clarification in mothers' IDS at 0;10-11, 1;6, and 2;0, as compared to their vowel production in ADS. Relationships between vowel space, vowel duration, and vowel variability and child language outcomes at two years were also explored. Results show that vowel space and vowel duration tended to be greater in IDS than in ADS, and that one measure of vowel clarity, a mother's vowel space at 1;6, was significantly related to receptive as well as expressive child language outcomes at two years of age.

  8. Family Impact in Intellectual Disability, Severe Mental Health Disorders and Mental Health Disorders in ID. A Comparison

    Science.gov (United States)

    Martorell, Almudena; Gutierrez-Recacha, Pedro; Irazabal, Marcia; Marsa, Ferran; Garcia, Mercedes

    2011-01-01

    Family impact (or family burden) is a concept born in the field of mental health that has successfully been exported to the ambit of intellectual disability (ID). However, differences in family impact associated with severe mental health disorders (schizophrenia), to ID or to mental health problems in ID should be expected. Seventy-two adults with…

  9. 6 CFR 37.5 - Validity periods and deadlines for REAL ID driver's licenses and identification cards.

    Science.gov (United States)

    2010-01-01

    ... SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS General § 37.5 Validity periods and deadlines for REAL ID driver's licenses and identification cards. (a) Driver's... individuals born after December 1, 1964, unless such license or card is a REAL ID-compliant driver's...

  10. Improved D-IDS using the federated peer-to-peer architecture

    Institute of Scientific and Technical Information of China (English)

    Hoan Kyu Lee; In Joo Jang; Hyeong Seon Yoo

    2007-01-01

    A number of IDSs have been proposed for a networked or distributed environment. A modified D-IDS using federated peer-to-peer architecture, MCR (Multicast Reflector) and modified shaker protocol were proposed. The suggested scheme can be implemented easily and performs the information sharing between low-level IDS agents. As all users within a group monitor each other's, the common control server can perform detect intrusions with less cost and support the detection of the inside intruders.

  11. Overexpression of Id1 in transgenic mice promotes mammary basal stem cell activity and breast tumorigenesis

    OpenAIRE

    Shin, Dong-Hui; Park, Ji-Hye; Lee, Jeong-Yeon; Won, Hee-Young; Jang, Ki-Seok; MIN, KYUENG-WHAN; Jang, Si-Hyong; Woo, Jong-Kyu; Oh, Seung Hyun; Kong, Gu

    2015-01-01

    Inhibitor of differentiation/DNA binding (Id)1 is a crucial regulator of mammary development and breast cancer progression. However, its effect on stemness and tumorigenesis in mammary epithelial cells remains undefined. Herein, we demonstrate that Id1 induces mammary tumorigenesis by increasing normal and malignant mammary stem cell (MaSC) activities in transgenic mice. MaSC-enriched basal cell expansion and increased self-renewal and in vivo regenerative capacity of MaSCs are observed in th...

  12. ACE I/D polymorphism in Indian patients with hypertrophic cardiomyopathy and dilated cardiomyopathy

    DEFF Research Database (Denmark)

    Rai, Taranjit Singh; Dhandapany, Perundurai Subramaniam; Ahluwalia, Tarun Veer Singh

    2008-01-01

    The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM).......The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM)....

  13. Protection against Mycobacterium leprae infection by the ID83/GLA-SE and ID93/GLA-SE vaccines developed for tuberculosis.

    Science.gov (United States)

    Duthie, Malcolm S; Coler, Rhea N; Laurance, John D; Sampaio, Lucas H; Oliveira, Regiane M; Sousa, Ana Lucia M; Stefani, Mariane M A; Maeda, Yumi; Matsuoka, Masanori; Makino, Masahiko; Reed, Steven G

    2014-09-01

    Despite the dramatic reduction in the number of leprosy cases worldwide in the 1990s, transmission of the causative agent, Mycobacterium leprae, is still occurring, and new cases continue to appear. New strategies are required in the pursuit of leprosy elimination. The cross-application of vaccines in development for tuberculosis may lead to tools applicable to elimination of leprosy. In this report, we demonstrate that the chimeric fusion proteins ID83 and ID93, developed as antigens for tuberculosis (TB) vaccine candidates, elicited gamma interferon (IFN-γ) responses from both TB and paucibacillary (PB) leprosy patients and from healthy household contacts of multibacillary (MB) patients (HHC) but not from nonexposed healthy controls. Immunization of mice with either protein formulated with a Toll-like receptor 4 ligand (TLR4L)-containing adjuvant (glucopyranosyl lipid adjuvant in a stable emulsion [GLA-SE]) stimulated antigen-specific IFN-γ secretion from pluripotent Th1 cells. When immunized mice were experimentally infected with M. leprae, both cellular infiltration into the local lymph node and bacterial growth at the site were reduced relative to those of unimmunized mice. Thus, the use of the Mycobacterium tuberculosis candidate vaccines ID83/GLA-SE and ID93/GLA-SE may confer cross-protection against M. leprae infection. Our data suggest these vaccines could potentially be used as an additional control measure for leprosy. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  14. 19 CFR 149.6 - Entry and entry summary documentation and Importer Security Filing submitted via a single...

    Science.gov (United States)

    2010-04-01

    ... Security Filing submitted via a single electronic transmission. 149.6 Section 149.6 Customs Duties U.S... submitted via a single electronic transmission. If the Importer Security Filing is filed pursuant to § 149.2 of this part via the same electronic transmission as entry or entry/entry summary...

  15. Id2 controls specification of Lgr5(+) intestinal stem cell progenitors during gut development.

    Science.gov (United States)

    Nigmatullina, Lira; Norkin, Maxim; Dzama, Margarita M; Messner, Berith; Sayols, Sergi; Soshnikova, Natalia

    2017-04-03

    The adult intestinal stem cells (ISCs), their hierarchies, mechanisms of maintenance and differentiation have been extensively studied. However, when and how ISCs are established during embryogenesis remains unknown. We show here that the transcription regulator Id2 controls the specification of embryonic Lgr5(+) progenitors in the developing murine small intestine. Cell fate mapping analysis revealed that Lgr5(+) progenitors emerge at E13.5 in wild-type embryos and differ from the rest on the intestinal epithelium by a characteristic ISC signature. In the absence of Id2, the intestinal epithelium differentiates into Lgr5(+) cells already at E9.5. Furthermore, the size of the Lgr5(+) cell pool is significantly increased. We show that Id2 restricts the activity of the Wnt signalling pathway at early stages and prevents precocious differentiation of the embryonic intestinal epithelium. Id2-deficient embryonic epithelial cells cultured ex vivo strongly activate Wnt target genes as well as markers of neoplastic transformation and form fast growing undifferentiated spheroids. Furthermore, adult ISCs from Id2-deficient mice display a distinct transcriptional signature, supporting an essential role for Id2 in the correct specification of ISCs. © 2017 The Authors.

  16. System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

    Directory of Open Access Journals (Sweden)

    Shin-ichi Kuribayashi

    2010-11-01

    Full Text Available The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitoussociety, and it is necessary to study how to construct RFID network system as a social infrastructure likethe Internet. First, this paper proposes the virtualization method of RFID tag network system to enablethe same physical RFID network system to be used by multiple different service systems. The systemvirtualization not only reduces the system cost but also can dramatically reduce the installation space ofphysical readers and the operation cost. It is proposed that all equipments in the RFID network systemexcept RFID tag could be shared with the conventional virtual technologies. Then, this paper proposesthe conditional tag ID processing and the efficient tag ID transmission method which can greatly reducethe processing time and processing load in RFID tag Infrastructure network The conditional tag IDprocessing allows that tag ID is valid only at a certain time zone of day or in a certain area. The efficienttag ID transmission method uses the virtual network address of the service center as a part of the ID of anRF tag, which allows the direct ID forwarding to the service center.

  17. Entry and Exit Dynamics of Nascent Business Owners

    DEFF Research Database (Denmark)

    Rocha, Vera; Carneiro, Anabela; Varum, Celeste

    2015-01-01

    in the labor market and entry modes shape the post-entry dynamics of nascent business owners. By differentiating between different entry and exit routes, this paper provides new evidence on different human capital patterns among nascent business owners and on key determinants of entrepreneurial survival. Our...... results suggest that different exit modes can be predicted by business owners’ entry route. Furthermore, different exit modes exhibit different duration dependence patterns according to the entry mode. Additionally, the paper shows that businesses started after a displacement episode are not necessarily...

  18. Exporting Complex Digital Products: Motives and Entry Modes

    DEFF Research Database (Denmark)

    Rask, Morten

    2005-01-01

    for digital product providers. However, other types of entry modes like what we call direct digital export with F2F-sales, direct digital export with F2F-support, and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and postsales complexity.......When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore, the entry modes, considered in this paper, are different flavors of the entry mode called direct export: virtual export channel is generally understood as the entry mode...

  19. Exporting Complex Digital Products: Motives and Entry Modes

    DEFF Research Database (Denmark)

    Rask, Morten

    for digital product providers. However other types of entry modes like what wee call direct digital export with F2F-sales, direct digital export with F2F-support and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and after-sales complexity.......When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore the entry modes, considered in this paper, are different flavors of the entry mode called direct export: Virtual export channel are generally understood as the entry mode...

  20. Exporting Complex Digital Products: Motives and Entry Modes

    DEFF Research Database (Denmark)

    Rask, Morten

    When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore the entry modes, considered in this paper, are different flavors of the entry mode called direct export: Virtual export channel are generally understood as the entry mode...... for digital product providers. However other types of entry modes like what wee call direct digital export with F2F-sales, direct digital export with F2F-support and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and after-sales complexity....

  1. Exporting Complex Digital Products: Motives and Entry Modes

    DEFF Research Database (Denmark)

    Rask, Morten

    2005-01-01

    When the product is digital, it will most often be distributed directly to the customer through the Internet, and therefore, the entry modes, considered in this paper, are different flavors of the entry mode called direct export: virtual export channel is generally understood as the entry mode...... for digital product providers. However, other types of entry modes like what we call direct digital export with F2F-sales, direct digital export with F2F-support, and virtual sales subsidiary are entry modes that respond to a higher degree of pre- and postsales complexity....

  2. Assessment of the ATV-1 Re-Entry Observation Campaign for Future Re-Entry Missions

    Science.gov (United States)

    Lips, T.; Lohle, S.; Marynowsky, T.; Rees, D.; Stenbeak-Nielsen, H. C.; Beks, M. L.; Hatton, J.

    2010-09-01

    This paper summarizes the midterm results of the currently ongoing ESA study “Assessment of the ATV-1 Reentry Observation Campaign for Future Re-entry Missions”. The primary objective of this study is to investigate the data obtained during a joint ESA/NASA airborne observation campaign of the destructive re-entry of ATV-1 Jules Verne which occurred on September 29, 2008. The presented results are focused on spectroscopic fragment characterization(material identification), frame-by-frame fragment tracking(manual and automatic) for various video recordings, 3D triangulation of the tracked fragments, and fragment propagation until complete demise or ground impact, including the actual size and location of the ATV-1 debris footprint. Fragment propagation analyses comprise also the derivation of aerodynamic fragment properties and potential delta velocities. These parameters are of high importance for the re-entry safety analysis for ATV-2 Johannes Kepler.

  3. Entry properties and entry inhibitors of a human H7N9 influenza virus.

    Directory of Open Access Journals (Sweden)

    Youhui Si

    Full Text Available The recently identified human infections with a novel avian influenza H7N9 virus in China raise important questions regarding possible risk to humans. However, the entry properties and tropism of this H7N9 virus were poorly understood. Moreover, neuraminidase inhibitor resistant H7N9 isolates were recently observed in two patients and correlated with poor clinical outcomes. In this study, we aimed to elucidate the entry properties of H7N9 virus, design and evaluate inhibitors for H7N9 virus entry. We optimized and developed an H7N9-pseudotyped particle system (H7N9pp that could be neutralized by anti-H7 antibodies and closely mimicked the entry process of the H7N9 virus. Avian, human and mouse-derived cultured cells showed high, moderate and low permissiveness to H7N9pp, respectively. Based on influenza virus membrane fusion mechanisms, a potent anti-H7N9 peptide (P155-185-chol corresponding to the C-terminal ectodomain of the H7N9 hemagglutinin protein was successfully identified. P155-185-chol demonstrated H7N9pp-specific inhibition of infection with IC50 of 0.19 µM. Importantly, P155-185-chol showed significant suppression of A/Anhui/1/2013 H7N9 live virus propagation in MDCK cells and additive effects with NA inhibitors Oseltamivir and Zanamivir. These findings expand our knowledge of the entry properties of the novel H7N9 viruses, and they highlight the potential for developing a new class of inhibitors targeting viral entry for use in the next pandemic.

  4. Entry Properties and Entry Inhibitors of a Human H7N9 Influenza Virus

    OpenAIRE

    Youhui Si; Jianguo Li; Yuqiang Niu; Xiuying Liu; Lili Ren; Li Guo; Min Cheng; Hongli Zhou; Jianwei Wang; Qi Jin; Wei Yang

    2014-01-01

    The recently identified human infections with a novel avian influenza H7N9 virus in China raise important questions regarding possible risk to humans. However, the entry properties and tropism of this H7N9 virus were poorly understood. Moreover, neuraminidase inhibitor resistant H7N9 isolates were recently observed in two patients and correlated with poor clinical outcomes. In this study, we aimed to elucidate the entry properties of H7N9 virus, design and evaluate inhibitors for H7N9 virus e...

  5. Access, entry and researcher-participant position

    DEFF Research Database (Denmark)

    Louw, Arnt Vestergaard

    2015-01-01

    it deals with the research findings that such a research design produced. As well as the methodological issues of researcher access, entry and participant position in the field, this article reports on the following questions: What kinds of implicit expectations of the students are embedded in the way...... the school introduces and initiates the programme? What kinds of effects does this have on the motivation of the students? How do the terms and professional language of the profession work on the individual students in including and excluding ways? These specific descriptions of classroom pedagogy, inspired...

  6. Radiation Database for Earth and Mars Entry

    Science.gov (United States)

    2008-11-17

    d3Πg − a3Πu (0:18;0:33) Fox- Herzberg e3Πg − a3Πu (0:15;0:35) Radiation Database for Earth and Mars Entry RTO-EN-AVT-162 8 - 15 affect a few J...structures of the spectra, namely in lines. This motivates the development of approximate models which do not have the high resolution structures but provide...Dec 1996. [2] L.C. Hartung. Predicting radiative heat transfer in thermo-chemical non-equilibrium flow- fields: theory and user’s manual for the

  7. Evolved Acceleration Guidance for Planetary Entry

    Science.gov (United States)

    Mease, K. D.; Leavitt, J. A.; Ferch, M.

    The U.S. Apollo and Shuttle programs have proven the viability and effectiveness of acceleration guidance. New capabilities have been developed to augment this basic concept. Algorithms have been designed for low lift to drag ratio vehicles and for mid to high lift to drag ratio vehicles. These algorithms have been tested for Mars landing and for earth entry of reusable launch vehicles and have performed well in both cases. Also the trajectory planner has been incorporated into a landing footprint generator that is designed for on-board use.

  8. Reference pricing with endogenous generic entry.

    OpenAIRE

    Kurt R. Brekke; Canta, Chiara; Straume, Odd Rune

    2015-01-01

    In this paper we study the effect of reference pricing on pharmaceutical prices and ex-penditures when generic entry is endogenously determined. We develop a Salop-type model where a brand-name producer competes with generic producers in terms of prices. In the market there are two types of consumers: (i) brand biased consumers who choose between brand-name and generic drugs, and (ii) brand neutral consumers who choose between the different generic drugs. We find that, for a given number of ...

  9. Female entrepreneurial networks and foreign market entry

    DEFF Research Database (Denmark)

    Rosenbaum, Gitte Ohrt

    2017-01-01

    The purpose of this paper is to explore the role of networks in the 116 foreign market entries (FMEs) of women-owned small businesses. A multiple case study based on semi-structured interviews with eight female entrepreneurs in the Danish fashion design industry. The results show that contrary to...... entrepreneurial ventures....... or compromising their work-life balance. The present study’s findings suggest that ICT has a much stronger role in the FME of firms than previously envisioned. The study’s findings also have important implications for policymakers and practitioners charged with promoting the international growth of female...

  10. What I wish I'd learned at dental school.

    Science.gov (United States)

    Oliver, G R; Lynch, C D; Chadwick, B L; Santini, A; Wilson, N H F

    2016-08-26

    Background Much concern appears to exist as to the scope and content of contemporary dental school programmes, with the oft-cited criticism being made that dental graduates are 'no longer as good as they used to be'.Aim The aim of this project was to survey the views of dentists - both new graduates and more established practitioners - on aspects of their own dental school training they felt had been deficient as well as commenting on what aspects of dental school education they would like to see improved/enhanced in current times.Methods An invitation to complete an Internet-based questionnaire was emailed to the Fellows and Members of the Faculty of General Dental Practice (UK). Topics in the questionnaire included the respondent's own dental education history, how well they felt their dental school training had covered certain clinical and non-clinical topics; and their opinions on areas they felt should be included in contemporary dental school programmes.Results Six hundred and forty-nine responses were received from 3,348 emailed invitations (response rate = 19.4%). Sixty-one percent (395) of respondents were qualified for 10 years or more. Among clinical skills and techniques, a majority of respondents reported they felt they had not had sufficient teaching/training in dental school in surgical endodontics (76%), conscious sedation (72%), root surface debridement (71%), fixed orthodontic appliances (68%), porcelain veneers (63%), implants (56%) and posterior composites (53%). If designing a new dental school programme, the most common topics respondents would seek to include/increase were business and practice management (21%), communication skills (including patient management and leadership skills) (10%), and increased clinical time and experience (8%).Conclusions The findings of this project are of interest and relevance to those working with student dentists and young dental practitioners. A greater emphasis is needed on the teaching of certain non

  11. 77 FR 72715 - Informal Entry Limit and Removal of a Formal Entry Requirement

    Science.gov (United States)

    2012-12-06

    ... increase of the informal entry limit is also consistent with one of the goals of the Beyond the Border... the policy seemed inconsistent with the recent Congressional decision to increase the ad valorem MPFs... this analysis, CBP cannot ascertain with any degree of certainty the specific monetary impacts...

  12. Entry, Descent, and Landing Operations Analysis for the Genesis Entry Capsule

    Science.gov (United States)

    Desai, Prasun N.; Lyons, Daniel T.

    2007-01-01

    On September 8, 2004, the Genesis spacecraft returned to Earth after spending 29 months about the sun-Earth libration point (L1) collecting solar wind particles. Four hours prior to Earth arrival, the sample return capsule containing the samples was released for entry and subsequent landing at the Utah Test and Training Range. This paper provides an overview of the entry, descent, and landing trajectory analysis that was performed during the mission operations phase leading up to final approach to Earth. The final orbit determination solution produced an inertial entry flight-path angle of -8.002 deg (which was the desired nominal value) with a 3-sigma error of +/-0.0274 deg (a third of the requirement). The operations effort accurately delivered the entry capsule to the desired landing site. The final landing location was 8.3 km from the target, and was well within the allowable landing area. Overall, the Earth approach operation procedures worked well and there were no issues (logistically or performance based) that arose. As a result, the process of targeting a capsule from deep space and accurately landing it on Earth was successfully demonstrated.

  13. The Hera Saturn Entry Probe Mission

    CERN Document Server

    Mousis, O; Spilker, T; Venkatapathy, E; Poncy, J; Frampton, R; Coustenis, A; Reh, K; Lebreton, J -P; Fletcher, L N; Hueso, R; Amato, M J; Colaprete, A; Ferri, F; Stam, D; Wurz, P; Atreya, S; Aslam, S; Banfield, D J; Calcutt, S; Fischer, G; Holland, A; Keller, C; Kessler, E; Leese, M; Levacher, P; Morse, A; Munoz, O; Renard, J -B; Sheridan, S; Schmider, F -X; Snik, F; Waite, J H; Bird, M; Cavalié, T; Deleuil, M; Fortney, J; Gautier, D; Guillot, T; Lunine, J I; Marty, B; Nixon, C; Orton, G S; Sanchez-Lavega, A

    2015-01-01

    The Hera Saturn entry probe mission is proposed as an M--class mission led by ESA with a contribution from NASA. It consists of one atmospheric probe to be sent into the atmosphere of Saturn, and a Carrier-Relay spacecraft. In this concept, the Hera probe is composed of ESA and NASA elements, and the Carrier-Relay Spacecraft is delivered by ESA. The probe is powered by batteries, and the Carrier-Relay Spacecraft is powered by solar panels and batteries. We anticipate two major subsystems to be supplied by the United States, either by direct procurement by ESA or by contribution from NASA: the solar electric power system (including solar arrays and the power management and distribution system), and the probe entry system (including the thermal protection shield and aeroshell). Hera is designed to perform in situ measurements of the chemical and isotopic compositions as well as the dynamics of Saturn's atmosphere using a single probe, with the goal of improving our understanding of the origin, formation, and ev...

  14. Mycobacteria entry and trafficking into endothelial cells.

    Science.gov (United States)

    Baltierra-Uribe, Shantal Lizbeth; García-Vásquez, Manuel de Jesús; Castrejón-Jiménez, Nayeli Shantal; Estrella-Piñón, Mayra Patricia; Luna-Herrera, Julieta; García-Pérez, Blanca Estela

    2014-09-01

    Endothelial cells are susceptible to infection by mycobacteria, but the endocytic mechanisms that mycobacteria exploit to enter host cells and their mechanisms of intracellular transport are completely unknown. Using pharmacological inhibitors, we determined that the internalization of Mycobacterium tuberculosis (MTB), Mycobacterium smegmatis (MSM), and Mycobacterium abscessus (MAB) is dependent on the cytoskeleton and is differentially inhibited by cytochalasin D, nocodazole, cycloheximide, wortmannin, and amiloride. Using confocal microscopy, we investigated their endosomal trafficking by analyzing Rab5, Rab7, LAMP-1, and cathepsin D. Our results suggest that MSM exploits macropinocytosis to enter endothelial cells and that the vacuoles containing these bacteria fuse with lysosomes. Conversely, the entry of MTB seems to depend on more than one endocytic route, and the observation that only a subset of the intracellular bacilli was associated with phagolysosomes suggests that these bacteria are able to inhibit endosomal maturation to persist intracellularly. The route of entry for MAB depends mainly on microtubules, which suggests that MAB uses a different trafficking pathway. However, MAB is also able to inhibit endosomal maturation and can replicate intracellularly. Together, these findings provide the first evidence that mycobacteria modulate proteins of host endothelial cells to enter and persist within these cells.

  15. Text Entry by Gazing and Smiling

    Directory of Open Access Journals (Sweden)

    Outi Tuisku

    2013-01-01

    Full Text Available Face Interface is a wearable prototype that combines the use of voluntary gaze direction and facial activations, for pointing and selecting objects on a computer screen, respectively. The aim was to investigate the functionality of the prototype for entering text. First, three on-screen keyboard layout designs were developed and tested (n=10 to find a layout that would be more suitable for text entry with the prototype than traditional QWERTY layout. The task was to enter one word ten times with each of the layouts by pointing letters with gaze and select them by smiling. Subjective ratings showed that a layout with large keys on the edge and small keys near the center of the keyboard was rated as the most enjoyable, clearest, and most functional. Second, using this layout, the aim of the second experiment (n=12 was to compare entering text with Face Interface to entering text with mouse. The results showed that text entry rate for Face Interface was 20 characters per minute (cpm and 27 cpm for the mouse. For Face Interface, keystrokes per character (KSPC value was 1.1 and minimum string distance (MSD error rate was 0.12. These values compare especially well with other similar techniques.

  16. Structural correlates of rotavirus cell entry.

    Directory of Open Access Journals (Sweden)

    Aliaa H Abdelhakim

    2014-09-01

    Full Text Available Cell entry by non-enveloped viruses requires translocation into the cytosol of a macromolecular complex--for double-strand RNA viruses, a complete subviral particle. We have used live-cell fluorescence imaging to follow rotavirus entry and penetration into the cytosol of its ∼ 700 Å inner capsid particle ("double-layered particle", DLP. We label with distinct fluorescent tags the DLP and each of the two outer-layer proteins and track the fates of each species as the particles bind and enter BSC-1 cells. Virions attach to their glycolipid receptors in the host cell membrane and rapidly become inaccessible to externally added agents; most particles that release their DLP into the cytosol have done so by ∼ 10 minutes, as detected by rapid diffusional motion of the DLP away from residual outer-layer proteins. Electron microscopy shows images of particles at various stages of engulfment into tightly fitting membrane invaginations, consistent with the interpretation that rotavirus particles drive their own uptake. Electron cryotomography of membrane-bound virions also shows closely wrapped membrane. Combined with high resolution structural information about the viral components, these observations suggest a molecular model for membrane disruption and DLP penetration.

  17. 基于生物特征的Auto ID技术——BioID%Automated Biometric Personal Identification and Verification--BioID

    Institute of Scientific and Technical Information of China (English)

    李雄军; 苏廷弼

    2002-01-01

    文章全面而系统地综述了基于生物特征的Auto ID-BioID.重点分析了该技术与系统中的特殊问题,包括BioID系统通用模型、所使用的生物特征的类型、识别技术与系统设计上的共性与差异、性能要求及信号传输和存储两个关键问题;比较了声音、掌形、签名、脸谱、指纹、视网膜和虹膜几种典型的BioID技术的特点、性能与应用现状;探讨了BioID技术发展的动向与前景.

  18. The mathematical model for ID-201 semiconductor single photon counter%ID-201单光子计数器计数模型研究

    Institute of Scientific and Technical Information of China (English)

    曹攀; 朱广浩; 金飚兵

    2016-01-01

    InGaAs半导体单光子探测器具备探测性能强,集成度高等优势,在光谱分析和量子通信等领域有广泛的应用.本文以ID Quantique公司出品的ID-201半导体单光子计数器为研究对象,结合计数器核心部件雪崩光电二极管的工作原理探究其计数光子时的内部过程,推导出每秒钟光子计数值和该计数器几个重要参数触发频率(trigger frequency),门脉冲宽度(gate width),门强制关闭时间(dead time),探测效率(detection efficiency)之间的数学表达式.推导过程着重分析了计数门脉冲的关闭效应对光子探测概率的影响.首先利用泊松分布求解光子计数值与探测效率(detection efficiency)之间的关系,然后将计数过程分成两大部分,分析计数结果与门强制关闭时间(dead time)之间关系.求解得表达式后,利用1550 nm激光器作为ID-201的输入光源,在各种不同实验条件下,对该表达式的正确性进行了检验.%The technology of photon counting has wide applications in physics and electrical engineering.Single photon detectors based on avalanche photodiodes are attractive,Considering their advantages including compact sizes,broad spectrum of responses,and high detection efficiencies.The semiconductor single photon detector normally works in the gated mode,where photons can only be detected when the gate is open.However,if any photon is detected by the photon counter during the gate,several gates after the detection will be forced to shut down so that no photon can be detected during this period.The timing duration that the gates are down is called the dead time.This article mainly focuses on the photon counting performance of the ID-201 semiconductor photon counter,which is produced by the ID Quantique company.The purpose is to derive a photon counting formula for ID-201 and verify it using experiments.Starting with a simple Poisson distribution,we first studied the relationship between the detection

  19. Risk Factors Assessment of the Difficult Intubation using Intubation Difficulty Scale (IDS).

    Science.gov (United States)

    K Nasa, Vaibhav; S Kamath, Shaila

    2014-07-01

    The major responsibility of anaesthesiologist is to maintain adequate gas exchange in his patients in all circumstances and this require that patency of upper airway is constantly maintained. Problems with upper airway management are among the most frequent causes of anaesthetic mishaps. Using intubation difficulty scale (IDS) we made an attempt to objectively assess the predictors of difficult intubation. We assessed classical bedside tests such as modified Mallampati test, Thyromental distance test and also neck extension test. We prospectively observed 400 patients undergoing general anaesthesia with endotracheal intubation, for each patient intubation difficulty score was recorded during intubation. Risk factors assessment of difficult intubation done using IDS. Risk factor assessed includes modified mallampati class III and IV, thyromental distance ≤ 6cm and neck extension intubation (IDS, 0 to 2), slightly difficult intubation (IDS, 3 to 4) and difficult intubation (IDS 5). Preoperative airway assessment was done by thyromental distance measurement, neck extension measurement and modified mallampati test. Data was analysed using Receiver operating characteristic curve (ROC) and area under curve (AUC) for each test computed. pintubation was 8% and there were no failure to intubate the trachea. The AUC were as follows: modified Mallampati test 0.473 (ppredictor of difficult intubation (IDS≥5) in comparison to Thyromental test and modified mallampati test.

  20. Dynamic Programming for Single Nucleotide Polymorphism ID Identification in Systematic Association Studies

    Directory of Open Access Journals (Sweden)

    Cheng-Hong Yang

    2009-04-01

    Full Text Available Single nucleotide polymorphisms (SNPs play an important role in personalized medicine. However, the SNP data reported in many association studies provide only the SNP nucleotide/amino acid position, without providing the SNP ID recorded in National Center for Biotechnology Information databases. A tool with the ability to provide SNP ID identification, with a user-friendly interface, is needed. In this paper, a dynamic programming algorithm was used to compare homologs when the processed input sequence is aligned with the SNP FASTA database. Our novel system provides a web-based tool that uses the National Center for Biotechnology Information dbSNP database, which provides SNP sequence identification and SNP FASTA formats. Freely selectable sequence formats for alignment can be used, including general sequence formats (ACGT, [dNTP1/dNTP2] or IUPAC formats and orientation with bidirectional sequence matching. In contrast to the National Center for Biotechnology Information SNP-BLAST, the proposed system always provides the correct targeted SNP ID (SNP hit, as well as nearby SNPs (flanking hits, arranged in their chromosomal order and contig positions. The system also solves problems inherent in SNP-BLAST, which cannot always provide the correct SNP ID for a given input sequence. Therefore, this system constitutes a novel application which uses dynamic programming to identify SNP IDs from the literature and keyed-in sequences for systematic association studies. It is freely available at http://bio.kuas.edu.tw/SNPosition/.

  1. Changes of osteosarcoma cell biological behavior afterId1 gene silencing by siRNA

    Institute of Scientific and Technical Information of China (English)

    De-Li Xu

    2016-01-01

    Objective:To study the changes of osteosarcoma cell biological behaviors proliferation, migration and invasion afterId1gene silencing by siRNA.Methods:Osteosarcoma HEK293 cell lines were cultured and transfected with Id1-siRNA and NC-siRNA respectively, cell proliferation, migration and invasion were detected after 24 h and 48 h of transfection, and the expression levels of proliferation-promoting genes, proliferation-inhibiting genes as well as migration and invasion-related genes in cells were detected after 48 h of transfection. Results:After 24 h and 48 h of transfection, cell OD value and the number of invasive cells of Id1-siRNA group were significantly lower than those of NC-siRNA group, and scratch area was significantly larger than that of NC-siRNA group; after 48 h of transfection, hnRNP A2, hnRNP B1, S100A6, RUNX2, Aurora-A, Grb2, Gab2 and Rap2a expression levels of Id1-siRNA group were significantly lower than those of NC-siRNA group, and p53, TAp73 and IGFBP5 were significantly higher than those of NC-siRNA group.Conclusions:Id1 gene silencing by siRNA can inhibit osteosarcoma cell proliferation, migration and invasion.

  2. Relationship between major depressive disorder and ACE gene I/D polymorphism in a Turkish population

    Directory of Open Access Journals (Sweden)

    Sema Inanir

    2016-04-01

    Full Text Available Abstract Background Major depressive disorder (MDD is a complex disease and a significant health problem that is prevalent across the world. Angiotensin-converting enzyme (ACE has an important role in renin-angiotensin system (RAS and converts inactive angiotensin I to a potent vasopressor and aldosterone-stimulating peptide angiotensin II. Levels of ACE in plasma vary according to the insertion/deletion (I/D polymorphism of ACE gene. Objective The aim of the current study was to examine the influence ACE gene I/D variations on the risk of MDD. Methods In the present case-control study, we analyzed ACE I/D polymorphism in 346 MDD patients and 210 healthy subjects using polymerase chain reaction technique. Results Comparing the two groups, no significant difference was observed with regard to either genotype distributions or allele frequencies of the I/D polymorphism of ACE gene. Discussion Our findings suggest that the ACE I/D polymorphism is not associated with MDD in Turkish case-control study. Further studies are still needed.

  3. ACE I/D gene polymorphism in diabetic nephropathy: Clinical implications

    Directory of Open Access Journals (Sweden)

    M. Kaleemullah Khan

    2011-01-01

    Full Text Available Diabetic nephropathy (DN is a major microvascular complication accounting for about 30% of End-Stage Renal Disease (ESRD cases. An insertion/deletion (I/D polymorphism of the gene encoding angiotensin-I converting enzyme (ACE is reported to be a candidate gene predisposing to diabetic nephropathy. Accordingly, we investigated the ACE I/D gene polymorphism in 52 Type 2 diabetes mellitus (T2DM cases suffering from nephropathy as assessed by 24 hrs urinary protein levels. 50 age and sex matched healthy subjects served as controls. ACE I/D genotyping was carried out by polymerase chain reaction (PCR amplification using allele specific primers. The frequencies of ACE DD, ID and II genotypes in the diabetic nephropathy patients were 38.5% , 50% and 11.5% and in the control subjects, 22%, 38% and 40% respectively. There was an increase of 16.5% in the frequency of DD genotype in the patients compared to controls. The frequency of D allele in the patients was 63% which was found to be statistically significant (p< 0.05, Odds ratio=2.6 compared to 41% in the controls. These results indicate that Type 2 diabetic patients with D allele (those with DD & ID genotypes have more than two fold risk of developing nephropathy. Clinical implications of ACE genotyping in planning for patient’s management have been discussed.

  4. Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

    Directory of Open Access Journals (Sweden)

    Zeinab Latifi

    2013-08-01

    Full Text Available Capturing is the first step in intrusion detection system (IDS. Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not met, packet capture system is considered as the main bottleneck of IDS and the overall efficiency of this system will be influenced. Presence of all these three characteristics calls for utilization of hardware methods. In this paper, by using of FPGA, a line sniffing and load balancing system are designed in order to be applied in IDS systems. The main contribution of our work is the feasibility of attaching labels to the beginning part of each packet, aiming at quick easy access of other IDS modules to information of each packet and also reducing workload of these modules. Packet classification in the proposed system can be configured to 2, 3, and 5 tuple, which can also be applied in IDS detection module in addition to load balancing part of this system. Load balancing module uses Hash table and its Hash function has the least flows collisions. This system is implemented on a set of virtex 6 and 7 families and is able to capture packets 100% and perform the above mentioned processes by speed of 12 Gbit/s.

  5. Analytic Development of a Reference Profile for the First Entry in a Skip Atmospheric Entry

    Science.gov (United States)

    Garcia-Llama, Eduardo

    2010-01-01

    This note shows that a feasible reference drag profile for the first entry portion of a skip entry can be generated as a polynomial expression of the velocity. The coefficients of that polynomial are found through the resolution of a system composed of m + 1 equations, where m is the degree of the drag polynomial. It has been shown that a minimum of five equations (m = 4) are required to establish the range and the initial and final conditions on velocity and flight path angle. It has been shown that at least one constraint on the trajectory can be imposed through the addition of one extra equation in the system, which must be accompanied by the increase in the degree of the drag polynomial. In order to simplify the resolution of the system of equations, the drag was considered as being a probability density function of the velocity, with the velocity as a distribution function of the drag. Combining this notion with the introduction of empirically derived constants, it has been shown that the system of equations required to generate the drag profile can be successfully reduced to a system of linear algebraic equations. For completeness, the resulting drag profiles have been flown using the feedback linearization method of differential geometric control as a guidance law with the error dynamics of a second order homogeneous equation in the form of a damped oscillator. Satisfactory results were achieved when the gains in the error dynamics were changed at a certain point along the trajectory that is dependent on the velocity and the curvature of the drag as a function of the velocity. Future work should study the capacity to update the drag profile in flight when dispersions are introduced. Also, future studies should attempt to link the first entry, as presented and controlled in this note, with a more standard control concept for the second entry, such as the Apollo entry guidance, to try to assess the overall skip entry performance. A guidance law that includes

  6. Scale Insects, edition 2, a tool for the identification of potential pest scales at U.S.A. ports-of-entry (Hemiptera, Sternorrhyncha, Coccoidea

    Directory of Open Access Journals (Sweden)

    Dug Miller

    2014-08-01

    Full Text Available We provide a general overview of features and technical specifications of an online, interactive tool for the identification of scale insects of concern to the U.S.A. ports-of-entry. Full lists of terminal taxa included in the keys (of which there are four, a list of features used in them, and a discussion of the structure of the tool are provided. We also briefly discuss the advantages of interactive keys for the identification of potential scale insect pests. The interactive key is freely accessible on http://idtools.org/id/scales/index.php

  7. Scale Insects, edition 2, a tool for the identification of potential pest scales at U.S.A. ports-of-entry (Hemiptera, Sternorrhyncha, Coccoidea).

    Science.gov (United States)

    Miller, Douglass R; Rung, Alessandra; Parikh, Grishma

    2014-01-01

    We provide a general overview of features and technical specifications of an online, interactive tool for the identification of scale insects of concern to the U.S.A. ports-of-entry. Full lists of terminal taxa included in the keys (of which there are four), a list of features used in them, and a discussion of the structure of the tool are provided. We also briefly discuss the advantages of interactive keys for the identification of potential scale insect pests. The interactive key is freely accessible on http://idtools.org/id/scales/index.php.

  8. Study Results on Knowledge Requirements for Entry-Level Airport Operations and Management Personnel

    Science.gov (United States)

    Quilty, Stephen M.

    2005-01-01

    This paper identifies important topical knowledge areas required of individuals employed in airport operations and management positions. A total of 116 airport managers and airfield operations personnel responded to a survey that sought to identify the importance of various subject matter for entry level airport operations personnel. The results from this study add to the body of research on aviation management curriculum development and can be used to better develop university curriculum and supplemental training focused on airport management and operations. Recommendations are made for specialized airport courses within aviation management programs. Further, this study identifies for job seekers or individuals employed in entry level positions those knowledge requirements deemed important by airport managers and operations personnel at different sized airports.

  9. Entry Mode Strategies into the Brazil, Russia, India and China (BRIC) markets

    DEFF Research Database (Denmark)

    Hollensen, Svend; Dyhr Ulrich, Anna Marie; Boyd, Britta

    2014-01-01

    (control, flexibility and risk) were evaluated less important than personnel and financial resources for the BRIC markets. The most important external factor was market potential whereas the trade barriers, cultural distance as well as the political and economical risk are viewed as main obstacles when......This article explores the relevance of different entry modes for Danish exporting small and medium enterprises (SMEs). Internal and external resources that influence the choice of entry modes into the Brazil, Russia, India and China (BRIC) markets are investigated from both a resource-based view...... (RBV) and a market-based view (MBV). The survey conducted by the University of Southern Denmark in 2012 is based on a sample of 177 Danish SMEs. Our results of this study show that Danish companies entering the BRIC markets mainly prefer low commitment modes. The more traditional internal factors...

  10. Orthopoxvirus species and strain differences in cell entry

    Energy Technology Data Exchange (ETDEWEB)

    Bengali, Zain; Satheshkumar, P.S. [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States); Moss, Bernard, E-mail: bmoss@nih.gov [Laboratory of Viral Diseases, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892-3210 (United States)

    2012-11-25

    Vaccinia virus (VACV) enters cells by a low pH endosomal route or by direct fusion with the plasma membrane. We previously found differences in entry properties of several VACV strains: entry of WR was enhanced by low pH, reduced by bafilomycin A1 and relatively unaffected by heparin, whereas entry of IHD-J, Copenhagen and Elstree were oppositely affected. Since binding and entry modes may have been selected by specific conditions of in vitro propagation, we now examined the properties of three distinct, recently isolated cowpox viruses and a monkeypox virus as well as additional VACV and cowpox virus strains. The recent isolates were more similar to WR than to other VACV strains, underscoring the biological importance of endosomal entry by orthopoxviruses. Sequence comparisons, gene deletions and gene swapping experiments indicated that viral determinants, other than or in addition to the A26 and A25 'fusion-suppressor' proteins, impact entry properties.

  11. Mid-L/D Lifting Body Entry Demise Analysis

    Science.gov (United States)

    Ling, Lisa

    2017-01-01

    The mid-lift-to-drag ratio (mid-L/D) lifting body is a fully autonomous spacecraft under design at NASA for enabling a rapid return of scientific payloads from the International Space Station (ISS). For contingency planning and risk assessment for the Earth-return trajectory, an entry demise analysis was performed to examine three potential failure scenarios: (1) nominal entry interface conditions with loss of control, (2) controlled entry at maximum flight path angle, and (3) controlled entry at minimum flight path angle. The objectives of the analysis were to predict the spacecraft breakup sequence and timeline, determine debris survival, and calculate the debris dispersion footprint. Sensitivity analysis was also performed to determine the effect of the initial pitch rate on the spacecraft stability and breakup during the entry. This report describes the mid-L/D lifting body and presents the results of the entry demise and sensitivity analyses.

  12. FHL2 Antagonizes Id1-Promoted Proliferation and Invasive Capacity of Human MCF-7 Breast Cancer Cells

    Institute of Scientific and Technical Information of China (English)

    Wei-dong Han; Zhi-qiang Wu; Ya-li Zhao; Yi-ling Si; Ming-zhou Guo; Xiao-bing Fu

    2010-01-01

    Objective:FHL2 was previously identified to be a novel interacting factor of Id family proteins.The aim of this study was to investigate,the effects of FHL2 on Id1-mediated transcriptional regulation activity and its oncogenic activity in human breast cancer cells.Methods:Cell transfection was performed by Superfect reagent.Id1 stably overexpressed MCF-7 cells was cloned by G418 screening.The protein level of Id1 was detected by western blot analysis.Dual relative luciferase assays were used to measure the effect of E47-mediated transcriptional activity in MCF-7 human breast cancer cells.MTT assay was used to measure cell proliferation.Transwell assay was used to measure the invasive capacity of MCF-7 cancer cells.Results:The basic helix-loop-helix(bHLH)factor E47-mediated transcription activity was markedly repressed by Id1 in MCF-7 cells.This Id1-mediated repression was effectively antagonized by FHL2 transduction.Overexpression of Id1 markedly promoted the proliferation rate and invasive capacity of MCF-7 cells; however,these effects induced by Id1 were significantly suppressed by overexpression of FHL2 in cells.Conclusion:FHL2 can inhibit the proliferation and invasiveness of human breast cancer cells by repressing the functional activity of Id1.These findings provide the basis for further investigating the functional roles of FHL2-Id1 signaling in the carcinogenesis and development of human breast cancer.

  13. Aspirin inhibits hepatitis C virus entry by downregulating claudin-1.

    Science.gov (United States)

    Yin, P; Zhang, L

    2016-01-01

    Aspirin has previously been reported to inhibit hepatitis C virus (HCV) replication. The aim of this study was to investigate whether aspirin is involved in blocking HCV entry. We found that aspirin inhibits the entry of HCVpp and infectious HCV. The level of claudin-1, an HCV receptor, is reduced by aspirin. Our results extend the anti-HCV effect of aspirin to the HCV entry step and further reinforce the anti-HCV role of aspirin.

  14. Analysis of data mining classification by comparison of C4.5 and ID algorithms

    Science.gov (United States)

    Sudrajat, R.; Irianingsih, I.; Krisnawan, D.

    2017-01-01

    The rapid development of information technology, triggered by the intensive use of information technology. For example, data mining widely used in investment. Many techniques that can be used assisting in investment, the method that used for classification is decision tree. Decision tree has a variety of algorithms, such as C4.5 and ID3. Both algorithms can generate different models for similar data sets and different accuracy. C4.5 and ID3 algorithms with discrete data provide accuracy are 87.16% and 99.83% and C4.5 algorithm with numerical data is 89.69%. C4.5 and ID3 algorithms with discrete data provides 520 and 598 customers and C4.5 algorithm with numerical data is 546 customers. From the analysis of the both algorithm it can classified quite well because error rate less than 15%.

  15. ID-based deniable ring authentication with constant-size signature

    Institute of Scientific and Technical Information of China (English)

    Lingling WANG; Guoyin ZHANG; Chunguang MA

    2008-01-01

    Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumu-lators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deni-able ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model.

  16. Formalization and Parsing of Typed Unification-Based ID/LP Grammars

    CERN Document Server

    Morawietz, F

    1999-01-01

    This paper defines unification based ID/LP grammars based on typed feature structures as nonterminals and proposes a variant of Earley's algorithm to decide whether a given input sentence is a member of the language generated by a particular typed unification ID/LP grammar. A solution to the problem of the nonlocal flow of information in unification ID/LP grammars as discussed in Seiffert (1991) is incorporated into the algorithm. At the same time, it tries to connect this technical work with linguistics by presenting an example of the problem resulting from HPSG approaches to linguistics (Hinrichs and Nakasawa 1994, Richter and Sailer 1995) and with computational linguistics by drawing connections from this approach to systems implementing HPSG, especially the TROLL system, Gerdemann et al. (forthcoming).

  17. Comportamiento del inversionista a diferentes niveles de inversión en I+D

    Directory of Open Access Journals (Sweden)

    Ángel Samaniego Alcántar

    2012-01-01

    Full Text Available Este trabajo analiza, usando una metodología alterna a la existente en la literatura del tema, la existencia de rendimientos anormales en el corto plazo ocasionados por cambios en la intensidad de la inversión en proyectos de investigación y desarrollo, I+D (R&D intensity. Se observa que los inversionistas obtienen rendimientos anormales en portafolios de empresas que incrementan entre cinco a diez unidades la intensidad del I+D (o cuando este incremento es mayor a 25 unidades. Sin embargo, ante decrementos en la intensidad del I+D no se observan desviaciones en los rendimientos esperados; asimismo, el rendimiento anormal es mayor en empresas de alta tecnología. El periodo analizado es 2001-2006 en los mercados AMEX, NYSE y NASDAQ.

  18. ACE I/D genotype, adiposity, and blood pressure in children

    Directory of Open Access Journals (Sweden)

    Rothschild Max

    2009-03-01

    Full Text Available Abstract Background Angiotensin converting enzyme (ACE is a possible candidate gene that may influence both body fatness and blood pressure. Although several genetic studies have been conducted in adults, relatively few studies have examined the contribution of potential candidate genes, and specifically ACE I/D, on adiposity and BP phenotypes in childhood. Such studies may prove insightful for the development of the obesity-hypertension phenotype early in life. The purpose of this study was to examine differences in body fatness and resting blood pressure (BP by ACE I/D genotype, and determine if the association between adiposity and BP varies by ACE I/D genotype in children. Methods 152 children (75 girls, 77 boys were assessed for body composition (% body fat using dual energy x-ray absorbtiometry and resting BP according to American Heart Association recommendations. Buccal cell samples were genotyped using newly developed PCR-RFLP tests for two SNPs (rs4341 and rs4343 in complete linkage disequilibrium with the ACE I/D polymorphism. Partial correlations were computed to assess the ociations between % body fat and BP in the total sample and by genotype. ANCOVA was used to examine differences in resting BP by ACE I/D genotype and fatness groups. Results Approximately 39% of youth were overfat based on % body fat (>30% fat in girls, 25% fat in boys. Body mass, body mass index, and fat-free mass were significantly higher in the ACE D-carriers compared to the II group (p Conclusion ACE D-carriers are heavier than ACE II children; however, BP did not differ by ACE I/D genotype but was adversely influenced in the overfat D-carriers. Further studies are warranted to investigate the genetics of fatness and BP phenotypes in children.

  19. Methodological aspects of journaling a dynamic adjusting entry model

    Directory of Open Access Journals (Sweden)

    Vlasta Kašparovská

    2011-01-01

    Full Text Available This paper expands the discussion of the importance and function of adjusting entries for loan receivables. Discussion of the cyclical development of adjusting entries, their negative impact on the business cycle and potential solutions has intensified during the financial crisis. These discussions are still ongoing and continue to be relevant to members of the professional public, banking regulators and representatives of international accounting institutions. The objective of this paper is to evaluate a method of journaling dynamic adjusting entries under current accounting law. It also expresses the authors’ opinions on the potential for consistently implementing basic accounting principles in journaling adjusting entries for loan receivables under a dynamic model.

  20. An Integrated Approach for Entry Mission Design and Flight Simulations

    Science.gov (United States)

    Lu, Ping; Rao, Prabhakara

    2004-01-01

    An integrated approach for entry trajectory design, guidance, and simulation is proposed. The key ingredients for this approach are an on-line 3 degree-of-freedom entry trajectory planning algorithm and the entry guidance algorithm that generates the guidance gains automatically. When fully developed, such a tool could enable end-bend entry mission design and simulations in 3DOF and 6DOF mode from de-orbit burn to the TAEM interface and beyond, all in one key stroke. Some preliminary examples of such a capability are presented in this paper that demonstrate the potential of this type of integrated environment.

  1. A novel peptide that inhibits HIV-1 entry

    Institute of Scientific and Technical Information of China (English)

    YU Yong; HUANG Xiaoxing; WANG Qiong; YANG Yaling; TIAN Po; ZHANG Wentao

    2004-01-01

    @@ The global epidemic of HIV infection, the cause of AIDS, has created an urgent need for novel classes of antiretroviral agent. Besides reverse transcriptase and protease, the viral entry process provides new anti-HIV-1 targets. A new generation of antiviral drugs intended to block HIV entry into host cells is now under develop- ment[1]. These compounds are generally referred to as fusion or entry inhibitor. Several HIV-1 entry inhibitors that target CD4-gp120 interactions, co-receptor function, and gp41-mediated membrane fusion are in different stages of clinical development[2].

  2. Protease Inhibitors Targeting Coronavirus and Filovirus Entry

    Science.gov (United States)

    Zhou, Yanchen; Vedantham, Punitha; Lu, Kai; Agudelo, Juliet; Carrion, Ricardo; Nunneley, Jerritt W.; Barnard, Dale; Pöhlmann, Stefan; McKerrow, James H.; Renslo, Adam R.; Simmons, Graham

    2016-01-01

    In order to gain entry into cells, diverse viruses, including Ebola virus, SARS-coronavirus and the emerging MERS-coronavirus, depend on activation of their envelope glycoproteins by host cell proteases. The respective enzymes are thus excellent targets for antiviral intervention. In cell culture, activation of Ebola virus, as well as SARS- and MERS-coronavirus can be accomplished by the endosomal cysteine proteases, cathepsin L (CTSL) and cathepsin B (CTSB). In addition, SARS- and MERS-coronavirus can use serine proteases localized at the cell surface, for their activation. However, it is currently unclear which protease(s) facilitate viral spread in the infected host. We report here that the cysteine protease inhibitor K11777, ((2S)-N-[(1E,3S)-1-(benzenesulfonyl)-5-phenylpent-1-en-3-yl]-2-{[(E)-4-methylpiperazine-1-carbonyl]amino}-3-phenylpropanamide) and closely-related vinylsulfones act as broad-spectrum antivirals by targeting cathepsin-mediated cell entry. K11777 is already in advanced stages of development for a number of parasitic diseases, such as Chagas disease, and has proven to be safe and effective in a range of animal models. K11777 inhibition of SARS-CoV and Ebola virus entry was observed in the sub-nanomolar range. In order to assess, whether cysteine or serine proteases promote viral spread in the host, we compared the antiviral activity of an optimized K11777-derivative with that of camostat, an inhibitor of TMPRSS2 and related serine proteases. Employing a pathogenic animal model of SARS-CoV infection, we demonstrated that viral spread and pathogenesis of SARS-CoV is driven by serine rather than cysteine proteases and can be effectively prevented by camostat. Camostat has been clinically used to treat chronic pancreatitis, and thus represents an exciting potential therapeutic for respiratory coronavirus infections. Our results indicate that camostat, or similar serine protease inhibitors, might be an effective option for treatment of SARS and

  3. Entry into the Postparental Phase of the Family Life Cycle

    Directory of Open Access Journals (Sweden)

    Barbara Wawrzyniak

    2015-02-01

    Full Text Available Der Originalbeitrag in deutscher Sprache ist verfügbar unter: Bd. 40 (2015: Ausgewählte deutsche BeiträgeThe article examines entry into the postparental phase of the family life cycle, which is the familial situation when all children have moved out of the parental household. We position this event chronologically within the life course and examine the probability of occurrence. Using panel data (3 survey waves covering a period of 40 years of a cohort of former North-Rhine Westphalian grammar school pupils, event history models (Cox regression are employed to analyse what factors accelerate or decelerate the transition. This revealed that the parent’s individual biography (in particular the age at the own move out, age at the birth of the first child and the number of children has a major impact on the time of occurrence, while the occupational history has no effect. In addition, sons delay the transition, while children’s academic studies and occupation accelerate it.

  4. Role of ID Proteins in BMP4 Inhibition of Profibrotic Effects of TGF-β2 in Human TM Cells

    Science.gov (United States)

    Mody, Avani A.; Wordinger, Robert J.; Clark, Abbot F.

    2017-01-01

    Purpose Increased expression of TGF-β2 in primary open-angle glaucoma (POAG) aqueous humor (AH) and trabecular meshwork (TM) causes deposition of extracellular matrix (ECM) in the TM and elevated IOP. Bone morphogenetic proteins (BMPs) regulate TGF-β2–induced ECM production. The underlying mechanism for BMP4 inhibition of TGF-β2–induced fibrosis remains undetermined. Bone morphogenic protein 4 induces inhibitor of DNA binding proteins (ID1, ID3), which suppress transcription factor activities to regulate gene expression. Our study will determine whether ID1and ID3 proteins are downstream targets of BMP4, which attenuates TGF-β2 induction of ECM proteins in TM cells. Methods Primary human TM cells were treated with BMP4, and ID1 and ID3 mRNA, and protein expression was determined by quantitative PCR (Q-PCR) and Western immunoblotting. Intracellular ID1 and ID3 protein localization was studied by immunocytochemistry. Transformed human TM cells (GTM3 cells) were transfected with ID1 or ID3 expression vectors to determine their potential inhibitory effects on TGF-β2–induced fibronectin and plasminogen activator inhibitor-I (PAI-1) protein expression. Results Basal expression of ID1-3 was detected in primary human TM cells. Bone morphogenic protein 4 significantly induced early expression of ID1 and ID3 mRNA (P < 0.05) and protein in primary TM cells, and a BMP receptor inhibitor blocked this induction. Overexpression of ID1 and ID3 significantly inhibited TGF-β2–induced expression of fibronectin and PAI-1 in TM cells (P < 0.01). Conclusions Bone morphogenic protein 4 induced ID1 and ID3 expression suppresses TGF-β2 profibrotic activity in human TM cells. In the future, targeting specific regulators may control the TGF-β2 profibrotic effects on the TM, leading to disease modifying IOP lowering therapies. PMID:28159972

  5. Suurnimed jäid müümata / Maria-Kristiina Soomre

    Index Scriptorium Estoniae

    Soomre, Maria-Kristiina, 1978-

    2001-01-01

    9. mai Christie' oksjonist, müümata jäänud Picasso, Degas', Cezanne'i tööd. 8. mai Sotheby oksjonist, kus edukalt müüdi töid S. J. Seegeri kogust, 3,85 miljoni dollari eest M. Beckmanni "Perseuse viimane katsumus". Sotheby kaasaegse kunsti oksjonil New Yorgis müüdi 5,6 miljoni dollari eest J. Koonsi skulptuur M. Jacksonist. Müümata jäid A. Warholi "Viis supipurki", A. Calderi 3 skulptuuri

  6. Pairing-Free ID-Based Key-Insulated Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Guo-Bin Zhu; Hu Xiong; Zhi-Guang Qin

    2015-01-01

    Abstract⎯Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based (ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm (DL) assumption, a security proof of our scheme in the random oracle model has also been given.

  7. Tamaño, restricciones financieras e inversión en i+d

    OpenAIRE

    María Ángeles Marra Domínguez

    2007-01-01

    Este trabajo analiza empíricamente los efectos de restricciones de liquidez en la inversión en actividades de I+D de una muestra de empresas manufactureras españolas clasificada según su tamaño durante el periodo 1991-1999. Las estimaciones confirman que la inversión en I+D emprendida por las empresas de menor tamaño presenta una mayor sensibilidad al cash flow y una relación negativa fuerte con la tasa de endeudamiento, lo que sugiere la posible presencia de restricciones financieras. Por el...

  8. MA- IDS: A Distributed Intrusion Detection System Based on Data Mining

    Institute of Scientific and Technical Information of China (English)

    SUN Jian-hua; JIN Hai; CHEN Hao; HAN Zong-fen

    2005-01-01

    Aiming at the shortcomings in intrusion detection systems (IDSs) used in commercial and research fields,we propose the MA-IDS system, a distributed intrusion detection system based on data mining. In this model, misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS) are combined. Data mining is applied to raise detection performance, and distributed mechanism is employed to increase the scalability and efficiency. Host- and network-based mining algorithms employ an improved Bayesian decision theorem that suits for real security environment to minimize the risks incurred by false decisions. We describe the overall architecture of the MA-IDS system, and discuss specific design and implementation issue.

  9. Evaluation of S. aureus ID, a New Chromogenic Agar Medium for Detection of Staphylococcus aureus

    OpenAIRE

    Perry, John D.; Rennison, Claire; Butterworth, Lynne A.; Hopley, Andrew L. J.; Gould, F. Kate

    2003-01-01

    S. aureus ID (bioMérieux, La Balme Les Grottes, France) is a new chromogenic agar medium designed to enable the isolation of staphylococci and the specific identification of Staphylococcus aureus. S. aureus produces green colonies on this medium due to production of α-glucosidase. To evaluate this medium, a total of 350 wound swabs were cultured onto S. aureus ID, CHROMagar Staph. aureus, and conventional media routinely used in our laboratory. After 18 to 20 h of incubation, 96.8% of strains...

  10. Projectc conception for city logistics with utilization of IDS element applicated to the Nitra city

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2010-02-01

    Full Text Available Nowadays traffic situation in the town-residential area is characterized by growing requirement for quality and quantityof transfer performance and services that result in congestion increasing in the some towns. Currently the similar problem has Nitracity, where it is necessary to solve this situation immediately. One of the possibilities of increasing traffic fluency is to extend roads, butin case of Nitra that possibility is irrelevant because of non-available space. Other possibility is an utilization of IDS elements(Intelligent Transport System. The contribution presents the conception of transportation in the town, founded on creation of trafficcircles with subsequent IDS elements application.

  11. Comportamiento del inversionista a diferentes niveles de inversión en I+D

    OpenAIRE

    Ángel Samaniego Alcántar; Carlos Omar Trejo Pech; Samuel Mongrut Montalván; Darcy Fuenzalida O´Shee

    2012-01-01

    Este trabajo analiza, usando una metodología alterna a la existente en la literatura del tema, la existencia de rendimientos anormales en el corto plazo ocasionados por cambios en la intensidad de la inversión en proyectos de investigación y desarrollo, I+D (R D intensity). Se observa que los inversionistas obtienen rendimientos anormales en portafolios de empresas que incrementan entre cinco a diez unidades la intensidad del I+D (o cuando este incremento es mayor a 25 unidades). Sin embargo,...

  12. Investigation on AQ11, ID3 and the Principle of Discernibility Matrix

    Institute of Scientific and Technical Information of China (English)

    王珏; 崔佳; 赵凯

    2001-01-01

    The principle of discernibility matrix serves as a tool to discuss and analyze two algorithms of traditional inductive machine learning, AQ11 and ID3. The results are: (1) AQ11 and its family can be completely specified by the principle of discernibility matrix; (2) ID3 can be partly, but not naturally, specified by the principle of discernibility matrix; and (3) The principle of discernibility matrix is employed to analyze Cendrowska sample set, and it shows the weaknesses of knowledge representation style of decision tree in theory.

  13. Gestión de la incertidumbre en los proyectos de I+D

    OpenAIRE

    García Muntión, Paula

    2014-01-01

    En el presente TFM se estudian diferentes metodologías y herramientas con el objeto de presentar una propuesta metodológica basada en el PMBOK que facilite la gestión de los Proyectos I+D. Para realizar esta propuesta y facilitar la implantación de una gestión de proyectos adecuada a las características de los proyectos de I+D será fundamental identificar cuáles son los principales bloqueadores y facilitadores que se encuentran. La propuesta metodológica deberá contemplar el tratamiento de...

  14. Heatshield for Extreme Entry Environment Technology (HEEET)

    Science.gov (United States)

    Venkatapathy, E.; Ellerby, D.; Stackpoole, M..; Peterson, K.; Gage, P.; Beerman, A.; Blosser, M.; Chinnapongse, R.; Dillman, R.; Feldman, J.; Gasch, M.; Munk, M.; Prabhu, D.; Poteet, C.

    2013-01-01

    Heat-shield for Extreme Entry Technology (HEEET) project is based on the 3-D Woven TPS, an emerging innovative and game changing technology funded by SMD and STMD to fill the ablative TPS gap that exists currently for reaching the depths of Saturn and Venus. Woven TPS technology will address the challenges currently faced by the Venus, Saturn, and higher speed sample return mission Science community due to lack of availability of the only TPS, namely Carbon Phenolic and enable the Science community to move forward with proposals in this decade with Woven TPS. This presentation describes the approach in maturing the technology in the next three years enabling NF-4 mission proposers to address the challenges of Venus, Saturn or higher speed sample return missions.

  15. Lattice Boltzmann modeling of water entry problems

    Science.gov (United States)

    Zarghami, A.; Falcucci, G.; Jannelli, E.; Succi, S.; Porfiri, M.; Ubertini, S.

    2014-12-01

    This paper deals with the simulation of water entry problems using the lattice Boltzmann method (LBM). The dynamics of the free surface is treated through the mass and momentum fluxes across the interface cells. A bounce-back boundary condition is utilized to model the contact between the fluid and the moving object. The method is implemented for the analysis of a two-dimensional flow physics produced by a symmetric wedge entering vertically a weakly-compressible fluid at a constant velocity. The method is used to predict the wetted length, the height of water pile-up, the pressure distribution and the overall force on the wedge. The accuracy of the numerical results is demonstrated through comparisons with data reported in the literature.

  16. Wnt1 is epistatic to Id2 in inducing mammary hyperplasia, ductal side-branching, and tumors in the mouse

    Directory of Open Access Journals (Sweden)

    Yokota Yoshifumi

    2004-12-01

    Full Text Available Abstract Background During pregnancy, the mammary glands from Id2 mutant animals are deficient in lobulo-alveolar development. This failure of development is believed to be due to a proliferation defect. Methods We have asked whether functional Id2 expression is necessary for Wnt induced mammary hyperplasia, side branching, and cancer, by generating mice expressing a Wnt1 transgene in an Id2 mutant background. Results We show in this work that forced expression of Wnt1 in the mammary gland is capable of overcoming the block to proliferation caused by the absence of Id2. We also show that Wnt1 expression is able to cause mammary tumors in an Id2 mutant background. Conclusions We conclude that functional Id2 expression is not required for Wnt1 to induce mammary hyperplasia and mammary tumors.

  17. Are entry criteria for cataract surgery justified?

    Directory of Open Access Journals (Sweden)

    Daniel Böhringer

    Full Text Available PURPOSE: The German Ophthalmological Society (GOS recently proposed surgical entry criteria, i.e. 300 cataract surgeries. We herein correlate the surgical hands-on experience with the risk of posterior capsule ruptures in order to assess whether this number is appropriate. METHODS: We identified all cataract operations that had been performed at the University Eye Hospital Freiburg since 1995. For each surgeon, we assigned a running number to his/her procedures in the order they had been performed. Thereafter, we excluded all combined procedures and the second eyes. We then selected the 5475 surgical reports between November 2008 and November 2012 for detailed review. We additionally classified each surgery into low- vs. high- à priori risk for posterior capsule ruptures. We fitted a multifactorial logistic regression model to assess the GOS recommendation of 300 surgeries under supervision. In the low-risk group, we additionally visualized the 'typical' learning curve by plotting the posterior capsule ruptures against the respective rank numbers. RESULTS: The odds ratio for posterior capsule ruptures of 'learning-mode' (one of the respective surgeon's 300 first procedures vs. the non-learning-mode was 3.8 (p<0.0001. By contrast, classification into the low-risk group lowered the risk of posterior capsule ruptures three fold (p<0.0001. According to the low-risk plot, the surgeons started with a complication rate of 4% and continuously improved towards 0.5% after 1500 operations. Thereafter, the rate increased again and stabilized around one percent. CONCLUSION: The learning curve with respect to posterior capsule ruptures is surprisingly flat. The GOS entry criterion of 300 cataract procedures is therefore most likely justified. Careful selection of low-risk patients for the training surgeons may help in reducing the rate of posterior capsule ruptures during training.

  18. The Hera Saturn entry probe mission

    Science.gov (United States)

    Mousis, O.; Atkinson, D. H.; Spilker, T.; Venkatapathy, E.; Poncy, J.; Frampton, R.; Coustenis, A.; Reh, K.; Lebreton, J.-P.; Fletcher, L. N.; Hueso, R.; Amato, M. J.; Colaprete, A.; Ferri, F.; Stam, D.; Wurz, P.; Atreya, S.; Aslam, S.; Banfield, D. J.; Calcutt, S.; Fischer, G.; Holland, A.; Keller, C.; Kessler, E.; Leese, M.; Levacher, P.; Morse, A.; Muñoz, O.; Renard, J.-B.; Sheridan, S.; Schmider, F.-X.; Snik, F.; Waite, J. H.; Bird, M.; Cavalié, T.; Deleuil, M.; Fortney, J.; Gautier, D.; Guillot, T.; Lunine, J. I.; Marty, B.; Nixon, C.; Orton, G. S.; Sánchez-Lavega, A.

    2016-10-01

    The Hera Saturn entry probe mission is proposed as an M-class mission led by ESA with a contribution from NASA. It consists of one atmospheric probe to be sent into the atmosphere of Saturn, and a Carrier-Relay spacecraft. In this concept, the Hera probe is composed of ESA and NASA elements, and the Carrier-Relay Spacecraft is delivered by ESA. The probe is powered by batteries, and the Carrier-Relay Spacecraft is powered by solar panels and batteries. We anticipate two major subsystems to be supplied by the United States, either by direct procurement by ESA or by contribution from NASA: the solar electric power system (including solar arrays and the power management and distribution system), and the probe entry system (including the thermal protection shield and aeroshell). Hera is designed to perform in situ measurements of the chemical and isotopic compositions as well as the dynamics of Saturn's atmosphere using a single probe, with the goal of improving our understanding of the origin, formation, and evolution of Saturn, the giant planets and their satellite systems, with extrapolation to extrasolar planets. Hera's aim is to probe well into the cloud-forming region of the troposphere, below the region accessible to remote sensing, to the locations where certain cosmogenically abundant species are expected to be well mixed. By leading to an improved understanding of the processes by which giant planets formed, including the composition and properties of the local solar nebula at the time and location of giant planet formation, Hera will extend the legacy of the Galileo and Cassini missions by further addressing the creation, formation, and chemical, dynamical, and thermal evolution of the giant planets, the entire solar system including Earth and the other terrestrial planets, and formation of other planetary systems.

  19. Passive Earth Entry Vehicle Landing Test

    Science.gov (United States)

    Kellas, Sotiris

    2017-01-01

    Two full-scale passive Earth Entry Vehicles (EEV) with realistic structure, surrogate sample container, and surrogate Thermal Protection System (TPS) were built at NASA Langley Research Center (LaRC) and tested at the Utah Test and Training Range (UTTR). The main test objective was to demonstrate structural integrity and investigate possible impact response deviations of the realistic vehicle as compared to rigid penetrometer responses. With the exception of the surrogate TPS and minor structural differences in the back shell construction, the two test vehicles were identical in geometry and both utilized the Integrated Composite Stiffener Structure (ICoSS) structural concept in the forward shell. The ICoSS concept is a lightweight and highly adaptable composite concept developed at NASA LaRC specifically for entry vehicle TPS carrier structures. The instrumented test vehicles were released from a helicopter approximately 400 m above ground. The drop height was selected such that at least 98% of the vehicles terminal velocity would be achieved. While drop tests of spherical penetrometers and a low fidelity aerodynamic EEV model were conducted at UTTR in 1998 and 2000, this was the first time a passive EEV with flight-like structure, surrogate TPS, and sample container was tested at UTTR for the purpose of complete structural system validation. Test results showed that at a landing vertical speed of approximately 30 m/s, the test vehicle maintained structural integrity and enough rigidity to penetrate the sandy clay surface thus attenuating the landing load, as measured at the vehicle CG, to less than 600 g. This measured deceleration was found to be in family with rigid penetrometer test data from the 1998 and 2000 test campaigns. Design implications of vehicle structure/soil interaction with respect to sample container and sample survivability are briefly discussed.

  20. Experimental wake survey behind Viking 75 entry vehicle at angles of attack of 0 deg, 5 deg, and 10 deg, Mach numbers from 0.20 to 1.20, and longitudinal stations from 1.50 to 11.00 body diameters

    Science.gov (United States)

    Brown, C. A., Jr.; Campbell, J. F.

    1973-01-01

    An investigation was conducted to obtain flow properties in the wake of a preliminary configuration of the Viking '75 Entry Vehicle at Mach numbers from 0.20 to 1.20 and at angles of attack of 0 deg, 5 deg, and 10 deg. The wake flow properties were calculated from total and static pressures measured with a pressure rake at longitudinal stations varying from 1.50 to 11.00 body diameters, and are presented in tabulated and plotted form. The wake properties were essentially symmetrical about the X-axis at alpha = 0 deg and the profiles were shifted away from the X-axis at angles of attack. An unexpected reduction in wake property ratios occurred as the Mach number increased from 0.60 to 1.00; these ratios then increased as the Mach number increased to 1.20. The reduction was present for all the longitudinal stations of the tests and decreased with increased longitudinal distance.

  1. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    Science.gov (United States)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K. P.; Sarma, K. S. S.

    2017-02-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli.

  2. Attitudes of Israeli Teachers and Paraprofessionals towards the New Definition of ID and Their Willingness to Cope with Special Education Law Changes

    Science.gov (United States)

    Lifshitz, Hefziba; Nissim, Shoshanna; Cohen, Sara

    2008-01-01

    Attitudes of teachers (N = 96) and paraprofessionals (N = 48) working with students with intellectual disability (ID) towards the new definition of ID (Luckasson et al., 1992, 2002), was examined. The main innovation of the new definition of ID is the cancellation of the four ID levels, suggesting an optimistic view, especially towards individuals…

  3. 77 FR 59639 - Bear Lake National Wildlife Refuge, Bear Lake County, ID and Oxford Slough Waterfowl Production...

    Science.gov (United States)

    2012-09-28

    ... public, including opportunities for hunting, fishing, wildlife observation and photography, and... review at the following libraries: Bear Lake County Library, 138 North 6th Street, Montpelier, ID 83254...

  4. Entry, Descent, and Landing Operations Analysis for the Stardust Entry Capsule

    Science.gov (United States)

    Desai, Prasun N.; Lyons, Dan T.; Tooley, Jeff; Kangas, Julie

    2008-01-01

    On the morning of January 15, 2006, the Stardust capsule successfully landed at the Utah Test and Training range in northwest Utah returning cometary samples from the comet Wild-2. An overview of the entry, descent, and landing (EDL) trajectory analysis that was performed for targeting during the mission operations phase upon final approach to Earth is described. The final orbit determination solution produced an inertial entry flight-path angle of -8.21 deg (the desired nominal value) with a 3-sigma uncertainty of +/-0.0017 deg (2% of the requirement). The navigation and EDL operations effort accurately delivered the entry capsule to the desired landing site. The final landing location was 8.1 km from the target, which was well within the allowable landing area. Overall, the Earth approach operation procedures worked well and there were no issues (logistically or performance based) that arose. As a result, the process of targeting a capsule from an interplanetary trajectory and accurately landing it on Earth was successfully demonstrated.

  5. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…

  6. Permutations with Kazhdan-Lusztig polynomial P_{id,w}(q) = 1 + q^h

    OpenAIRE

    Woo, Alexander; Billey, Sara; Weed, Jonathan

    2008-01-01

    Using resolutions of singularities introduced by Cortez and a method for calculating Kazhdan-Lusztig polynomials due to Polo, we prove the conjecture of Billey and Braden characterizing permutations w with Kazhdan-Lusztig polynomial P_{id,w}(q)=1+q^h for some h.

  7. 76 FR 36896 - Salmon-Challis National Forest, ID; Forestwide Invasive Plant Treatment Environmental Impact...

    Science.gov (United States)

    2011-06-23

    ... Forest Service Salmon-Challis National Forest, ID; Forestwide Invasive Plant Treatment Environmental... impact statement. SUMMARY: Invasive plants have been identified as a major threat to the biological diversity and ecological integrity within and outside the Salmon-Challis National Forest. Invasive plants...

  8. Accelerated fermentation of Idli batter using Eleusine coracana and Pennisetum glaucum.

    Science.gov (United States)

    Chelliah, Ramachandran; Ramakrishnan, Sudha Rani; Premkumar, Divya; Antony, Usha

    2017-08-01

    The present study focuses on reduction in fermentation time of idli batter and its enrichment with calcium and iron using finger millet and pearl millet. Fermentation time decreased from 12 to 6 h with addition of finger millet and to 8 h with pearl millet. Rate of fermentation, bulk density, viscosity, microbial changes and particle morphology were assessed in the batter; nutritional quality, sensory, phytochemicals and internal characteristics of idli were investigated. The color and texture characteristics of both batter and idli were evaluated. The pH and titratable acidity of control batter at 6 h was 5.32 and 0.27%, addition of finger and pearl millet changed to 4.32, 0.45% and 4.53, 0.45% at respective fermentation times (6 and 8 h). The viable yeast, lactic acid bacteria and total bacterial count (log CFU g(-1)) in the batters increased with time, reaching 1.26, 3.85, 4.56 (control); 2.32, 9.84, 9.58 (finger millet) and 1.76, 7.34, 7.74 (pearl millet) respectively at the end of 6 h of fermentation. Addition of finger millet and pearl millet flour (10% w/w) to the batter enhanced the dietary fiber by 28 and 23%, calcium by 113 and 56%, iron by 51 and 258% in the respective idlies when compared with the control.

  9. 76 FR 46721 - Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project...

    Science.gov (United States)

    2011-08-03

    ... this project area to improve the health of the ecosystem and reach the desired future condition. DATES...; ] DEPARTMENT OF AGRICULTURE Forest Service Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem... the potential for large-scale, high-intensity wildfires that threaten human life, property, and...

  10. RPD: Reusable Pseudo-Id Distribution for a Secure and Privacy Preserving VANET

    Directory of Open Access Journals (Sweden)

    Sulaiman Ashraph

    2013-08-01

    Full Text Available In any VANET, security and privacy are the two fundamental issues. Obtaining efficient security in vehicular communication is essential without compromising privacy-preserving mechanisms. Designing a suitable protocol for VANET by having these two issues in mind is challenging because efficiency, unlinkablity and traceability are the three qualities having contradictions between them. In this paper, we introduce an efficient Reusable Pseudo-id Distribution (RPD scheme. The Trusted Authority (TA designating the Road Side Units (RSUs to generate n reusable pseudo ids and distribute them to the On Board Units (OBUs on request characterizes the proposed protocol. RSUs issue the aggregated hashes of all its valid pseudo-ids along with a symmetric shared key and a particular pseudo-id to each vehicle that enters into its coverage range. Through this the certificates attached to the messages can be eliminated and thus resulting in a significantly reduced packet size. The same anonymous keys can then be re-distributed by the RSUs episodically to other vehicles. We analyze the proposed protocol extensively to demonstrate its merits and efficiency.

  11. Enrolment Data of Disabled Students Of IGNOU: A Case Study Using ID3

    Directory of Open Access Journals (Sweden)

    Nidhi Chopra

    2013-06-01

    Full Text Available In this paper, a methodology based on ID3 – a decision based learning technique for classification of disabled students of IGNOU has been evolved, for creating peer-to-peer groups. This can facilitate an environment for mutual help and academic interaction. The purpose is to promote blended social learning.

  12. Support and Self-Efficacy among Latino and White Parents of Children with ID

    Science.gov (United States)

    Cohen, Shana R.; Holloway, Susan D.; Dominguez-Pareto, Irenka; Kuppermann, Miriam

    2015-01-01

    Research indicates that mothers of children with ID who receive familial support experience less stress than those who receive less support. Less is known about the relation of support to mothers' evaluation of parenting self-efficacy, particularly in Latino families. We examined the relationship of different types of family support to life…

  13. 61 FR 42052 - Owyhee Resource Area, ID; Resource Management Plan, etc.

    Science.gov (United States)

    1996-08-13

    ... Bureau of Land Management Owyhee Resource Area, ID; Resource Management Plan, etc. AGENCY: Bureau of Land... Management Plan (RMP) and associated draft Environmental Impact Statement (EIS) for the Owyhee Resource Area... be sent to: Owyhee Area Manager, Bureau of Land Management, Boise Field Office, 3948...

  14. 70 FR 9098 - Notice of Realty Action, Sale of Public Land in Owyhee County, ID

    Science.gov (United States)

    2005-02-24

    ... Bureau of Land Management Notice of Realty Action, Sale of Public Land in Owyhee County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Realty Action, Sale of Public Land in Owyhee... located in Owyhee County, Idaho is suitable for direct sale to Owyhee County under Sections 203 and 209...

  15. 81 FR 23746 - Temporary Road Closure on Public Lands in Owyhee County, ID

    Science.gov (United States)

    2016-04-22

    ... Bureau of Land Management Temporary Road Closure on Public Lands in Owyhee County, ID AGENCY: Bureau of... 1-mile road segment that crosses public lands located in Owyhee County, Idaho, approximately 5 miles... the Owyhee Field Office, 20 First Avenue West, Marsing, Idaho, 83639. National Environmental...

  16. 61 FR 11862 - Shooting Closures and Restrictions in Ada, Canyon, Elmore, and Owyhee Counties, ID

    Science.gov (United States)

    1996-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Shooting Closures and Restrictions in Ada, Canyon, Elmore, and Owyhee Counties, ID AGENCY: Bureau of Land... Bruneau, Kuna, and Owyhee Management Framework Plans. Violation of this order is punishable by a fine...

  17. 77 FR 75654 - Notice of Temporary Closures on Public Lands in Owyhee County, ID

    Science.gov (United States)

    2012-12-21

    ... Bureau of Land Management Notice of Temporary Closures on Public Lands in Owyhee County, ID AGENCY... are in effect on public lands administered by the Owyhee Field Office, Bureau of Land Management (BLM... contact Loretta Chandler, Owyhee Field Office Manager at 20 First Ave. West, Marsing, Idaho, 83639,...

  18. Identification of an active ID-like group of SINEs in the mouse.

    Science.gov (United States)

    Kass, David H; Jamison, Nicole

    2007-09-01

    The mouse genome consists of five known families of SINEs: B1, B2, B4/RSINE, ID, and MIR. Using RT-PCR we identified a germ-line transcript that demonstrates 92.7% sequence identity to ID (excluding primer sequence), yet a BLAST search identified numerous matches of 100% sequence identity. We analyzed four of these elements for their presence in orthologous genes in strains and subspecies of Mus musculus as well as other species of Mus using a PCR-based assay. All four analyzed elements were identified either only in M. musculus or exclusively in both M. musculus and M. domesticus, indicative of recent integrations. In conjunction with the identification of transcripts, we present an active ID-like group of elements that is not derived from the proposed BC1 master gene of ID elements. A BLAST of the rat genome indicated that these elements were not in the rat. Therefore, this family of SINEs has recently evolved, and since it has thus far been observed mainly in M. musculus, we refer to this family as MMIDL.

  19. BICM-ID with Physical Layer Network Coding in TWR Free Space Optical Communication Links

    Directory of Open Access Journals (Sweden)

    Alaa A. Saeed Al-Rubaie

    2017-07-01

    Full Text Available Physical layer network coding (PNC is a promising technique to improve the network throughput in a two-way relay (TWR channel for two users to exchange messages across a wireless network. The PNC technique incorporating a TWR channel is embraced by a free space optical (FSO communication link for full utilization of network resources, namely TWR-FSO PNC. In this paper, bit interleaved coded modulation with iterative decoding (BICM-ID is adopted to combat the deleterious effect of the turbulence channel by saving the message being transmitted to increase the reliability of the system. Moreover, based on this technique, comparative studies between end-to-end BICM-ID code, non-iterative convolutional coded and uncoded systems are carried out. Furthermore, this paper presents the extrinsic information transfer (ExIT charts to evaluate the performance of BICM-ID code combined with the TWR-FSO PNC system. The simulation results show that the proposed scheme can achieve a significant bit error rate (BER performance improvement through the introduction of an iterative process between a soft demapper and decoder. Similarly, Monte Carlo simulation results are provided to support the findings. Subsequently, the ExIT functions of the two receiver components are thoroughly analysed for a variety of parameters under the influence of a turbulence-induced channel fading, demonstrating the convergence behaviour of BICM-ID to enable the TWR-FSO PNC system, effectively mitigating the impact of the fading turbulence channel.

  20. 75 FR 57053 - Camas National Wildlife Refuge, Jefferson County, ID; Comprehensive Conservation Plan and...

    Science.gov (United States)

    2010-09-17

    ... Conservation Plan and Environmental Assessment AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of... prepare a comprehensive conservation plan (CCP) for Camas National Wildlife Refuge (refuge) in Hamer, ID... Refuge System, consistent with sound principles of fish and wildlife management, conservation,...

  1. nuID: a universal naming scheme of oligonucleotides for Illumina, Affymetrix, and other microarrays

    Directory of Open Access Journals (Sweden)

    Kibbe Warren A

    2007-05-01

    Full Text Available Abstract Background Oligonucleotide probes that are sequence identical may have different identifiers between manufacturers and even between different versions of the same company's microarray; and sometimes the same identifier is reused and represents a completely different oligonucleotide, resulting in ambiguity and potentially mis-identification of the genes hybridizing to that probe. Results We have devised a unique, non-degenerate encoding scheme that can be used as a universal representation to identify an oligonucleotide across manufacturers. We have named the encoded representation 'nuID', for nucleotide universal identifier. Inspired by the fact that the raw sequence of the oligonucleotide is the true definition of identity for a probe, the encoding algorithm uniquely and non-degenerately transforms the sequence itself into a compact identifier (a lossless compression. In addition, we added a redundancy check (checksum to validate the integrity of the identifier. These two steps, encoding plus checksum, result in an nuID, which is a unique, non-degenerate, permanent, robust and efficient representation of the probe sequence. For commercial applications that require the sequence identity to be confidential, we have an encryption schema for nuID. We demonstrate the utility of nuIDs for the annotation of Illumina microarrays, and we believe it has universal applicability as a source-independent naming convention for oligomers. Reviewers This article was reviewed by Itai Yanai, Rong Chen (nominated by Mark Gerstein, and Gregory Schuler (nominated by David Lipman.

  2. Epigenetic regulation of ID4 in the determination of the BRCAness phenotype in breast cancer.

    Science.gov (United States)

    Branham, M T; Campoy, E; Laurito, S; Branham, R; Urrutia, G; Orozco, J; Gago, F; Urrutia, R; Roqué, M

    2016-01-01

    BRCAness breast tumors represent a group of sporadic tumors characterized by a reduction in BRCA1 gene expression. As BRCA1 is involved in double-strand breaks (DSBs) repair, dysfunctional BRCA pathway could make a tumor sensitive to DNA damaging drugs (e.g., platinum agents). Thus, accurately identifying BRCAness could contribute to therapeutic decision making in patients harboring these tumors. The purpose of this study was to identify if BRCAness tumors present a characteristic methylation profile and/or were related to specific clinico-pathological features. BRCAness was measured by MLPA in 63 breast tumors; methylation status of 98 CpG sites within 84 cancer-related genes was analyzed by MS-MLPA. Protein and mRNA expressions of the selected genes were measured by quantitative real-time PCR and Western Blot. BRCAness was associated with younger age, higher nuclear pleomorphism, and triple-negative (TN) status. Epigenetically, we found that the strongest predictors for BRCAness tumors were the methylations of MLH1 and PAX5 plus the unmethylations of CCND2 and ID4. We determined that ID4 unmethylation correlated with the expression levels of both its mRNA and protein. We observed an inverse relation between the expressions of ID4 and BRCA1. To the best of our knowledge, this is the first report suggesting an epigenetic regulation of ID4 in BRCAness tumors. Our findings give new information of BRCAness etiology and encourage future studies on potential drug targets for BRCAness breast tumors.

  3. Espen Schaannings Foucault: Idéhistoriske intervensjoner i den norske Foucault-resepsjonen

    OpenAIRE

    Lillebø, Jonas Gamborg; Vik, Bjørnar Mortensen

    2009-01-01

    Artikkelen konsentrerer seg om et sentralt problem: Foucault som historiker og som filosof. Problemet aktualiseres ved en kritisk gjennomgang av Espen Schaannings lesing og formidling av Foucault som idéhistorisk intervenør. Er dette en for generaliserende lesning? Og er dette holdbart som en allmenn teori om historievitenskap?

  4. 78 FR 77024 - Telemarketing Sales Rule; Notice of Termination of Caller ID Rulemaking

    Science.gov (United States)

    2013-12-20

    ...' Caller ID displays, subjecting them to consumer complaints and the loss of business goodwill.\\16\\ \\14\\ E...., Herb Weisbaum, Why aren't phone companies doing more to block robocalls?, NBC News, July 17, 2013, www.nbcnews.com/business/why-arent-phone-companies-doing-more-block-robocalls-6C10641251 ; www.nomorobo.com...

  5. 76 FR 23321 - New Sweden Irrigation District, ID; Notice of Preliminary Permit Application Accepted for Filing...

    Science.gov (United States)

    2011-04-26

    ... Energy Regulatory Commission New Sweden Irrigation District, ID; Notice of Preliminary Permit Application..., 2011, New Sweden Irrigation District filed an application for a preliminary permit, pursuant to section 4(f) of the Federal Power Act (FPA), proposing to study the feasibility of the New...

  6. Validation of the Inventory of Depressive Symptomatology (IDS) in Cocaine Dependent Inmates.

    Science.gov (United States)

    Suris, Alina; Kashner, T. Michael; Gillaspy, James A., Jr.; Biggs, Melanie; Rush, A. John

    2001-01-01

    While the reliability and validity of Inventory of Depressive Symptomatology (IDS) scores have been established with outpatient adults being treated in community psychiatric clinics, it has not been used in special or dually diagnosed populations. Establishes internal consistency, concurrent validity, and construct validity for both the clinical…

  7. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2014-01-01

    Full Text Available The existence of malicious participants is a major threat for authenticated group key exchange (AGKE protocols. Typically, there are two detecting ways (passive and active to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID- based public key system (R-IDPKS was proposed to solve the revocation problem in the ID-based public key system (IDPKS. Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

  8. Perspectives on the Role of Geo-Technologies for Addressing Contemporary Urban Issues: Implications for IDS

    NARCIS (Netherlands)

    Pfeffer, K.; Verrest, H.

    2016-01-01

    Contemporary patterns of urbanization come with many challenges regarding the quality of urban life, especially with respect to the provision of urban infrastructures and housing, exposure to environmental risks and urban inequalities. In International Development Studies (IDS) it is understood that

  9. Typing of Amerindian Kichwas and Mestizos from Ecuador with the SNPforID multiplex

    DEFF Research Database (Denmark)

    Poulsen, Lena; Børsting, Claus; Tomas, Carmen

    2011-01-01

    A total of 119 unrelated individuals from two of the major ethnic groups in Ecuador were typed for 49 of the autosomal single nucleotide polymorphisms (SNPs) in the SNPforID 52plex using the SNapShot® assay. Of the above, 42 samples originated from Mestizos (an admixed population) and the remaining...

  10. The Critical Role of the ID in Interactive Television: The Value of Immediacy.

    Science.gov (United States)

    Murphy, Karen L.; Farr, Charlotte W.

    The instructional designer (ID) plays a critical role in the development and viability of each course taught at a distance, particularly in the incorporation of immediacy behaviors, or communication behaviors that convey approachability and communicate interpersonal warmth and closeness. Faculty development must be fostered to encourage immediacy…

  11. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  12. KorAP: the new corpus analysis platform at IDS Mannheim

    DEFF Research Database (Denmark)

    Banski, Piotr; Bingel, Joachim; Diewald, Nils

    2013-01-01

    The KorAP project (“Korpusanalyseplattform der nächste Generation”, “Corpus-analysis platform of the next generation”), carried out at the Institut für Deutsche Sprache (IDS) in Mannheim, Germany, has as its goal the development of a modern, state-of-the-art corpus-analysis platform, capable...

  13. 75 FR 22625 - Notice of Realty Action; Direct Sale of Public Land in Jerome County, ID

    Science.gov (United States)

    2010-04-29

    ... Bureau of Land Management Notice of Realty Action; Direct Sale of Public Land in Jerome County, ID AGENCY... for direct (non-competitive) sale to Todd and Bridget Buschhorn under the provisions of the Federal...: In order to ensure consideration in the environmental analysis of the proposed sale, comments must...

  14. 76 FR 29784 - Notice of Realty Action; Direct Sale of Public Lands in Jerome County, ID

    Science.gov (United States)

    2011-05-23

    ... Bureau of Land Management Notice of Realty Action; Direct Sale of Public Lands in Jerome County, ID... being proposed for direct sale to Todd and Bridget Buschhorn in accordance with Sections 203 and 209 of..., and is not needed for any other Federal purposes. The direct sale will allow for the subject parcel...

  15. 78 FR 39767 - Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID

    Science.gov (United States)

    2013-07-02

    ... Bureau of Land Management Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID AGENCY... proposed for direct sale to PORR in accordance with Sections 203 and 209 of the Federal Land Policy and... best be served by modified competitive bidding or direct (non-competitive) sale. In this instance,...

  16. 75 FR 71143 - Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID

    Science.gov (United States)

    2010-11-22

    ... Bureau of Land Management Notice of Realty Action: Direct Sale of Public Land in Blaine County, ID AGENCY.... SUPPLEMENTARY INFORMATION: The following described public land is being proposed for direct sale to the Animal... Animal Shelter. Regulations contained in 43 CFR 2711.3-3 permit direct sales when a competitive sale...

  17. Coupling Molecular Modeling to the Traditional "IR-ID" Exercise in the Introductory Organic Chemistry Laboratory

    Science.gov (United States)

    Stokes-Huby, Heather; Vitale, Dale E.

    2007-01-01

    This exercise integrates the infrared unknown identification ("IR-ID") experiment common to most organic laboratory syllabi with computer molecular modeling. In this modification students are still required to identify unknown compounds from their IR spectra, but must additionally match some of the absorptions with computed frequencies they…

  18. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  19. External validity of the Indonesian Wechsler Adult Intelligence Scale - Fourth edition (WAIS-IV-ID)

    NARCIS (Netherlands)

    Suwartono, C.; Hidajat, L.L.; Halim, M.S.; Hendriks, M.P.H.; Kessels, R.P.C.

    2016-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV-ID) has been adapted and proved to be valid for its internal structure for Indonesian population. The same structure found as in the American WAIS-IV (WAIS-IV-US; Suwartono, Hendriks, Hidajat, Halim, & Kessels, 2015). Despite its strong i

  20. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  1. The Id, Ego and Super-Ego in "Pride and Prejudice"

    Science.gov (United States)

    Liang, Yamin

    2011-01-01

    This paper mainly analyses the the id, ego, and super-ego which exists in the main character Elizabeth from several aspects, such as her pursuit for love, her prejudice towards Mr. Darcy, and the changes in her attitudes towards Wickham. This analysis helps readers appreciate this masterpiece from a different aspect which is related to the…

  2. System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

    CERN Document Server

    Kuribayashi, Shin-ichi

    2010-01-01

    The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system as a social infrastructure like the Internet. First, this paper proposes the virtualization method of RFID tag network system to enable the same physical RFID network system to be used by multiple different service systems. The system virtualization not only reduces the system cost but also can dramatically reduce the installation space of physical readers and the operation cost. It is proposed that all equipments in the RFID network system except RFID tag could be shared with the conventional virtual technologies. Then, this paper proposes the conditional tag ID processing and the efficient tag ID transmission method which can greatly reduce the processing time and processing load in RFID tag Infrastructure network The conditional tag ID processing allows that tag ID is valid only at a certain time zone of day or in a certain area. ...

  3. 77 FR 56608 - Designation for the Pocatello, ID; Evansville, IN; and Salt Lake City, UT Areas

    Science.gov (United States)

    2012-09-13

    ... regarding the designation criteria in section 79(f) of the USGSA (7 U.S.C. 79(f)) and determined that Idaho... location and Designation Designation Official agency telephone start end Idaho Pocatello, ID (208) 233-8303... unless terminated by the Secretary; however, designations may be renewed according to the criteria...

  4. 77 FR 55813 - Transition of DOE-ID Public Reading Room

    Science.gov (United States)

    2012-09-11

    ... Library at 1776 Science Center Drive, Idaho Falls, ID 83401, beginning September 1, 2012. Access to documents will also be electronically accessible through the World Wide Web. For direction in accessing documents electronically through the World Wide Web, please refer to the Idaho Operations FOIA Web site...

  5. 76 FR 13976 - Eastern Idaho Resource Advisory Committee; Caribou-Targhee National Forest, Idaho Falls, ID

    Science.gov (United States)

    2011-03-15

    ... Forest Service Eastern Idaho Resource Advisory Committee; Caribou-Targhee National Forest, Idaho Falls, ID AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: Pursuant to the authorities in... Self-Determination Act of 2000 (Pub. L. 106-393) the Caribou-Targhee National Forests' Eastern Idaho...

  6. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…

  7. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  8. Identification of clinical yeasts by Vitek MS system compared with API ID 32 C.

    Science.gov (United States)

    Durán-Valle, M Teresa; Sanz-Rodríguez, Nuria; Muñoz-Paraíso, Carmen; Almagro-Moltó, María; Gómez-Garcés, José Luis

    2014-05-01

    We performed a clinical evaluation of the Vitek MS matrix-assisted laser desorption ionization-time-of-flight mass spectrometry (MALDI-TOF MS) system with the commercial database version 2.0 for rapid identification of medically important yeasts as compared with the conventional phenotypic method API ID 32 C. We tested 161 clinical isolates, nine isolates from culture collections and five reference strains. In case of discrepant results or no identification with one or both methods, molecular identification techniques were employed. Concordance between both methods was observed with 160/175 isolates (91.42%) and misidentifications by both systems occurred only when taxa were not included in the respective databases, i.e., one isolate of Candida etchellsii was identified as C. globosa by Vitek MS and two isolates of C. orthopsilosis were identified as C. parapsilosis by API ID 32 C. Vitek MS could not identify nine strains (5.14%) and API ID 32 C did not identify 13 (7.42%). Vitek MS was more reliable than API ID 32 C and reduced the time required for the identification of clinical isolates to only a few minutes.

  9. The transition to practice of Direct Entry Clinical Nurse Leader graduates.

    Science.gov (United States)

    Shatto, Bobbi; Meyer, Geralyn; Delicath, Timothy A

    2016-07-01

    This study looks at Direct Entry Clinical Nurse Leader graduates and how their transition to practice experiences develops over time as well as factors influencing their transition. Graduates were surveyed at graduation, three, six and 12 months. Seventeen participated; eight completed all surveys. Most were from the Millennial generation. The survey consisted of two parts: school satisfaction and the Casey-Fink Graduate Nurse Experience Scale. The results showed the Casey-Fink total score at 12 months was 0.75 points higher than at three months; suggesting a positive transition. The highest score occurred at six months which conversely had the lowest levels of satisfaction with both educational experience and intent to stay in their current role. Despite having 850 precepted/mentored clinical hours, 57.1% of these graduates stated they felt unprepared for the reality of nursing after 12 months. Regardless of feeling unprepared, the results suggest these students displayed a positive transition to practice. At 12 months, 88.2% were still with their first employers which contrasted the results of Casey-Fink and other studies of Millennial gradate nurses, which showed higher actual and intent to leave results. This study suggests that Direct Entry Clinical Nurse Leader students do indeed transition to practice more positively than traditional nursing graduates.

  10. 19 CFR 145.24 - Amendment of entry.

    Science.gov (United States)

    2010-04-01

    ... director is satisfied that the objection is valid and timely, he shall amend the mail entry. If the duty... 19 Customs Duties 2 2010-04-01 2010-04-01 false Amendment of entry. 145.24 Section 145.24 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE...

  11. 19 CFR 4.35 - Unlading outside port of entry.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Unlading outside port of entry. 4.35 Section 4.35 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE... of entry. (a) Upon written application from the interested party, the port director concerned, if...

  12. Strategic advantage and the optimal exercise of entry options

    NARCIS (Netherlands)

    E.C. Perotti; S. Rossetto

    2001-01-01

    We investigate the timing and the valuation of strategic investment aimed at enhancing entry opportunities in related market segments. As demand is uncertain, entry options should be exercised at the optimal time, trading off the market share gain against the option to wait until more information is

  13. The Importance of Prior Probabilities for Entry Page Search

    NARCIS (Netherlands)

    Kraaij, W.; Westerveld, T.H.W.; Hiemstra, D.

    2002-01-01

    An important class of searches on the world-wide-web has the goal to find an entry page (homepage) of an organisation. Entry page search is quite different from Ad Hoc search. Indeed a plain Ad Hoc system performs disappointingly. We explored three non-content features of web pages: page length, num

  14. 18 CFR 33.5 - Proposed accounting entries.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Proposed accounting... § 33.5 Proposed accounting entries. If the applicant is required to maintain its books of account in... present proposed accounting entries showing the effect of the transaction with sufficient detail...

  15. 15 CFR 2011.204 - Entry of specialty sugars.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Entry of specialty sugars. 2011.204... UNITED STATES TRADE REPRESENTATIVE ALLOCATION OF TARIFF-RATE QUOTA ON IMPORTED SUGARS, SYRUPS AND MOLASSES Specialty Sugar § 2011.204 Entry of specialty sugars. An importer or the importer's agent...

  16. Strategic advantage and the optimal exercise of entry options

    NARCIS (Netherlands)

    Perotti, E.C.; Rossetto, S.

    2001-01-01

    We investigate the timing and the valuation of strategic investment aimed at enhancing entry opportunities in related market segments. As demand is uncertain, entry options should be exercised at the optimal time, trading off the market share gain against the option to wait until more information is

  17. Racial/Ethnic Disparities in ADHD Diagnosis by Kindergarten Entry

    Science.gov (United States)

    Morgan, Paul L.; Hillemeier, Marianne M.; Farkas, George; Maczuga, Steve

    2014-01-01

    Background: Whether and to what extent racial/ethnic disparities in attention-deficit/hyperactivity disorder (ADHD) diagnosis occur by kindergarten entry is currently unknown. We investigated risk factors associated with an ADHD diagnosis by kindergarten entry generally, and specifically whether racial/ethnic disparities in ADHD diagnosis occur by…

  18. Foreign Bank Entry and Credit Allocation in Emerging Markets

    NARCIS (Netherlands)

    Degryse, H.A.; Havrylchyk, O.; Jurzyk, E.; Kozak, S.

    2009-01-01

    We employ a unique data set containing bank-specific information to explore how foreign bank entry determines credit allocation in emerging markets. We investigate the impact of the mode of foreign entry (greenfield or takeover) on banks’ portfolio allocation to borrowers with different degrees of

  19. Foreign Bank Entry and Credit Allocation in Emerging Markets

    NARCIS (Netherlands)

    Degryse, H.A.; Havrylchyk, O.; Jurzyk, E.; Kozak, S.

    2009-01-01

    We employ a unique data set containing bank-specific information to explore how foreign bank entry determines credit allocation in emerging markets. We investigate the impact of the mode of foreign entry (greenfield or takeover) on banks’ portfolio allocation to borrowers with different degrees of i

  20. Racial/Ethnic Disparities in ADHD Diagnosis by Kindergarten Entry

    Science.gov (United States)

    Morgan, Paul L.; Hillemeier, Marianne M.; Farkas, George; Maczuga, Steve

    2014-01-01

    Background: Whether and to what extent racial/ethnic disparities in attention-deficit/hyperactivity disorder (ADHD) diagnosis occur by kindergarten entry is currently unknown. We investigated risk factors associated with an ADHD diagnosis by kindergarten entry generally, and specifically whether racial/ethnic disparities in ADHD diagnosis occur by…

  1. 19 CFR 146.64 - Entry for warehouse.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry for warehouse. 146.64 Section 146.64 Customs... (CONTINUED) FOREIGN TRADE ZONES Transfer of Merchandise From a Zone § 146.64 Entry for warehouse. (a) Foreign... status may not be entered for warehouse from a zone. Merchandise in nonprivileged foreign...

  2. 19 CFR 151.63 - Information on entry summary.

    Science.gov (United States)

    2010-04-01

    ... estimated or actual net weight of the wool or hair in its condition as imported, its total estimated clean... THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.63 Information on entry summary. Each entry summary covering wool or hair subject to duty at a rate per...

  3. 31 CFR 357.0 - Book-entry systems.

    Science.gov (United States)

    2010-07-01

    ... non-Internet-based book-entry system maintained by Treasury for purchasing and holding marketable...) TreasuryDirect ®. TreasuryDirect is a book-entry, online system maintained by the Department of the Treasury for purchasing and holding eligible marketable Treasury securities, United States Savings...

  4. 19 CFR 146.63 - Entry for consumption.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Entry for consumption. 146.63 Section 146.63... TREASURY (CONTINUED) FOREIGN TRADE ZONES Transfer of Merchandise From a Zone § 146.63 Entry for consumption... status may be entered for consumption from a zone. (b) Zone-restricted merchandise. Merchandise in a zone...

  5. Événement, idéologie et utopie

    Directory of Open Access Journals (Sweden)

    Jean-Luc AMALRIC

    2014-12-01

    Full Text Available RESUMEL’hypothèse que tente d’esquisser cet article est que l’idée ricœurienne d’une médiatisation dynamique des contradictions de l’imaginaire social présuppose une corrélation originaire de l’idéologie et de l’utopie qui ne peut elle-même être comprise qu’à partir de l’événement de l’institution d’un imaginaire social constituant. Dans un premier temps, l’article s’efforce de cerner ce qui fait la spécificité de la théorie ricœurienne de l’idéologie et de l’utopie comme « pratiques imaginatives », en soulignant à ce titre l’influence déterminante des thèses de Jacques Ellul sur l’idéologie. Puis, dans un second temps, il s’engage dans une analyse régressive qui conduit de la réappropriation ricœurienne de la conception dialectique de l’idéologie et de l’utopie exposée par Mannheim à l’idée d’un fondement événementiel de ces deux formes opposées de l’imaginaire social.Mots-Clés : Evénement, idéologie, utopie, Ellul, Mannheim. ABSTRACTThis paper attempts to sketch out the hypothesis that the Ricœurian conception of a dynamic mediatization of the contradictions of the social imaginary presupposes an original correlation between ideology and utopia, which can itself be understood only from the event that institutes a constitutive social imaginary. The first part of the paper marks out the specificity of the Ricœurian theory of ideology and utopia in terms of “imaginative practices”, underlining the determining influence of Jacques Ellul’s theses on ideology. The second part tries to develop a regressive argument, starting from the Ricœurian re-appropriation of Mannheim’s dialectical conception of ideology and utopia, and leading back to the idea of an event foundation for these two opposed forms of the social imaginary.Keywords : Event, Ideology, Utopia, Ellul, Mannheim   

  6. [Identification of a novel mutation of IDS gene from a Chinese pedigree with MPS II].

    Science.gov (United States)

    GUO, Yi-Bin; PAN, Hong-Da; GUO, Chun-Miao; LI, Yong-Mei; CHEN, Lu-Ming

    2009-11-01

    The purpose of this study was to understand the molecular genetic mechanism of mucopolysaccharidosis type II (MPS II) and to provide a prerequisite for future prenatal gene diagnosis. A preliminary diagnosis was made by qualitative detection of Urinary Glycosaminoglycans of the suspected MPS II proband. Then, mutation detection was performed on the proband and his family members with PCR and direct sequencing of PCR products. After the novel mutation of c.876 del 2 in IDS gene was detected, sequence analysis was performed on exon 6 of IDS gene of the 135 cases, which consisted of 120 randomly selected normal controls, and other 15 patients with MPS I, IV, and VI other than MPS II. Besides, the patho-genicity of the novel mutation was analyzed with the following 2 methods: conservative analysis of the sequence of muta-tion spots of different species and the direct test of the IDS enzyme activity of the patient and his relative family members. The result of uroscopy of the proband was strong positive (GAGs +++). There was a novel deletion mutation of c.876-877 del TC in the coding region of exon 6 of IDS gene, which was a hemizygous mutation. However, the mutation of his mother and sister was a heterozygous mutation. Detection of the exon 6 of IDS gene showed that the mutation was not found among normal controls and other patients with MPS I, IV, and VI other than MPS II. Homology comparison of amino acid sequences from different species showed that the phenylalanine (F) glutamine (Q) of the mutation site of c.876-877 del TC located in p.292-293 was highly conserved. The activity of IDS enzyme of the proband was only 2.3 nmol/4 h/mL, which was much lower than normal; but the activity of IDS enzyme of his father, mother and sister was 641.9 nmol/4 h/mL, 95.8 nmol/4h/mL and 103.2 nmol/4h/mL, respectively. These results illustrated that the deletion and frame-shift mutation of c.876-877 del TC detected was a novel pathologic mutation, which was the underlying cause of

  7. Robotic Surveying

    Energy Technology Data Exchange (ETDEWEB)

    Suzy Cantor-McKinney; Michael Kruzic

    2007-03-01

    ZAPATA ENGINEERING challenged our engineers and scientists, which included robotics expertise from Carnegie Mellon University, to design a solution to meet our client's requirements for rapid digital geophysical and radiological data collection of a munitions test range with no down-range personnel. A prime concern of the project was to minimize exposure of personnel to unexploded ordnance and radiation. The field season was limited by extreme heat, cold and snow. Geographical Information System (GIS) tools were used throughout this project to accurately define the limits of mapped areas, build a common mapping platform from various client products, track production progress, allocate resources and relate subsurface geophysical information to geographical features for use in rapidly reacquiring targets for investigation. We were hopeful that our platform could meet the proposed 35 acres per day, towing both a geophysical package and a radiological monitoring trailer. We held our breath and crossed our fingers as the autonomous Speedrower began to crawl across the playa lakebed. We met our proposed production rate, and we averaged just less than 50 acres per 12-hour day using the autonomous platform with a path tracking error of less than +/- 4 inches. Our project team mapped over 1,800 acres in an 8-week (4 days per week) timeframe. The expertise of our partner, Carnegie Mellon University, was recently demonstrated when their two autonomous vehicle entries finished second and third at the 2005 Defense Advanced Research Projects Agency (DARPA) Grand Challenge. 'The Grand Challenge program was established to help foster the development of autonomous vehicle technology that will some day help save the lives of Americans who are protecting our country on the battlefield', said DARPA Grand Challenge Program Manager, Ron Kurjanowicz. Our autonomous remote-controlled vehicle (ARCV) was a modified New Holland 2550 Speedrower retrofitted to allow the machine

  8. ID3算法在ATM选点预测系统中的应用%Application of ID3 algorithm in ATM election prediction system

    Institute of Scientific and Technical Information of China (English)

    于海涛; 姚耀文

    2010-01-01

    ATM的应用日益广泛,如何部署一个利用率高的ATM已成为一个值得探讨的问题.运用数据挖掘知识和决策树ID3算法,可以对已经部署ATM的地区进行分析,从而找出高利用率ATM地区的特征,并建立ATM选点模型,作为金融机构在何处部署高效的ATM的参考.

  9. The regulation of matrix metalloproteinases by Id1 in gastric cancer%由Id1介导的MMP-2、MMP-9对胃癌生成的调控作用

    Institute of Scientific and Technical Information of China (English)

    雷婷; 韩霜; 郭雪艳; 丁杰

    2011-01-01

    Background and purpose: Angiogenesis is critical for the development of all malignancies.Id transcription factors have been shown to regulate key steps in tumor growth and metastasis due to their effects on angiogenesis.This study investigated the possible relationship between Id1 and matrix metalloproteinases (MMPs)in angiogenesis of gastric cancer.Methods: Expressions of Id1 and MMPs in gastric cancer tissues were examined by immunohistochemistry.The human gastric cancer SGC7901 sub-cell lines expressing Id1-siRNA was established.Expressions of MMP-2 and MMP-9 in Id1-siRNA transfectants were examined by semi-quantitative RT-PCR and Western blot.Enzyme activity of MMP-2 and MMP-9 in Id1-siRNA cells were detected by zymography method.Expressions of MMP-2 and MMP-9 in Id1-siRNA cell-transplanted tumor tissues in nude mice were identified by immunohistochemical method and Western blot.Results: Id1 and MMP-2, MMP-9 co-expressions were identified in the gastric cancer tissues.Significantly decreased expressions of both Id1 and MMP-2, MMP-9 on both protein and mRNA levels in SGC7901 Id1-siRNA transfectants were found.Data from zymography method showed that the activations of MMPs in Id1-siRNA cell lines were reduced compared to the control groups.Decreased expression of MMP-2 and MMP-9 in the Id1-siRNA transplanted tumor tissues in nude mice were found compared to those from the control cells.Conclusion: Id1 and MMP-2, MMP-9 were co-expressed in gastric cancer tissues; Id1 could upregulate the expression of MMP-2 and MMP-9 in gastric cancer.Downregulation of Id1 in the gastric cancer cells inhibited the transcriptional activities of MMP-2 and MMP-9.So we presumed that Id1 might promote tumorigenesis by transactivating MMP-2 and MMP-9 in gastric cancer.%背景与目的:肿瘤血管生成是肿瘤的一大重要特性,肿瘤微血管密度已被作为许多恶性肿瘤预后的一个重要指标.分化抑制因子(Id)是新近发现的与血管生成密切相关的分子.Id

  10. Extended High-Gain Observer for Mars Entry Guidance

    Directory of Open Access Journals (Sweden)

    Pingyuan Cui

    2013-02-01

    Full Text Available To deliver a Mars entry vehicle to the prescribed parachute deployment point, active entry guidance is essential. This paper addresses the problem of Mars atmospheric entry guidance through drag tracking method with extended high gain observer. First, an extended high gain observer combined with feedback linearization is applied in drag tracking for Mars entry longitudinal guidance.  The observer estimates the drag and drag rate for drag tracking, estimates the perturbation due to model uncertainty and disturbance, and compensate for the perturbation by canceling its estimate. Then, bank reversal is adopted in the lateral plane to reduce the cross-range error. Finally, Mars entry simulation is performed to assess the performance of the adaptive guidance law. The results demonstrate that the proposed guidance law exhibits good performance.

  11. Strategic Orientation and Order of Market Entry of Food Firms

    Directory of Open Access Journals (Sweden)

    rasoul ghollamzadeh

    2011-12-01

    One of the strategic launch decisions is the order of market entry. Adoption of a suitable competitive strategy is dependent on firm's decision on market entry earlier or later than competitors. This research aims to analyze the relationship between order of market entry and firms’ strategic orientation. For this purpose, three strategies have been defined as cost leadership strategy, innovation differentiation strategy and marketing differentiation strategy. In this study, the essential question is whether firms use a different strategy based on their order of market entry? The proposed model has been examined on a sample of 102 manufacturing companies in the food industry using Structural Equation Modeling based on the methodology of Partial Least Squares (PLS. Findings indicate a direct influence of order of market entry on adopting a particular strategy by the firms, so that pioneer companies tend more to use differentiation strategy at two levels of marketing and innovation, while cost leadership is more common among followers.

  12. Strategic Orientation and Order of Market Entry of Food Firms

    Directory of Open Access Journals (Sweden)

    Rasoul Ghollamzadeh

    2011-01-01

    Full Text Available One of the strategic launch decisions is the order of market entry. Adoption of a suitable competitive strategy is dependent on firm's decision on market entry earlier or later than competitors. This research aims to analyze the relationship between order of market entry and firms’ strategic orientation. For this purpose, three strategies have been defined as cost leadership strategy, innovation differentiation strategy and marketing differentiation strategy. In this study, the essential question is whether firms use a different strategy based on their order of market entry? The proposed model has been examined on a sample of 102 manufacturing companies in the food industry using Structural Equation Modeling based on the methodology of Partial Least Squares (PLS. Findings indicate a direct influence of order of market entry on adopting a particular strategy by the firms, so that pioneer companies tend more to use differentiation strategy at two levels of marketing and innovation, while cost leadership is more common among followers.

  13. Market entry decisions: effects of absolute and relative confidence.

    Science.gov (United States)

    Bolger, Fergus; Pulford, Briony D; Colman, Andrew M

    2008-01-01

    In a market entry game, the number of entrants usually approaches game-theoretic equilibrium quickly, but in real-world markets business start-ups typically exceed market capacity, resulting in chronically high failure rates and suboptimal industry profits. Excessive entry has been attributed to overconfidence arising when expected payoffs depend partly on skill. In an experimental test of this hypothesis, 96 participants played 24 rounds of a market entry game, with expected payoffs dependent partly on skill on half the rounds, after their confidence was manipulated and measured. The results provide direct support for the hypothesis that high levels of confidence are largely responsible for excessive entry, and they suggest that absolute confidence, independent of interpersonal comparison, rather than confidence about one's abilities relative to others, drives excessive entry decisions when skill is involved.

  14. Secure Single Sign-On using CAS and OpenID

    Directory of Open Access Journals (Sweden)

    Mihai Gabriel Ionita

    2012-09-01

    Full Text Available As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization’s infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of ​​Single Sign-On systems, having the user in mind. This concept facilitates the authentication process to various resources available on the Internet, or locally, using a single pair of credentials, only once, so it makes the „one for all” password, the method of writing passwords on post-it’s glued to the monitor , or keeping them stored in unsecured text files, sent into oblivion. This paper aims to make a comprehensive analysis of the infrastructure of security and authentication systems on the market. On the other hand, the project presents the implementation of several open source solutions such as OpenID, NTLM in PHP or the Central Authentication Service. For the application that uses OpenID an online store that has an administration page, to which access is restricted using OpenID credentials, was further secured by filtering these IDs in a MySQL database to prevent access to anyone having a valid OpenID credential. For the demonstration of NTLM enabled SSO, another website is used in which access has been blocked to a page. For accessing the page, a valid Windows authentication credential is required. Both the online-shop and demonstration site for NTLM are written in PHP. In addition, the systems using them are implemented also using PHP. For implementing the CAS demo, two Tomcat servlets have been used for demonstration purposes, additional filtering being done by an ApacheDS server.

  15. FHL2 Interacts with and Acts as a Functional Repressor of Id2 in Human Neuroblastoma Cells

    Institute of Scientific and Technical Information of China (English)

    Wei-dong Han; Zhi-qiang Wu; Ya-li Zhao; Yi-ling Si; Xiao-bing Fu

    2009-01-01

    Objective: Id2 is a natural inhibitor of the basic helix-loop-helix(bHLH) transcription factors. Although it is well known that active Id2 prevents differentiation and promotes cell cycle progression and tumorigenesis, the molecular events that regulate Id2 activity remain to be investigated.Methods: Yeast two-hybrid, mammalian two-hybrid, GST-pulldown and immunoprecipitation (CoIP) assays were used to screen and identify novel Id2 interactors. Luciferase assays were used to detect E47-mediated transcription activity. Colony formation and BrdU incorporation assays were used to determine cellular proliferation abilities. Northorn blot, western blot and quantitative PCR methods were used to measure gene expression levels. Electrophoretic mobility shift assays (EMSAs) were performed to investigate protein/DNA binding.Results: The LIM-only protein FHL2 (four-and-a-half-LIM-only protein 2) was identified to be a novel Id2 interactor. The HLH domain within Id2 is not required for its interaction with FHL2. FHL2 antagonizes the inhibitory effect of Id2 on the basic helix-loop-helix protein E47-mediated transcription. FHL2 prevents the formation of Id2-E47 heterdimer, thus releasing E47 to its target DNA and restoring its transcriptional activity. FHL2 expression was remarkably up-regulated during retinoic acid-induced differentiation of neuroblastoma cells, during which the expression of Id2 is opposite to that. Ectopic FHL2 expression in neuroblastoma cells markedly reduces the transcriptional and cell-cycle promoting functions of Id2.Conclusion: These results indicate that FHL2 is an important repressor of the oncogenic activity of Id2 in neuroblastoma cells.

  16. Evaluation of the iPLEX(®) Sample ID Plus Panel designed for the Sequenom MassARRAY(®) system. A SNP typing assay developed for human identification and sample tracking based on the SNPforID panel

    DEFF Research Database (Denmark)

    Johansen, P; Andersen, J D; Børsting, Claus

    2013-01-01

    ) and Matrix Assisted Laser Desorption/Ionization-Time of Flight Mass Spectrometry (MALDI-TOF MS). In this study, we evaluated the accuracy and sensitivity of the iPLEX(®) Sample ID Plus Panel by comparing the typing results of the iPLEX(®) Sample ID Plus Panel with those obtained with our ISO 17025 accredited...

  17. 9 CFR 381.208 - Poultry products offered for entry and entered to be handled and transported as domestic; entry...

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Poultry products offered for entry and entered to be handled and transported as domestic; entry into official establishments; transportation. 381.208 Section 381.208 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND...

  18. Firm entry and aggregate efficiency growth: An optimal dynamic - Program of entry and R&D investment

    Directory of Open Access Journals (Sweden)

    Asma Raies

    2013-12-01

    Full Text Available The effect of entry on the aggregate efficiency growth is still theoretically and empirically unresolved. Many studies focused on this effect in short and long-run, without considering the dynamic transition and how do entry affect the convergence of the industrytoward its long-run equilibrium? This paper aims to provide an answer and to fill this gap by employingoptimal control principles. Our model exhibits saddlepath stability and shows that the effect of entry and entry liberalizing policy (reducing the entry cost on the aggregate efficiency growth may be positive, negative or nil depending on the industry’s initial characteristics (size and R&D. This theoretical result can justify the inconclusive current empirical evidence.

  19. Swiss Army Pathogen: The Salmonella Entry Toolkit

    Directory of Open Access Journals (Sweden)

    Peter J. Hume

    2017-08-01

    Full Text Available Salmonella causes disease in humans and animals ranging from mild self-limiting gastroenteritis to potentially life-threatening typhoid fever. Salmonellosis remains a considerable cause of morbidity and mortality globally, and hence imposes a huge socio-economic burden worldwide. A key property of all pathogenic Salmonella strains is the ability to invade non-phagocytic host cells. The major determinant of this invasiveness is a Type 3 Secretion System (T3SS, a molecular syringe that injects virulence effector proteins directly into target host cells. These effectors cooperatively manipulate multiple host cell signaling pathways to drive pathogen internalization. Salmonella does not only rely on these injected effectors, but also uses several other T3SS-independent mechanisms to gain entry into host cells. This review summarizes our current understanding of the methods used by Salmonella for cell invasion, with a focus on the host signaling networks that must be coordinately exploited for the pathogen to achieve its goal.

  20. On Heatshield Shapes for Mars Entry Capsules

    Science.gov (United States)

    Prabhu, DInesh K.; Saunders, David A.

    2012-01-01

    The 70deg sphere-cone - the standard geometry for all US Mars entry missions - is thoroughly examined via flow field simulations at a select few peak heating points along candidate flight trajectories. Emphasis is placed on turbulent heating based on the Baldwin- Lomax turbulence model. It is shown that increased leeward turbulent heating for a 70 sphere-cone flying at angle of attack is primarily due to the discontinuity in curvature between the spherical nose cap and the conical frustum - the attachment of the sonic line at this sphere-cone junction leads to a supersonic edge Mach number over the leeward acreage. In an attempt to mitigate this problem of elevated turbulent heating, alternate geometries, without any curvature discontinuities in the acreage, are developed. Two approaches, one based on nonlinear optimization with constraints, and one based on the use of non-uniform rational B-splines, are considered. All configurations examined remain axisymmetric. The aerothermal performance of alternate geometries is shown to be superior to that of the 70 sphere-cone.