WorldWideScience

Sample records for swc key activities

  1. Dual function of Swc5 in SWR remodeling ATPase activation and histone H2A eviction.

    Science.gov (United States)

    Sun, Lu; Luk, Ed

    2017-09-29

    The chromatin remodeler SWR deposits histone H2A.Z at promoters and other regulatory sites via an ATP-driven histone exchange reaction that replaces nucleosomal H2A with H2A.Z. Simultaneous binding of SWR to both H2A nucleosome and free H2A.Z induces SWR ATPase activity and engages the histone exchange mechanism. Swc5 is a conserved subunit of the 14-polypeptide SWR complex that is required for the histone exchange reaction, but its molecular role is unknown. We found that Swc5, although not required for substrate binding, is required for SWR ATPase stimulation, suggesting that Swc5 is required to couple substrate recognition to ATPase activation. A biochemical complementation assay was developed to show that a unique, conserved domain at the C-terminus of Swc5, called Bucentaur (BCNT), is essential for the histone exchange activity of SWR, whereas an acidic region at the N-terminus is required for optimal SWR function. In vitro studies showed the acidic N-terminus of Swc5 preferentially binds to the H2A-H2B dimer and exhibits histone chaperone activity. We propose that an auxiliary function of Swc5 in SWR is to assist H2A ejection as H2A.Z is inserted into the nucleosome. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  2. Reconciling water harvesting and soil erosion control by thoughtful implementation of SWC measures

    Science.gov (United States)

    Bellin, N.; Vanacker, V.; van Wesemael, B.

    2012-04-01

    Soil and water conservation (SWC) structures are largely present in Southeast Spain. Traditionally, SWC structures such as step terraces and earthen check dams were implemented in agricultural fields. They are usually found in semi-arid traditional rainfed agricultural systems that heavily rely on SWC structures to supplement the sparse rainfall. The on-site SWC measures favor water infiltration and reduce water runoff and soil erosion. In the river system (off site), large concrete/gabion check dams have been constructed since the 70's. The analysis of orthophotographs and field survey observations indicate a severe decay of on-site SWC structures in the agricultural area. This has been observed for the Cárcavo catchment (Murcia). The density of step terraces and check dams decreased by 25% between 1956 and 2005. Changes in the agricultural area can be summarized as: (i) rapid expansion of rainfed crops in marginal areas and (ii) mechanization of agriculture associated with frequent tillage operations. It became evident that the high density of SWC structures has now become a nuisance in rainfed orchards that are maintained by regular shallow tillage. We constrained the effects of SWC structures on hydrological connectivity by assessing their functioning during a heavy storm (return period 8.2 yrs in 2006). The percentage of cropland draining directly on the river system without interference of a check dam has increased from 9% in 1956 to 31% in 2005 and 40 % after the storm in November 2006. While there is a strong decrease of traditional SWC structures, several hundred large check dams have been constructed during the last decades in ephemeral streams (Almeria). 36 of them have been investigated in selected Sierras. The volume of sediment retained was found low (mean: 1.4 t ha-1 yr-1). 67% of the variability has been explained by topographical, land use and agricultural activities. After a field survey in 2009, a large majority of check dams located in non

  3. How project approach influences adoption of SWC by farmers, examples from southern Mali

    NARCIS (Netherlands)

    Bodnar, F.; Schrader, T.; Campen, Van W.

    2006-01-01

    Choices in project approach affect the continuation of soil and water conservation (SWC) after project withdrawal, and thus the sustainability and cost effectiveness of the project. A SWC project was carried out in southern Mali between 1986 and 1998. Its features were the promotion of cheap and

  4. Science in Action: National Stormwater Calculator (SWC) ...

    Science.gov (United States)

    Stormwater discharges continue to cause impairment of our Nation’s waterbodies. Regulations that require the retention and/or treatment of frequent, small storms that dominate runoff volumes and pollutant loads are becoming more common. EPA has developed the National Stormwater Calculator (SWC) to help support local, state, and national stormwater management objectives to reduce runoff through infiltration and retention using green infrastructure practices as low impact development (LID) controls. To inform the public on what the Stormwater Calculator is used for.

  5. Electrodialysis recovery of boric acid and potassium hydroxide from eluates of SWC facilities at NPP with VVER

    International Nuclear Information System (INIS)

    Dudnik, S.N.; Virich, P.M.; Kramskikh, E.Y.; Masanov, O.L.; Turovsky, I.P.

    1993-01-01

    To extract boric acid and potassium hydroxide from regenerates of SWC-2-46 facilities, an electrodialysis-sorption process has been devised consisting of the following operations: separation of boron-alkaline regenerate solution into desorbate and wash water; filling of desalination and concentration chambers, respectively, with desorbate and was water of electrodialysis equipment; production of boric acid and potassium hydroxide from desorbate by electrodialysis; removal of chloride-ion from boric acid solution on ion-exchange filter AB-17-18. The flow-sheet was tested and boron containing alkaline regeneration solutions were recovered from Novovoronezh NPP

  6. Ionosphere-related products for communication and navigation

    Science.gov (United States)

    Tobiska, W.; Schunk, R. W.; Sojka, J. J.; Carlson, H. C.; Gardner, L. C.; Scherliess, L.; Zhu, L.

    2011-12-01

    Space weather's effects upon the near-Earth environment are due to dynamic changes in the energy transfer processes from the Sun's photons, particles, and fields. Of the space environment domains that are affected by space weather, the ionosphere is the key region that affects communication and navigation systems. The Utah State University (USU) Space Weather Center (SWC) is developing and producing commercial space weather applications. A key system-level component for providing timely information about the effects of space weather is the Global Assimilation of Ionospheric Measurements (GAIM) system. GAIM, operated by SWC, improves real-time communication and navigation systems by continuously ingesting up to 10,000 slant TEC measurements every 15-minutes from approximately 500 stations. Ionosonde data from several dozen global stations is ingested every 15 minutes to improve the vertical profiles within GAIM. The global, CONUS, Europe, Asia, South America, and other regional sectors are run with a 15-minute cadence. These operational runs enable SWC to calculate and report the global radio high frequency (HF) signal strengths and near vertical incidence skywave (NVIS) maps used by amateur radio operators and emergency responders, especially during the Japan Great Earthquake and tsunami recovery period. SWC has established its first fully commercial enterprise called Q-up as a result of this activity. GPS uncertainty maps are produced by SWC to improve single-frequency GPS applications. SWC also provides the space weather smartphone app called SpaceWx for iPhone, iPad, iPod, and Android for professional users and public space weather education. SpaceWx displays the real-time solar, heliosphere, magnetosphere, thermosphere, and ionosphere drivers to changes in the total electron content, for example, as well as global NVIS maps. We describe upcoming improvements for moving space weather information through automated systems into final derivative products.

  7. N terminus of Swr1 binds to histone H2AZ and provides a platform for subunit assembly in the chromatin remodeling complex.

    Science.gov (United States)

    Wu, Wei-Hua; Wu, Chwen-Huey; Ladurner, Andreas; Mizuguchi, Gaku; Wei, Debbie; Xiao, Hua; Luk, Ed; Ranjan, Anand; Wu, Carl

    2009-03-06

    Variant histone H2AZ-containing nucleosomes are involved in the regulation of gene expression. In Saccharomyces cerevisiae, chromatin deposition of histone H2AZ is mediated by the fourteen-subunit SWR1 complex, which catalyzes ATP-dependent exchange of nucleosomal histone H2A for H2AZ. Previous work defined the role of seven SWR1 subunits (Swr1 ATPase, Swc2, Swc3, Arp6, Swc5, Yaf9, and Swc6) in maintaining complex integrity and H2AZ histone replacement activity. Here we examined the function of three additional SWR1 subunits, bromodomain containing Bdf1, actin-related protein Arp4 and Swc7, by analyzing affinity-purified mutant SWR1 complexes. We observed that depletion of Arp4 (arp4-td) substantially impaired the association of Bdf1, Yaf9, and Swc4. In contrast, loss of either Bdf1 or Swc7 had minimal effects on overall complex integrity. Furthermore, the basic H2AZ histone replacement activity of SWR1 in vitro required Arp4, but not Bdf1 or Swc7. Thus, three out of fourteen SWR1 subunits, Bdf1, Swc7, and previously noted Swc3, appear to have roles auxiliary to the basic histone replacement activity. The N-terminal region of the Swr1 ATPase subunit is necessary and sufficient to direct association of Bdf1 and Swc7, as well as Arp4, Act1, Yaf9 and Swc4. This same region contains an additional H2AZ-H2B specific binding site, distinct from the previously identified Swc2 subunit. These findings suggest that one SWR1 enzyme might be capable of binding two H2AZ-H2B dimers, and provide further insight on the hierarchy and interdependency of molecular interactions within the SWR1 complex.

  8. Participatory soil and water conservation planning using an erosion mapping tool in the central highlands of kenya

    NARCIS (Netherlands)

    Okoba, B.O.; Tenge, A.J.M.; Sterk, G.; Stroosnijder, L.

    2007-01-01

    Despite several approaches that aimed at mobilising East African farmers to embrace soil and water conservation (SWC) activities, farmers hardly responded since they were seldom involved in the planning of SWC activities. Two tools that employ farmers' participation were developed and applied at

  9. Opioid system of the brain and ethanol.

    Science.gov (United States)

    Gogichadze, M; Mgaloblishvili-Nemsadze, M; Oniani, N; Emukhvary, N; Basishvili, T

    2009-04-01

    Influence of blocking of opioid receptors with concomitant intraperitoneal injections of Naloxone (20 mg/kg) (non-selective antagonist of opioid system) on the outcomes of anesthetic dose of ethanol (4,25 ml /kg 25% solution) was investigated in the rats. The sleep-wakefulness cycle (SWC) was used as a model for identification of the effects. Alterations of the SWC structure adequately reflect the neuro-chemical changes, which may develop during pharmacological and non-pharmacological impact. Administration of anesthetic dose of ethanol evoked considerable modification of spontaneous EEG activity of the neocortex. The EEG activity was depressed and full inhibition of spinal reflexes and somatic muscular relaxation did occur. During EEG depression regular SWC did not develop. All phases of SWC were reduced. The disturbances of SWC, such as decrease of slow wave sleep and paradoxical sleep duration and increase of wakefulness, remained for several days. At concomitant administration of Naloxone and ethanol, duration of EEG depression decreased significantly. Generation of normal SWC was observed on the same experimental day. However, it should be noted that complete abolishment of ethanol effects by Naloxone was not observed. The results obtained suggest that Naloxone partially blocks ethanol depressogenic effects and duration of this effect is mediated by GABA-ergic system of the brain.

  10. Functional anatomy of the sleep-wakefulness cycle: wakefulness.

    Science.gov (United States)

    Reinoso-Suárez, Fernando; de Andrés, Isabel; Garzón, Miguel

    2011-01-01

    Sleep is a necessary, diverse, periodic, and an active condition circadian and homeostatically regulated and precisely meshed with waking time into the sleep-wakefulness cycle (SWC). Photic retinal stimulation modulates the suprachiasmatic nucleus, which acts as the pacemaker for SWC rhythmicity. Both the light period and social cues adjust the internal clock, making the SWC a circadian, 24-h period in the adult human. Bioelectrical and behavioral parameters characterize the different phases of the SWC. For a long time, lesions and electrical stimulation of brain structures, as well as connection studies, were the main methods used to decipher the foundations of the functional anatomy of the SWC. That is why the first section of this review presents these early historical studies to then discuss the current state of our knowledge based on our understanding of the functional anatomy of the structures underlying the SWC. Supported by this description, we then present a detailed review and update of the structures involved in the phase of wakefulness (W), including their morphological, functional, and chemical characteristics, as well as their anatomical connections. The structures for W generation are known as the "ascending reticular activating system", and they keep and maintain the "thalamo-cerebral cortex unit" awake. This system originates from the neuronal groups located within the brainstem, hypothalamus, and basal forebrain, which use known neurotransmitters and whose neurons are more active during W than during the other SWC states. Thus, synergies among several of these neurotransmitters are necessary to generate the cortical and thalamic activation that is characteristic of the W state, with all the plastic qualities and nuances present in its different behavioral circumstances. Each one of the neurotransmitters exerts powerful influences on the information and cognitive processes as well as attentional, emotional, motivational, behavioral, and arousal

  11. Co-evolution of soil and water conservation policy and human-environment linkages in the Yellow River Basin since 1949.

    Science.gov (United States)

    Wang, Fei; Mu, Xingmin; Li, Rui; Fleskens, Luuk; Stringer, Lindsay C; Ritsema, Coen J

    2015-03-01

    Policy plays a very important role in natural resource management as it lays out a government framework for guiding long-term decisions, and evolves in light of the interactions between human and environment. This paper focuses on soil and water conservation (SWC) policy in the Yellow River Basin (YRB), China. The problems, rural poverty, severe soil erosion, great sediment loads and high flood risks, are analyzed over the period of 1949-present using the Driving force-Pressure-State-Impact-Response (DPSIR) framework as a way to organize analysis of the evolution of SWC policy. Three stages are identified in which SWC policy interacts differently with institutional, financial and technology support. In Stage 1 (1949-1979), SWC policy focused on rural development in eroded areas and on reducing sediment loads. Local farmers were mainly responsible for SWC. The aim of Stage 2 (1980-1990) was the overall development of rural industry and SWC. A more integrated management perspective was implemented taking a small watershed as a geographic interactional unit. This approach greatly improved the efficiency of SWC activities. In Stage 3 (1991 till now), SWC has been treated as the main measure for natural resource conservation, environmental protection, disaster mitigation and agriculture development. Prevention of new degradation became a priority. The government began to be responsible for SWC, using administrative, legal and financial approaches and various technologies that made large-scale SWC engineering possible. Over the historical period considered, with the implementation of the various SWC policies, the rural economic and ecological system improved continuously while the sediment load and flood risk decreased dramatically. The findings assist in providing a historical perspective that could inform more rational, scientific and effective natural resource management going forward. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.

  12. Wet-to-dry shift over Southwest China in 1994 tied to the warming of tropical warm pool

    Science.gov (United States)

    Wang, Lin; Huang, Gang; Chen, Wen; Zhou, Wen; Wang, Weiqiang

    2018-01-01

    The autumn climate in Southwest China (SWC) experienced a notable wet-to-dry shift in 1994. Associated with this change in precipitation, decadal signatures of large-scale atmospheric circulation and SST identify a likely dynamical origin: the tropical warm pool (TWP) consisting of tropical northwest Pacific (TNWP, 3°S-12°N and 110°E-150°E) sector and tropical east Indian Ocean (TEI, 10°S-3°N and 80°E-110°E) sector. A cold-to-warm phase switch of TWP SST occurred in 1994, coinciding exactly with the timing of the regime transition of SWC precipitation. During post-1994 period, warm states in the TNWP and TEI sectors plays in a synergistic fashion to invoke dry decades in SWC. On the one side, warm SST over the TNWP sector excites an anomalous cyclone centered on the South China Sea directed opposite to the climatological moisture transport and strengthened zonal wind to its west accompanied by a weakening of the poleward flux; on the other side, warm SST over the TEI sector acts to intensify inflow into TEI with less concurrent transfer of moisture to SWC and to steer moisture to the northern Arabic Sea and away from the SWC-oriented track. Meanwhile, the troposphere over SWC is capped by subsidence, which is jointly contributed by TNWP and TEI. It then follows a reduced moisture supply, suppressed convective activity, and anomalous divergence in SWC, bringing a precipitation deficit there. In contrast, cold TWP SST during 1961-1994 favors wet conditions in SWC, given a perfectly symmetrical circulation pattern. Further, the dominant role of TWP is confirmed, because the modeled response to TWP SST forcing alone bears a great resemblance to the observed evidence. Finally, it is also found that the teleconnected influence induced by TWP is stronger in southern SWC than in northern SWC, which explains the south-north gradient of interdecadal signal of SWC precipitation.

  13. Outcomes of three universal eating disorder risk reduction programs by participants with higher and lower baseline shape and weight concern.

    Science.gov (United States)

    Wilksch, Simon M; Paxton, Susan J; Byrne, Susan M; Austin, S Bryn; O'Shea, Anne; Wade, Tracey D

    2017-01-01

    To investigate if baseline shape and weight concern (SWC) moderated outcomes in Prevention Across the Spectrum, a randomized-controlled trial (RCT) of 3 school-based programs aimed at reducing eating disorder and obesity risk factors. N = 1,316 Grade 7 and 8 girls and boys (M age = 13.21 years) across three Australian states were randomly allocated to: Media Smart; Life Smart; Helping, Encouraging, Listening and Protecting Peers Initiative (HELPP) or control (usual school class). Moderation was explored by testing interaction effects for group (Media Smart; Life Smart; HELPP; Control) × moderator (SWC: higher-SWC; lower-SWC) × time (post-program; 6-month follow-up; 12-month follow-up), with baseline risk factor scores entered as covariates. Moderation effects were found for shape concern, weight concern, eating concern, regular eating (i.e., meal skipping), physical activity, body dissatisfaction, dieting, and perfectionism. Post-hoc testing found eating concern at post-program was the only variable where higher-SWC Media Smart participants experienced a reduction in risk relative to controls. Both higher-SWC Life Smart and HELPP participants reported an increase in eating concern relative to controls and both groups were skipping more meals than controls at 12-month follow-up. Amongst lower-SWC participants, Media Smart was the only group to experience a benefit relative to controls (physical activity). This study highlights the need for moderator analyses to become more routinely conducted in universal trials, to ensure that participants across baseline risk levels are benefiting and not harmed from program participation. © 2016 Wiley Periodicals, Inc. (Int J Eat Disord 2017; 50:66-75). © 2016 Wiley Periodicals, Inc.

  14. Investigating local controls on temporal stability of soil water content using sensor network data and an inverse modeling approach

    Science.gov (United States)

    Qu, W.; Bogena, H. R.; Huisman, J. A.; Martinez, G.; Pachepsky, Y. A.; Vereecken, H.

    2013-12-01

    Soil water content is a key variable in the soil, vegetation and atmosphere continuum with high spatial and temporal variability. Temporal stability of soil water content (SWC) has been observed in multiple monitoring studies and the quantification of controls on soil moisture variability and temporal stability presents substantial interest. The objective of this work was to assess the effect of soil hydraulic parameters on the temporal stability. The inverse modeling based on large observed time series SWC with in-situ sensor network was used to estimate the van Genuchten-Mualem (VGM) soil hydraulic parameters in a small grassland catchment located in western Germany. For the inverse modeling, the shuffled complex evaluation (SCE) optimization algorithm was coupled with the HYDRUS 1D code. We considered two cases: without and with prior information about the correlation between VGM parameters. The temporal stability of observed SWC was well pronounced at all observation depths. Both the spatial variability of SWC and the robustness of temporal stability increased with depth. Calibrated models both with and without prior information provided reasonable correspondence between simulated and measured time series of SWC. Furthermore, we found a linear relationship between the mean relative difference (MRD) of SWC and the saturated SWC (θs). Also, the logarithm of saturated hydraulic conductivity (Ks), the VGM parameter n and logarithm of α were strongly correlated with the MRD of saturation degree for the prior information case, but no correlation was found for the non-prior information case except at the 50cm depth. Based on these results we propose that establishing relationships between temporal stability and spatial variability of soil properties presents a promising research avenue for a better understanding of the controls on soil moisture variability. Correlation between Mean Relative Difference of soil water content (or saturation degree) and inversely

  15. Consortium for Petroleum & Natural Gas Stripper Wells PART 2 OF 3

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, Joel [Pennsylvania State Univ., University Park, PA (United States)

    2011-12-01

    The United States has more oil and gas wells than any other country. As of December 31, 2004, there were more than half a million producing oil wells in the United States. That is more than three times the combined total for the next three leaders: China, Canada, and Russia. The Stripper Well Consortium (SWC) is a partnership that includes domestic oil and gas producers, service and supply companies, trade associations, academia, the Department of Energy’s Strategic Center for Natural Gas and Oil (SCNGO) at the National Energy Technology Laboratory (NETL), and the New York State Energy Research and Development Authority (NYSERDA). The Consortium was established in 2000. This report serves as a final technical report for the SWC activities conducted over the May 1, 2004 to December 1, 2011 timeframe. During this timeframe, the SWC worked with 173 members in 29 states and three international countries, to focus on the development of new technologies to benefit the U.S. stripper well industry. SWC worked with NETL to develop a nationwide request-for-proposal (RFP) process to solicit proposals from the U.S. stripper well industry to develop and/or deploy new technologies that would assist small producers in improving the production performance of their stripper well operations. SWC conducted eight rounds of funding. A total of 132 proposals were received. The proposals were compiled and distributed to an industrydriven SWC executive council and program sponsors for review. Applicants were required to make a formal technical presentation to the SWC membership, executive council, and program sponsors. After reviewing the proposals and listening to the presentations, the executive council made their funding recommendations to program sponsors. A total of 64 projects were selected for funding, of which 59 were fully completed. Penn State then worked with grant awardees to issue a subcontract for their approved work. SWC organized and hosted a total of 14 meetings

  16. Consortium for Petroleum & Natural Gas Stripper Wells PART 3 OF 3

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, Joel [Pennsylvania State Univ., University Park, PA (United States)

    2011-12-01

    The United States has more oil and gas wells than any other country. As of December 31, 2004, there were more than half a million producing oil wells in the United States. That is more than three times the combined total for the next three leaders: China, Canada, and Russia. The Stripper Well Consortium (SWC) is a partnership that includes domestic oil and gas producers, service and supply companies, trade associations, academia, the Department of Energy’s Strategic Center for Natural Gas and Oil (SCNGO) at the National Energy Technology Laboratory (NETL), and the New York State Energy Research and Development Authority (NYSERDA). The Consortium was established in 2000. This report serves as a final technical report for the SWC activities conducted over the May 1, 2004 to December 1, 2011 timeframe. During this timeframe, the SWC worked with 173 members in 29 states and three international countries, to focus on the development of new technologies to benefit the U.S. stripper well industry. SWC worked with NETL to develop a nationwide request-for-proposal (RFP) process to solicit proposals from the U.S. stripper well industry to develop and/or deploy new technologies that would assist small producers in improving the production performance of their stripper well operations. SWC conducted eight rounds of funding. A total of 132 proposals were received. The proposals were compiled and distributed to an industrydriven SWC executive council and program sponsors for review. Applicants were required to make a formal technical presentation to the SWC membership, executive council, and program sponsors. After reviewing the proposals and listening to the presentations, the executive council made their funding recommendations to program sponsors. A total of 64 projects were selected for funding, of which 59 were fully completed. Penn State then worked with grant awardees to issue a subcontract for their approved work. SWC organized and hosted a total of 14 meetings

  17. Consortium for Petroleum & Natural Gas Stripper Wells

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, Joel [Pennsylvania State Univ., University Park, PA (United States)

    2011-12-01

    The United States has more oil and gas wells than any other country. As of December 31, 2004, there were more than half a million producing oil wells in the United States. That is more than three times the combined total for the next three leaders: China, Canada, and Russia. The Stripper Well Consortium (SWC) is a partnership that includes domestic oil and gas producers, service and supply companies, trade associations, academia, the Department of Energy’s Strategic Center for Natural Gas and Oil (SCNGO) at the National Energy Technology Laboratory (NETL), and the New York State Energy Research and Development Authority (NYSERDA). The Consortium was established in 2000. This report serves as a final technical report for the SWC activities conducted over the May 1, 2004 to December 1, 2011 timeframe. During this timeframe, the SWC worked with 173 members in 29 states and three international countries, to focus on the development of new technologies to benefit the U.S. stripper well industry. SWC worked with NETL to develop a nationwide request-for-proposal (RFP) process to solicit proposals from the U.S. stripper well industry to develop and/or deploy new technologies that would assist small producers in improving the production performance of their stripper well operations. SWC conducted eight rounds of funding. A total of 132 proposals were received. The proposals were compiled and distributed to an industry-driven SWC executive council and program sponsors for review. Applicants were required to make a formal technical presentation to the SWC membership, executive council, and program sponsors. After reviewing the proposals and listening to the presentations, the executive council made their funding recommendations to program sponsors. A total of 64 projects were selected for funding, of which 59 were fully completed. Penn State then worked with grant awardees to issue a subcontract for their approved work. SWC organized and hosted a total of 14 meetings

  18. Correlations between skin hydration parameters and corneocyte-derived parameters to characterize skin conditions.

    Science.gov (United States)

    Masaki, Hitoshi; Yamashita, Yuki; Kyotani, Daiki; Honda, Tatsuya; Takano, Kenichi; Tamura, Toshiyasu; Mizutani, Taeko; Okano, Yuri

    2018-03-30

    Skin hydration is generally assessed using the parameters of skin surface water content (SWC) and trans-epidermal water loss (TEWL). To date, few studies have characterized skin conditions using correlations between skin hydration parameters and corneocyte parameters. The parameters SWC and TEWL allow the classification of skin conditions into four distinct Groups. The purpose of this study was to assess the characteristics of skin conditions classified by SWC and TEWL for correlations with parameters from corneocytes. A human volunteer test was conducted that measured SWC and TEWL. As corneocyte-derived parameters, the size and thick abrasion ratios, the ratio of sulfhydryl groups and disulfide bonds (SH/SS) and CP levels were analyzed. Volunteers were classified by their median SWC and TEWL values into 4 Groups: Group I (high SWC/low TEWL), Group II (high SWC/high TEWL), Group III (low SWC/low TEWL), and Group IV (low SWC/high TEWL). Group IV showed a significantly smaller size of corneocytes. Groups III and IV had significantly higher thick abrasion ratios and CP levels. Group I had a significantly lower SH/SS value. The SWC/TEWL value showed a decline in order from Group I to Group IV. Groups classified by their SWC and TEWL values showed characteristic skin conditions. We propose that the SWC and TEWL ratio is a comprehensive parameter to assess skin conditions. © 2018 Wiley Periodicals, Inc.

  19. Attribution analysis of runoff decline in a semiarid region of the Loess Plateau, China

    Science.gov (United States)

    Li, Binquan; Liang, Zhongmin; Zhang, Jianyun; Wang, Guoqing; Zhao, Weimin; Zhang, Hongyue; Wang, Jun; Hu, Yiming

    2018-01-01

    Climate variability and human activities are two main contributing attributions for runoff changes in the Yellow River, China. In the loess hilly-gully regions of the middle Yellow River, water shortage has been a serious problem, and this results in large-scale constructions of soil and water conservation (SWC) measures in the past decades in order to retain water for agricultural irrigation and industrial production. This disturbed the natural runoff characteristics. In this paper, we focused on a typical loess hilly-gully region (Wudinghe and Luhe River basins) and investigated the effects of SWC measures and climate variability on runoff during the period of 1961-2013, while the SWC measures were the main representative of human activities in this region. The nonparametric Mann-Kendall test was used to analyze the changes of annual precipitation, air temperature, potential evapotranspiration (PET), and runoff. The analysis revealed the decrease in precipitation, significant rise in temperature, and remarkable runoff reduction with a rate of more than 0.4 mm per year. It was found that runoff capacity in this region also decreased. Using the change point detection methods, the abrupt change point of annual runoff series was found at 1970, and thus, the study period was divided into the baseline period (1961-1970) and changed period (1971-2013). A conceptual framework based on four statistical runoff methods was used for attribution analysis of runoff decline in the Wudinghe and Luhe River basins (-37.3 and -56.4%, respectively). Results showed that runoff reduction can be explained by 85.2-90.3% (83.3-85.7%) with the SWC measures in the Wudinghe (Luhe) River basin while the remaining proportions were caused by climate variability. The findings suggested that the large-scale SWC measures demonstrated a dominant influence on runoff decline, and the change of precipitation extreme was also a promoting factor of the upward trending of SWC measures' contribution to

  20. Spatial-temporal variability of soil water content in a cropland-shelterbelt-desert site in an arid inland river basin of Northwest China

    Science.gov (United States)

    Shen, Qin; Gao, Guangyao; Hu, Wei; Fu, Bojie

    2016-09-01

    Knowledge of the spatial-temporal variability of soil water content (SWC) is critical for understanding a range of hydrological processes. In this study, the spatial variance and temporal stability of SWC were investigated in a cropland-shelterbelt-desert site at the oasis-desert ecotone in the middle of the Heihe River Basin, China. The SWC was measured on 65 occasions to a depth of 2.8 m at 45 locations during two growing seasons from 2012 to 2013. The standard deviation of the SWC versus the mean SWC exhibited a convex upward relationship in the shelterbelt with the greatest spatial variation at the SWC of around 22.0%, whereas a linearly increasing relationship was observed for the cropland, desert, and land use pattern. The standard deviation of the relative difference was positively linearly correlated with the SWC (p < 0.05) for the land use pattern, whereas such a relationship was not found in the three land use types. The spatial pattern of the SWC was more time stable for the land use pattern, followed by desert, shelterbelt, and cropland. The spatial pattern of SWC changed dramatically among different soil layers. The locations representing the mean SWC varied with the depth, and no location could represent the whole soil profile due to different soil texture, root distribution and irrigation management. The representative locations of each soil layer could be used to estimate the mean SWC well. The statistics of temporal stability of the SWC could be presented equally well with a low frequency of observation (30-day interval) as with a high frequency (5-day interval). Sampling frequency had little effect on the selection of the representative locations of the field mean SWC. This study provides useful information for designing the optimal strategy for sampling SWC at the oasis-desert ecotone in the arid inland river basin.

  1. Root growth, soil water variation, and grain yield response of winter wheat to supplemental irrigation

    Directory of Open Access Journals (Sweden)

    Jianguo Man

    2016-04-01

    Full Text Available Water shortage threatens agricultural sustainability in the Huang-Huai-Hai Plain of China. Thus, we investigated the effect of supplemental irrigation (SI on the root growth, soil water variation, and grain yield of winter wheat in this region by measuring the moisture content in different soil layers. Prior to SI, the soil water content (SWC at given soil depths was monitored to calculate amount of irritation water that can rehydrate the soil to target SWC. The SWC before SI was monitored to depths of 20, 40, and 60 cm in treatments of W20, W40, and W60, respectively. Rainfed treatment with no irrigation as the control (W0. The mean root weight density (RWD, triphenyl tetrazolium chloride reduction activity (TTC reduction activity, soluble protein (SP concentrations as well as catalase (CAT, and superoxide dismutase (SOD activities in W40 and W60 treatments were significantly higher than those in W20. The RWD in 60–100 cm soil layers and the root activity, SP concentrations, CAT and SOD activities in 40–60 cm soil layers in W40 treatment were significantly higher than those in W20 and W60. W40 treatment is characterized by higher SWC in the upper soil layers but lower SWC in the 60–100-cm soil layers during grain filling. The soil water consumption (SWU in the 60–100 cm soil layers from anthesis after SI to maturity was the highest in W40. The grain yield, water use efficiency (WUE, and irrigation water productivity were the highest in W40, with corresponding mean values of 9169 kg ha−1, 20.8 kg ha−1 mm−1, and 35.5 kg ha−1 mm−1. The RWD, root activities, SP concentrations, CAT and SOD activities, and SWU were strongly positively correlated with grain yield and WUE. Therefore, the optimum soil layer for SI of winter wheat after jointing is 0–40 cm.

  2. A comparison of numerical and machine-learning modeling of soil water content with limited input data

    Science.gov (United States)

    Karandish, Fatemeh; Šimůnek, Jiří

    2016-12-01

    Soil water content (SWC) is a key factor in optimizing the usage of water resources in agriculture since it provides information to make an accurate estimation of crop water demand. Methods for predicting SWC that have simple data requirements are needed to achieve an optimal irrigation schedule, especially for various water-saving irrigation strategies that are required to resolve both food and water security issues under conditions of water shortages. Thus, a two-year field investigation was carried out to provide a dataset to compare the effectiveness of HYDRUS-2D, a physically-based numerical model, with various machine-learning models, including Multiple Linear Regressions (MLR), Adaptive Neuro-Fuzzy Inference Systems (ANFIS), and Support Vector Machines (SVM), for simulating time series of SWC data under water stress conditions. SWC was monitored using TDRs during the maize growing seasons of 2010 and 2011. Eight combinations of six, simple, independent parameters, including pan evaporation and average air temperature as atmospheric parameters, cumulative growth degree days (cGDD) and crop coefficient (Kc) as crop factors, and water deficit (WD) and irrigation depth (In) as crop stress factors, were adopted for the estimation of SWCs in the machine-learning models. Having Root Mean Square Errors (RMSE) in the range of 0.54-2.07 mm, HYDRUS-2D ranked first for the SWC estimation, while the ANFIS and SVM models with input datasets of cGDD, Kc, WD and In ranked next with RMSEs ranging from 1.27 to 1.9 mm and mean bias errors of -0.07 to 0.27 mm, respectively. However, the MLR models did not perform well for SWC forecasting, mainly due to non-linear changes of SWCs under the irrigation process. The results demonstrated that despite requiring only simple input data, the ANFIS and SVM models could be favorably used for SWC predictions under water stress conditions, especially when there is a lack of data. However, process-based numerical models are undoubtedly a

  3. Participatory soil and water conservation planning using a financial analysis tool in the west usambara highlands of tanzania

    NARCIS (Netherlands)

    Tenge, A.J.M.; Okoba, B.O.; Sterk, G.

    2007-01-01

    Despite decades of soil and water conservation (SWC) efforts in Tanzania, the adoption of the recommended SWC measures by farmers is minimal. In the past, SWC plans did not incorporate farmers' knowledge, and the economics of SWC was not given much attention at the planning stage. This research

  4. Modeling soil water content for vegetation modeling improvement

    Science.gov (United States)

    Cianfrani, Carmen; Buri, Aline; Zingg, Barbara; Vittoz, Pascal; Verrecchia, Eric; Guisan, Antoine

    2016-04-01

    Soil water content (SWC) is known to be important for plants as it affects the physiological processes regulating plant growth. Therefore, SWC controls plant distribution over the Earth surface, ranging from deserts and grassland to rain forests. Unfortunately, only a few data on SWC are available as its measurement is very time consuming and costly and needs specific laboratory tools. The scarcity of SWC measurements in geographic space makes it difficult to model and spatially project SWC over larger areas. In particular, it prevents its inclusion in plant species distribution model (SDMs) as predictor. The aims of this study were, first, to test a new methodology allowing problems of the scarcity of SWC measurements to be overpassed and second, to model and spatially project SWC in order to improve plant SDMs with the inclusion of SWC parameter. The study was developed in four steps. First, SWC was modeled by measuring it at 10 different pressures (expressed in pF and ranging from pF=0 to pF=4.2). The different pF represent different degrees of soil water availability for plants. An ensemble of bivariate models was built to overpass the problem of having only a few SWC measurements (n = 24) but several predictors to include in the model. Soil texture (clay, silt, sand), organic matter (OM), topographic variables (elevation, aspect, convexity), climatic variables (precipitation) and hydrological variables (river distance, NDWI) were used as predictors. Weighted ensemble models were built using only bivariate models with adjusted-R2 > 0.5 for each SWC at different pF. The second step consisted in running plant SDMs including modeled SWC jointly with the conventional topo-climatic variable used for plant SDMs. Third, SDMs were only run using the conventional topo-climatic variables. Finally, comparing the models obtained in the second and third steps allowed assessing the additional predictive power of SWC in plant SDMs. SWC ensemble models remained very good, with

  5. Integrated Monitoring of the Soya Warm Current Using HF Ocean Radars, Satellite Altimeters, Coastal Tide Gauges, and a Bottom-Mounted ADCP

    Science.gov (United States)

    Ebuchi, N.; Fukamachi, Y.; Ohshima, K. I.; Wakatsuchi, M.

    2007-12-01

    The Soya Warm Current (SWC) is a coastal boundary current, which flows along the coast of Hokkaido in the Sea of Okhotsk. The SWC flows into the Sea of Okhotsk from the Sea of Japan through the Soya/La Perouse Strait, which is located between Hokkaido, Japan, and Sakhalin, Russia. It supplies warm, saline water in the Sea of Japan to the Sea of Okhotsk and largely affects the ocean circulation and water mass formation in the Sea of Okhotsk, and local climate, environment and fishery in the region. However, the SWC has never been continuously monitored due to the difficulties involved in field observations related to, for example, severe weather conditions in the winter, political issues at the border strait, and conflicts with fishing activities in the strait. Detailed features of the SWC and its variations have not yet been clarified. In order to monitor variations in the SWC, three HF ocean radar stations were installed around the strait. The radar covers a range of approximately 70 km from the coast. It is shown that the HF radars clearly capture seasonal and subinertial variations of the SWC. The velocity of the SWC reaches its maximum, approximately 1 m/s, in summer, and weakens in winter. The velocity core is located 20 to 30 km from the coast, and its width is approximately 50 km. The surface transport by the Soya Warm Current shows a significant correlation with the sea level difference along the strait, as derived from coastal tide gauge records. The cross-current sea level difference, which is estimated from the sea level anomalies observed by the Jason-1 altimeter and a coastal tide gauge, also exhibits variation in concert with the surface transport and along-current sea level difference.

  6. Extracellular oxidases and the transformation of solubilised low-rank coal by wood-rot fungi

    Energy Technology Data Exchange (ETDEWEB)

    Ralph, J.P. [Flinders Univ. of South Australia, Bedford Park (Australia). School of Biological Sciences; Graham, L.A. [Flinders Univ. of South Australia, Bedford Park (Australia). School of Biological Sciences; Catcheside, D.E.A. [Flinders Univ. of South Australia, Bedford Park (Australia). School of Biological Sciences

    1996-12-31

    The involvement of extracellular oxidases in biotransformation of low-rank coal was assessed by correlating the ability of nine white-rot and brown-rot fungi to alter macromolecular material in alkali-solubilised brown coal with the spectrum of oxidases they produce when grown on low-nitrogen medium. The coal fraction used was that soluble at 3.0{<=}pH{<=}6.0 (SWC6 coal). In 15-ml cultures, Gloeophyllum trabeum, Lentinus lepideus and Trametes versicolor produced little or no lignin peroxidase, manganese (Mn) peroxidase or laccase activity and caused no change to SWC6 coal. Ganoderma applanatum and Pycnoporus cinnabarinus also produced no detectable lignin or Mn peroxidases or laccase yet increased the absorbance at 400 nm of SWC6 coal. G. applanatum, which produced veratryl alcohol oxidase, also increased the modal apparent molecular mass. SWC6 coal exposed to Merulius tremellosus and Perenniporia tephropora, which secreted Mn peroxidases and laccase and Phanerochaete chrysosporium, which produced Mn and lignin peroxidases was polymerised but had unchanged or decreased absorbance. In the case of both P. chrysosporium and M. tremellosus, polymerisation of SWC6 coal was most extensive, leading to the formation of a complex insoluble in 100 mM NaOH. Rigidoporus ulmarius, which produced only laccase, both polymerised and reduced the A{sub 400} of SWC6 coal. P. chrysosporium, M. tremellosus and P. tephropora grown in 10-ml cultures produced a spectrum of oxidases similar to that in 15-ml cultures but, in each case, caused more extensive loss of A{sub 400}, and P. chrysosporium depolymerised SWC6 coal. It is concluded that the extracellular oxidases of white-rot fungi can transform low-rank coal macromolecules and that increased oxygen availability in the shallower 10-ml cultures favours catabolism over polymerisation. (orig.)

  7. Clinical relevance and effect of surgical wound classification in appendicitis: Retrospective evaluation of wound classification discrepancies between surgeons, Swissnoso-trained infection control nurse, and histology as well as surgical site infection rates by wound class.

    Science.gov (United States)

    Wang-Chan, Anastasija; Gingert, Christian; Angst, Eliane; Hetzer, Franc Heinrich

    2017-07-01

    Surgical wound classification (SWC) is used for risk stratification of surgical site infection (SSI) and serves as the basis for measuring quality of care. The objective was to examine the accuracy and reliability of SWC. This study was purposed to evaluate the discrepancies in SWC as assessed by three groups: surgeons, an infection control nurse, and histopathologic evaluation. The secondary aim was to compare the risk-stratified SSI rates using the different SWC methods for 30 d postoperatively. An analysis was performed of the appendectomies from January 2013 to June 2014 in the Cantonal Hospital of Schaffhausen. SWC was assigned by the operating surgeon at the end of the procedure and retrospectively reviewed by a Swissnoso-trained infection control nurse after reading the operative and pathology report. The level of agreement among the three different SWC assessment groups was determined using kappa statistic. SSI rates were analyzed using a chi-square test. In 246 evaluated cases, the kappa scores for interrater reliability among the SWC assessments across the three groups ranged from 0.05 to 0.2 signifying slight agreement between the groups. SSIs were more frequently associated with trained infection control nurse-assigned SWC than with surgeons based SWC. Our study demonstrated a considerable discordance in the SWC assessments performed by the three groups. Unfortunately, the currently practiced SWC system suffers from ambiguity in definition and/or implementation of these definitions is not clearly stated. This lack of reliability is problematic and may lead to inappropriate comparisons within and between hospitals and surgeons. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  8. Increase in physical activities in kindergarten children with cerebral palsy by employing MaKey-MaKey-based task systems.

    Science.gov (United States)

    Lin, Chien-Yu; Chang, Yu-Ming

    2014-09-01

    In this study, we employed Flash- and Scratch-based multimedia by using a MaKey-MaKey-based task system to increase the motivation level of children with cerebral palsy to perform physical activities. MaKey MaKey is a circuit board that converts physical touch to a digital signal, which is interpreted by a computer as a keyboard message. In this study, we used conductive materials to control this interaction. This study followed single-case design using ABAB models in which A indicated the baseline and B indicated the intervention. The experiment period comprised 1 month and a half. The experimental results demonstrated that in the case of two kindergarten children with cerebral palsy, their scores were considerably increased during the intervention phrases. The developmental applications of the results are also discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Evaluation of the cost-effectiveness of electrical stimulation therapy for pressure ulcers in spinal cord injury.

    Science.gov (United States)

    Mittmann, Nicole; Chan, Brian C; Craven, B Cathy; Isogai, Pierre K; Houghton, Pamela

    2011-06-01

    To evaluate the incremental cost-effectiveness of electrical stimulation (ES) plus standard wound care (SWC) as compared with SWC only in a spinal cord injury (SCI) population with grade III/IV pressure ulcers (PUs) from the public payer perspective. A decision analytic model was constructed for a 1-year time horizon to determine the incremental cost-effectiveness of ES plus SWC to SWC in a cohort of participants with SCI and grade III/IV PUs. Model inputs for clinical probabilities were based on published literature. Model inputs, namely clinical probabilities and direct health system and medical resources were based on a randomized controlled trial of ES plus SWC versus SWC. Costs (Can $) included outpatient (clinic, home care, health professional) and inpatient management (surgery, complications). One way and probabilistic sensitivity (1000 Monte Carlo iterations) analyses were conducted. The perspective of this analysis is from a Canadian public health system payer. Model target population was an SCI cohort with grade III/IV PUs. Not applicable. Incremental cost per PU healed. ES plus SWC were associated with better outcomes and lower costs. There was a 16.4% increase in the PUs healed and a cost savings of $224 at 1 year. ES plus SWC were thus considered a dominant economic comparator. Probabilistic sensitivity analysis resulted in economic dominance for ES plus SWC in 62%, with another 35% having incremental cost-effectiveness ratios of $50,000 or less per PU healed. The largest driver of the economic model was the percentage of PU healed with ES plus SWC. The addition of ES to SWC improved healing in grade III/IV PU and reduced costs in an SCI population. Copyright © 2011 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  10. Assimilation of remote sensing data into a process-based ecosystem model for monitoring changes of soil water content in croplands

    Science.gov (United States)

    Ju, Weimin; Gao, Ping; Wang, Jun; Li, Xianfeng; Chen, Shu

    2008-10-01

    Soil water content (SWC) is an important factor affecting photosynthesis, growth, and final yields of crops. The information on SWC is of importance for mitigating the reduction of crop yields caused by drought through proper agricultural water management. A variety of methodologies have been developed to estimate SWC at local and regional scales, including field sampling, remote sensing monitoring and model simulations. The reliability of regional SWC simulation depends largely on the accuracy of spatial input datasets, including vegetation parameters, soil and meteorological data. Remote sensing has been proved to be an effective technique for controlling uncertainties in vegetation parameters. In this study, the vegetation parameters (leaf area index and land cover type) derived from the Moderate Resolution Imaging Spectrometer (MODIS) were assimilated into a process-based ecosystem model BEPS for simulating the variations of SWC in croplands of Jiangsu province, China. Validation shows that the BEPS model is able to capture 81% and 83% of across-site variations of SWC at 10 and 20 cm depths during the period from September to December, 2006 when a serous autumn drought occurred. The simulated SWC responded the events of rainfall well at regional scale, demonstrating the usefulness of our methodology for SWC and practical agricultural water management at large scales.

  11. Participatory appraisal for farm-level soil and water conservation planning in West Usambara highlands, Tanzania

    NARCIS (Netherlands)

    Tenge, A.J.M.

    2005-01-01

    Soil and water conservation (SWC) measures are needed to control soil erosion and sustain agricultural production on the steep slopes of Usambara Mountains. The need for SWC has resulted in the development and promotion of several SWC measures by both governmental and non-governmental programmes.

  12. Household-Level Determinants of Soil and Water Conservation Adoption Phases: Evidence from North-Western Ethiopian Highlands

    NARCIS (Netherlands)

    Teshome, Akalu; Graaff, de J.; Kassie, M.

    2016-01-01

    Soil and water conservation (SWC) practices have been promoted in the highlands of Ethiopia during the last four decades. However, the level of adoption of SWC practices varies greatly. This paper examines the drivers of different stages of adoption of SWC technologies in the north-western highlands

  13. Tracing changes in atmospheric moisture supply to the drying Southwest China

    Directory of Open Access Journals (Sweden)

    C. Zhang

    2017-09-01

    Full Text Available Precipitation over Southwest China (SWC significantly decreased during 1979–2013. The months from July to September (JAS contributed the most to the decrease in precipitation. By tracing moisture sources of JAS precipitation over the SWC region, it is found that most moisture originates in regions from the northern Indian Ocean to SWC and from South China Sea to SWC. The major moisture contributing area is divided into an extended west region, SWC, and an extended east region. The extended west region is mainly influenced by the South Asian summer monsoon (SASM and the westerlies, while the extended east region is mainly influenced by the East Asian summer monsoon (EASM. The extended west, SWC, and extended east regions contribute 48.2, 15.5, and 24.5 % of the moisture for the SWC precipitation, respectively. Moisture supply from the extended west region decreased at a rate of −7.9 mm month−1 decade−1, whereas that from the extended east increased at a rate of 1.4 mm month−1 decade−1, resulting in an overall decrease in moisture supply. Further analysis reveals that the decline of JAS precipitation is mainly caused by change in the seasonal-mean component rather than the transient component of the moisture transport over the SWC region. In addition, the dynamic processes (i.e., changes in wind rather than the thermodynamic processes (i.e., changes in specific humidity are dominant in affecting the seasonal-mean moisture transport. A prevailing easterly anomaly of moisture transport that weakened moisture supply from the Indian Ocean is to a large extent responsible for the precipitation decrease over the SWC region.

  14. A Dual Key-Based Activation Scheme for Secure LoRaWAN

    Directory of Open Access Journals (Sweden)

    Jaehyu Kim

    2017-01-01

    Full Text Available With the advent of the Internet of Things (IoT era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.

  15. Participatory assessment of soil erosion severity and performance of mitigation measures using stakeholder workshops in Koga catchment, Ethiopia.

    Science.gov (United States)

    Jemberu, Walle; Baartman, Jantiene E M; Fleskens, Luuk; Ritsema, Coen J

    2018-02-01

    Farmers possess a wealth of knowledge regarding soil erosion and soil and water conservation (SWC), and there is a great demand to access it. However, there has been little effort to systematically document farmers' experiences and perceptions of SWC measures. Sustainable Land Management (SLM) has largely evolved through local traditional practices rather than adoption based on scientific evidence. This research aimed to assess soil erosion and performance of different SWC measures from the farmers' perspective by documenting their perceptions and experiences in Koga catchment, Ethiopia. To this aim, workshops were organised in three sub-catchments differing in slopes and SWC measures. Workshops included group discussions and field monitoring of erosion indicators and systematically describing the status of soil erosion, soil fertility and yield to assess the performance of SWC measures. Results show that farmers are aware of the harmful effects of ongoing soil erosion and of the impacts of mitigation measures on their farms. Sheet erosion was found to be the most widespread form of erosion while rill damage was critical on plots cultivated to cereals on steep slopes. The average rill erosion rates were 24.2 and 47.3 t/ha/y in treated and untreated farmlands, respectively. SWC reduced rill erosion on average by more than 48%. However, the impacts of SWC measures varied significantly between sub-watersheds, and farmers believed that SWC measures did not prevent erosion completely. Comparatively, graded stone-faced soil bunds revealed maximum desired impacts and were most appreciated by farmers, whereas level bunds caused water logging. Most traditional ditches were highly graded and begun incising and affected production of cereals. Despite the semi-quantitative nature of the methodology, using farmers' perceptions and experiences to document land degradation and the impacts of SWC measures is crucial as they are the daily users of the land and therefore directly

  16. Music exposure and maturation of late preterm sleep-wake cycles: a randomised crossover trial.

    Science.gov (United States)

    Stokes, Adia; Agthe, Alexander G; El Metwally, Dina

    2018-04-01

    To determine the effect of music on sleep-wake cycle (SWC) patterns in late preterm neonates. In a masked crossover study, infants between 32 and 36 6/7 weeks gestation were randomised to music exposure either during the first six or last six hours of a 12-hour observation period. SWC characteristics were determined by continuous amplitude-integrated electroencephalography (aEEG) read by two coders masked to exposure sequence. Analysis was performed in paired comparisons. ANOVA was used to assess the effects of music exposure, period and crossover on SWC outcomes: (i) Burdjalov Scores (BS) during active sleep (AS) (ii) per cent and duration of quiet sleep (QS). Thirty infants were studied. A total of 222 QS cycles (median seven per patient; range five to 12) were analysed. Music exposure was associated with higher BS (F = 10.60, p = 0.0019) in AS and decreased interruptions during QS. The advanced postconceptual age (PCA) SWC pattern during AS was equivalent to a one-week mean. Number, duration and ratio of QS cycles did not change with music exposure. Music exposure elicits an increasing PCA pattern in AS and fewer interruptions in QS. Music may benefit sleep in late preterm infants. ©2017 Foundation Acta Paediatrica. Published by John Wiley & Sons Ltd.

  17. Monitoring Landscape Scale Soil Water Content with Cosmic-Ray Neutron Sensors: Validation and Calibration

    International Nuclear Information System (INIS)

    Wahbi, Ammar; Avery, William A.; Dercon, Gerd; Heng, Lee; Weltin, Georg; Franz, Trenton E.; Strauss, Peter; Oismueller, Markus; Desilets, Darin

    2017-01-01

    Increasing populations growth combined with climate change are putting pressure on water resources and agricultural systems around the world. The need for effective water management strategies designed to maximize water use efficiency has made access to soil water content (SWC) information crucial to the global community. This work builds upon ongoing research that began in December 2013 in which a stationary Cosmic-Ray Neutron Sensor (CRNS) was used to monitor SWC within an agricultural system located in north central Austria. Past work at this study site at Petzenkirchen, Austria (100 km west of Vienna) has focused on the calibration and validation of the CRNS technology, and has shown the CRNS to reliably estimate SWC on a large scale (circle with radius of cca. 250 m) when compared to other methods of estimating SWC. This was determined via comparisons of insitu soil sampling, time domain reflectometry (TDR), and time domain transmissivity (TDT) of SWC with estimates of SWC determined from the CRNS. However, questions remain regarding the effective use of the CRNS technology.

  18. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    Energy Technology Data Exchange (ETDEWEB)

    Joel L. Morrison

    2001-09-12

    The Pennsylvania State University, under contract to the US Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. the consortium creates a partnership with the US petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the third quarterly technical progress report for the SWC. During this reporting period the SWC entered into a co-funding arrangement with the New York State Energy Development Authority (NYSERDA) to provide an additional $100,000 in co-funding for stripper well production-orientated projects.The SWC hosted its first meeting in which members proposed research projects to the SWC membership. The meeting was held on April 9-10, 2001 in State College, Pennsylvania. Twenty three proposals were submitted to the SWC for funding consideration. Investigators of the proposed projects provided the SWC membership with a 20 minute (15 minute technical discussion, 5 minute question and answer session) presentation. Of the 23 proposals, the Executive Council approved $921,000 in funding for 13 projects. Penn State then immediately started the process of issuing subcontracts to the various projects approved for funding.

  19. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    International Nuclear Information System (INIS)

    Joel L. Morrison

    2001-01-01

    The Pennsylvania State University, under contract to the US Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. the consortium creates a partnership with the US petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the third quarterly technical progress report for the SWC. During this reporting period the SWC entered into a co-funding arrangement with the New York State Energy Development Authority (NYSERDA) to provide an additional$100,000 in co-funding for stripper well production-orientated projects.The SWC hosted its first meeting in which members proposed research projects to the SWC membership. The meeting was held on April 9-10, 2001 in State College, Pennsylvania. Twenty three proposals were submitted to the SWC for funding consideration. Investigators of the proposed projects provided the SWC membership with a 20 minute (15 minute technical discussion, 5 minute question and answer session) presentation. Of the 23 proposals, the Executive Council approved$921,000 in funding for 13 projects. Penn State then immediately started the process of issuing subcontracts to the various projects approved for funding

  20. The effect of physical and psychosocial loads on the trapezius muscle activity during computer keying tasks and rest periods

    DEFF Research Database (Denmark)

    Blangsted, Anne Katrine; Søgaard, Karen; Christensen, Hanne

    2004-01-01

    hand keying task-interspaced with short (30 s) and long (4 min) breaks-in sessions with and without a combination of cognitive and emotional stressors. Adding psychosocial loads to the same physical work did not increase the activity of the trapezius muscle on either the keying or the control side......The overall aim was to investigate the effect of psychosocial loads on trapezius muscle activity during computer keying work and during short and long breaks. In 12 female subjects, surface electromyography (EMG) was recorded bilaterally from the upper trapezius muscle during a standardized one...... resting level. During both short and long breaks, exposure to psychosocial loads also did not increase the activity of the trapezius muscle either on the side of the keying or the control hand. Of note is that during long breaks the muscle activity of the keying side as well as that of the control side...

  1. Effect of soil and water conservation on rehabilitation of degraded lands and crop productivity in Maego watershed, North Ethiopia

    Directory of Open Access Journals (Sweden)

    Gebremariam Yaebiyo Dimtsu

    2018-04-01

    Full Text Available Many soil and water conservation (SWC measures were undertaken to decrease land degradation in Ethiopia. However, evaluation of their performance is essential to understand their success or failure and readjusting accordingly in the future planning.  Therefore, the objective of this study was to evaluate effectiveness of SWC measures in rehabilitation of degraded watershed and increase crop productivity in Maego watershed, Ethiopia. Seventy six sample plots were randomly taken from treated and untreated sub-watersheds for woody species and soil sampling. Crops yield was measured on top side, middle zone and below side of SWC structures. There were significantly higher woody species density and diversity, total nitrogen (TN, soil organic matter (SOM and soil moisture in the treated uncultivated land than the untreated one. The highest tree and sapling species density and diversity, TN and SOM were recorded on the exclosure part of the treated sub-watershed. Landscape position affected soil fertility, but has no effect on woody species density and diversity. The highest barley and wheat yield was measured on top side of SWC structures. Therefore, physical SWC structures should be integrated with exclosure to enhance rehabilitation of degraded watersheds/landscapes. Integration of biological SWC measures that improve soil fertility are essential on the cultivated land of the watershed. Most of the existing SWC structures, especially the old ones are filled with accumulated sediment, so maintenance is needed.

  2. GEO activities towards improved Geophysical monitoring. A key input to Disaster Risk Reduction.

    Science.gov (United States)

    Achache, J.; Rum, G.

    2007-05-01

    GEO has been established in 2005 with the main objective to put in place a Global, Coordinated, Comprehensive and Sustained System of Observing Systems (GEOSS) to serve 9 Social Benefit Areas, among which Disaster Risk Reduction. The paper will first set up the reference GEO framework, through a brief description of GEOSS key features, architectural functions and capacity building, and then will recall the value of the Geophysical observations, coming both from in situ and remote (satellite) systems, and, even more important, of their integration. GEO activities related to Geophysical monitoring and the use of related observation to foster social benefits in the Disaster Risk Reduction area will then be shortly described, together with the on-going key actions, including specific examples on key scientific/technical and data sharing aspects associated to GEOSS implementation. Special attention will be devoted on how Capacity Building strategy and activities are addressed through GEOSS development, building on infrastructure and programs under consolidation within GEO framework, such as the GEOSS Information collection and dissemination systems under development (GEONETCast, GEO Web Portal, GEO Clearinghouse) and the UN programs such as SPIDER (SPace based Information for Disaster management and Emergency Response) and UNOSAT. The paper will provide recommendations on the way forward for the implementation of Disaster Risk Management provisions as an integral part of sustainable development, also with the objective of creating within GEO a supporting framework to UNDP and World Bank activities on Risk Identification and Assessment.

  3. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Directory of Open Access Journals (Sweden)

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  4. Global, real-time ionosphere specification for end-user communication and navigation products

    Science.gov (United States)

    Tobiska, W.; Carlson, H. C.; Schunk, R. W.; Thompson, D. C.; Sojka, J. J.; Scherliess, L.; Zhu, L.; Gardner, L. C.

    2010-12-01

    Space weather’s effects upon the near-Earth environment are due to dynamic changes in the energy transfer processes from the Sun’s photons, particles, and fields. Of the space environment domains that are affected by space weather, the ionosphere is the key region that affects communication and navigation systems. The Utah State University (USU) Space Weather Center (SWC) is a developer and producer of commercial space weather applications. A key system-level component for providing timely information about the effects of space weather is the Global Assimilation of Ionospheric Measurements (GAIM) system. GAIM, operated by SWC, improves real-time communication and navigation systems by continuously ingesting up to 10,000 slant TEC measurements every 15-minutes from approximately 500 stations. Using a Kalman filter, the background output from the physics-based Ionosphere Forecast Model (IFM) is adjusted to more accurately represent the actual ionosphere. An improved ionosphere leads to more useful derivative products. For example, SWC runs operational code, using GAIM, to calculate and report the global radio high frequency (HF) signal strengths for 24 world cities. This product is updated every 15 minutes at http://spaceweather.usu.edu and used by amateur radio operators. SWC also developed and provides through Apple iTunes the widely used real-time space weather iPhone app called SpaceWx for public space weather education. SpaceWx displays the real-time solar, heliosphere, magnetosphere, thermosphere, and ionosphere drivers to changes in the total electron content, for example. This smart phone app is tip of the “iceberg” of automated systems that provide space weather data; it permits instant understanding of the environment surrounding Earth as it dynamically changes. SpaceWx depends upon a distributed network that connects satellite and ground-based data streams with algorithms to quickly process the measurements into geophysical data, incorporate those

  5. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  6. Soil water regulates the control of photosynthesis on diel hysteresis between soil respiration and temperature in a desert shrubland

    Science.gov (United States)

    Wang, Ben; Zha, Tian Shan; Jia, Xin; Gong, Jin Nan; Bourque, Charles; Feng, Wei; Tian, Yun; Wu, Bin; Qing Zhang, Yu; Peltola, Heli

    2017-09-01

    Explanations for the occurrence of hysteresis (asynchronicity) between diel soil respiration (Rs) and soil temperature (Ts) have evoked both biological and physical mechanisms. The specifics of these explanations, however, tend to vary with the particular ecosystem or biome being investigated. So far, the relative degree of control of biological and physical processes on hysteresis is not clear for drylands. This study examined the seasonal variation in diel hysteresis and its biological control in a desert-shrub ecosystem in northwest (NW) China. The study was based on continuous measurements of Rs, air temperature (Ta), temperature at the soil surface and below (Tsurf and Ts), volumetric soil water content (SWC), and photosynthesis in a dominant desert shrub (i.e., Artemisia ordosica) over an entire year in 2013. Trends in diel Rs were observed to vary with SWC over the growing season (April to October). Diel variations in Rs were more closely associated with variations in Tsurf than with photosynthesis as SWC increased, leading to Rs being in phase with Tsurf, particularly when SWC > 0.08 m3 m-3 (ratio of SWC to soil porosity = 0.26). However, as SWC decreased below 0.08 m3 m-3, diel variations in Rs were more closely related to variations in photosynthesis, leading to pronounced hysteresis between Rs and Tsurf. Incorporating photosynthesis into a Q10-function eliminated 84.2 % of the observed hysteresis, increasing the overall descriptive capability of the function. Our findings highlight a high degree of control by photosynthesis and SWC in regulating seasonal variation in diel hysteresis between Rs and temperature.

  7. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  8. Reliability and Usefulness of Linear Sprint Testing in Adolescent Rugby Union and League Players.

    Science.gov (United States)

    Darrall-Jones, Joshua D; Jones, Ben; Roe, Gregory; Till, Kevin

    2016-05-01

    The purpose of this study was to evaluate (a) whether there were differences in sprint times at 5, 10, 20, 30, and 40 m between rugby union and rugby league players, (b) determine the reliability and usefulness of linear sprint testing in adolescent rugby players. Data were collected on 28 rugby union and league academy players over 2 testing sessions, with 3-day rest between sessions. Rugby league players were faster at 5 m than rugby union players, with further difference unclear. Sprint time at 10, 20, 30, and 40 m was all reliable (coefficient of variation [CV] = 3.1, 1.8, 2.0, and 1.3%) but greater than the smallest worthwhile change (SWC [0.2 × between-subject SD]), rating the test as marginal for usefulness. Although the test was incapable of detecting the SWC, we recommend that practitioners and researchers use Hopkins' proposed method; whereby plotting the change score of the individual at each split (±typical error [TE] expressed as a CV) against the SWC and visually inspecting whether the TE crosses into the SWC are capable of identifying whether a change is both real (greater than the noise of the test, i.e., >TE) and of practical significance (>SWC). Researchers and practitioners can use the TE and SWC from this study to assess changes in performance of adolescent rugby players when using single beam timing gates.

  9. Impact of Soil and Water Conservation Interventions on Watershed Runoff Response in a Tropical Humid Highland of Ethiopia.

    Science.gov (United States)

    Sultan, Dagnenet; Tsunekawa, Atsushi; Haregeweyn, Nigussie; Adgo, Enyew; Tsubo, Mitsuru; Meshesha, Derege Tsegaye; Masunaga, Tsugiyuki; Aklog, Dagnachew; Fenta, Ayele Almaw; Ebabu, Kindiye

    2018-05-01

    Various soil and water conservation measures (SWC) have been widely implemented to reduce surface runoff in degraded and drought-prone watersheds. But little quantitative study has been done on to what extent such measures can reduce watershed-scale runoff, particularly from typical humid tropical highlands of Ethiopia. The overall goal of this study is to analyze the impact of SWC interventions on the runoff response by integrating field measurement with a hydrological CN model which gives a quantitative analysis future thought. Firstly, a paired-watershed approach was employed to quantify the relative difference in runoff response for the Kasiry (treated) and Akusty (untreated) watersheds. Secondly, a calibrated curve number hydrological modeling was applied to investigate the effect of various SWC management scenarios for the Kasiry watershed alone. The paired-watershed approach showed a distinct runoff response between the two watersheds however the effect of SWC measures was not clearly discerned being masked by other factors. On the other hand, the model predicts that, under the current SWC coverage at Kasiry, the seasonal runoff yield is being reduced by 5.2%. However, runoff yields from Kasiry watershed could be decreased by as much as 34% if soil bunds were installed on cultivated land and trenches were installed on grazing and plantation lands. In contrast, implementation of SWC measures on bush land and natural forest would have little effect on reducing runoff. The results on the magnitude of runoff reduction under optimal combinations of SWC measures and land use will support decision-makers in selection and promotion of valid management practices that are suited to particular biophysical niches in the tropical humid highlands of Ethiopia.

  10. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  11. Key players and activities across the ERP life cycle: A temporal perspective

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Enterprise Resource Planning (ERP systems are enterprise wide systems that, because of their integration, automate all of a company's business processes. They have rapidly become the de facto industry standard for replacement of legacy systems. In this paper I analyze using an information theory approach the temporal aspects of key players and activities specific to Romanian SME's ERP implementations with focus on both generic and unique aspects

  12. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  13. Active listening: The key of successful communication in hospital managers.

    Science.gov (United States)

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-03-01

    One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers' gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills.

  14. Validation and downscaling of Advanced Scatterometer (ASCAT) soil moisture using ground measurements in the Western Cape, South Africa

    CSIR Research Space (South Africa)

    Moller, J

    2017-09-01

    Full Text Available Satellite-based remote sensing of soil water content (SWC) is a promising technology for hydrological applications to overcome large spatiotemporal variabilities of SWC. This study investigated the performance of the Advanced Scatterometer (ASCAT...

  15. An Eco-Hydrological Model-Based Assessment of the Impacts of Soil and Water Conservation Management in the Jinghe River Basin, China

    Directory of Open Access Journals (Sweden)

    Hui Peng

    2015-11-01

    Full Text Available Many soil and water conservation (SWC measures have been applied in the Jinghe River Basin to decrease soil erosion and restore degraded vegetation cover. Analysis of historical streamflow records suggests that SWC measures may have led to declines in streamflow, although climate and human water use may have contributed to observed changes. This paper presents an application of a watershed-scale, physically-based eco-hydrological model—the Regional Hydro-Ecological Simulation System (RHESSys—in the Jinghe River Basin to study the impacts of SWC measures on streamflow. Several extensions to the watershed-scale RHESSys model were made in this paper to support the model application at larger scales (>10,000 km2 of the Loess Plateau. The extensions include the implementation of in-stream routing, reservoir sub-models and representation of soil and water construction engineering (SWCE. Field observation data, literature values and remote sensing data were used to calibrate and verify the model parameters. Three scenarios were simulated and the results were compared to quantify both vegetation recovery and SWCE impacts on streamflow. Three scenarios respectively represent no SWC, vegetation recovery only and both vegetation recovery and SWCE. The model results demonstrate that the SWC decreased annual streamflow by 8% (0.1 billion m3, with the largest decrease occurring in the 2000s. Model estimates also suggest that SWCE has greater impacts than vegetation recovery. Our study provides a useful tool for SWC planning and management in this region.

  16. An underestimated role of precipitation frequency in regulating summer soil moisture

    International Nuclear Information System (INIS)

    Wu Chaoyang; Chen, Jing M; Pumpanen, Jukka; Cescatti, Alessandro; Marcolla, Barbara; Blanken, Peter D; Ardö, Jonas; Tang, Yanhong; Magliulo, Vincenzo; Georgiadis, Teodoro; Soegaard, Henrik; Cook, David R; Harding, Richard J

    2012-01-01

    Soil moisture induced droughts are expected to become more frequent under future global climate change. Precipitation has been previously assumed to be mainly responsible for variability in summer soil moisture. However, little is known about the impacts of precipitation frequency on summer soil moisture, either interannually or spatially. To better understand the temporal and spatial drivers of summer drought, 415 site yr measurements observed at 75 flux sites world wide were used to analyze the temporal and spatial relationships between summer soil water content (SWC) and the precipitation frequencies at various temporal scales, i.e., from half-hourly, 3, 6, 12 and 24 h measurements. Summer precipitation was found to be an indicator of interannual SWC variability with r of 0.49 (p < 0.001) for the overall dataset. However, interannual variability in summer SWC was also significantly correlated with the five precipitation frequencies and the sub-daily precipitation frequencies seemed to explain the interannual SWC variability better than the total of precipitation. Spatially, all these precipitation frequencies were better indicators of summer SWC than precipitation totals, but these better performances were only observed in non-forest ecosystems. Our results demonstrate that precipitation frequency may play an important role in regulating both interannual and spatial variations of summer SWC, which has probably been overlooked or underestimated. However, the spatial interpretation should carefully consider other factors, such as the plant functional types and soil characteristics of diverse ecoregions. (letter)

  17. Soil water content evaluation considering time-invariant spatial pattern and space-variant temporal change

    Science.gov (United States)

    Hu, W.; Si, B. C.

    2013-10-01

    Soil water content (SWC) varies in space and time. The objective of this study was to evaluate soil water content distribution using a statistical model. The model divides spatial SWC series into time-invariant spatial patterns, space-invariant temporal changes, and space- and time-dependent redistribution terms. The redistribution term is responsible for the temporal changes in spatial patterns of SWC. An empirical orthogonal function was used to separate the total variations of redistribution terms into the sum of the product of spatial structures (EOFs) and temporally-varying coefficients (ECs). Model performance was evaluated using SWC data of near-surface (0-0.2 m) and root-zone (0-1.0 m) from a Canadian Prairie landscape. Three significant EOFs were identified for redistribution term for both soil layers. EOF1 dominated the variations of redistribution terms and it resulted in more changes (recharge or discharge) in SWC at wetter locations. Depth to CaCO3 layer and organic carbon were the two most important controlling factors of EOF1, and together, they explained over 80% of the variations in EOF1. Weak correlation existed between either EOF2 or EOF3 and the observed factors. A reasonable prediction of SWC distribution was obtained with this model using cross validation. The model performed better in the root zone than in the near surface, and it outperformed conventional EOF method in case soil moisture deviated from the average conditions.

  18. Impact of climate change on maize potential productivity and the potential productivity gap in southwest China

    Science.gov (United States)

    He, Di; Wang, Jing; Dai, Tong; Feng, Liping; Zhang, Jianping; Pan, Xuebiao; Pan, Zhihua

    2014-12-01

    The impact of climate change on maize potential productivity and the potential productivity gap in Southwest China (SWC) are investigated in this paper. We analyze the impact of climate change on the photosynthetic, light-temperature, and climatic potential productivity of maize and their gaps in SWC, by using a crop growth dynamics statistical method. During the maize growing season from 1961 to 2010, minimum temperature increased by 0.20°C per decade ( p gap between light-temperature and climatic potential productivity varied from 12 to 2729 kg ha-1, with the high value areas centered in northern and southwestern SWC. Climatic productivity of these areas reached only 10%-24% of the light-temperature potential productivity, suggesting that there is great potential to increase the maize potential yield by improving water management in these areas. In particular, the gap has become larger in the most recent 10 years. Sensitivity analysis shows that the climatic potential productivity of maize is most sensitive to changes in temperature in SWC. The findings of this study are helpful for quantification of irrigation water requirements so as to achieve maximum yield potentials in SWC.

  19. A new two-stage approach for predicting the soil water characteristic from saturation to oven-dryness

    DEFF Research Database (Denmark)

    Karup Jensen, Dan; Tuller, Markus; de Jonge, Lis Wollesen

    2015-01-01

    to slow and inaccurate measurements. Hence, models applied to predict the SWC consequently exclude the dry region and are often only applicable for specific soil textural classifications. The present study proposes a new two-step approach to prediction of the continuous SWC from saturation to oven dryness...... using a limited number of measured textural data, organic matter content and dry bulk density. The proposed approach combines dry- and wet-region functions to obtain the entire SWC by means of parameterizing a previously developed continuous equation. The dry region function relates gravimetric soil...

  20. Superior Weapons Systems Through Castings (SWC)

    Science.gov (United States)

    2012-11-30

    matrix and the ceramic particles. As the loading of the ceramic increases, there is a balance between the increases in thermal conductivity that...Final Report November 30, 2012 Relative X-Ray Intensity Vs. 2G for Alloy 1 (7.9Zn-4.9Mg) .JLi — Data —TPhase Matrix (FCC Aluminum) Wii -i. i...SFSA Board of Directors, and national meetings. The research committees and national meetings provided industry with direct access to the researchers

  1. Characterization of key aroma-active compounds in lychee (Litchi chinensis Sonn.

    Directory of Open Access Journals (Sweden)

    Shi Feng

    2018-04-01

    Full Text Available Volatile compounds in ‘Sweetheart’ lychee were examined using gas chromatography-olfactometry/mass spectrometry (GC-O/MS. Solvent assisted flavor evaporation (SAFE technique was used to identify the aroma-active compounds in lychee. Further characterization of the most important odorants in ‘Sweetheart’ lychee was achieved using aroma extract dilution analysis (AEDA. Thirty-one key aroma-active odorants were identified in the flavor dilution (FD factor range of 2–1024. Methional (cooked potato and geraniol (sweet, floral exhibited the highest FD factors of 1024 and 512, respectively, these were followed by furaneol (sweet, caramel, nerol (floral, sweet, dimethyl trisulfide (DMTS (preserved vegetable, sulfury, linalool (floral, (E,Z-2,6 nonadienal (cucumber and nerolidol (metalic, sesame oil. Furthermore, the flavor profile of ‘Sweetheart’ lychee was described by sensory analysis. Floral, tropical fruit, peach/apricot and honey were scored with relatively high scores for each aroma attribute. The sweetness rating was the highest score among all the attributes. Keywords: AEDA, Aroma-active compounds, GC-MS/O, SAFE, Sensory analysis

  2. Factors influencing adoption of soil and water conservation measures in southern Mali

    NARCIS (Netherlands)

    Bodnar, F.; Graaff, de J.

    2003-01-01

    A soil and water conservation (SWC) extension programme, promoting erosion control measures and soil fertility measures, has been going on in southern Mali since 1986. Five factors that influence farmer adoption of SWC measures were analysed: land pressure, cotton-growing area, possession of

  3. The Sleep–Wake Cycle in the Nicotinic Alpha-9 Acetylcholine Receptor Subunit Knock-Out Mice

    Directory of Open Access Journals (Sweden)

    Natalia Madrid-López

    2017-10-01

    Full Text Available There is a neural matrix controlling the sleep–wake cycle (SWC embedded within high ranking integrative mechanisms in the central nervous system. Nicotinic alpha-9 acetylcholine receptor subunit (alpha-9 nAChR participate in physiological processes occurring in sensory, endocrine and immune systems. There is a relationship between the SWC architecture, body homeostasis and sensory afferents so that disruption of afferent signaling is expected to affect the temporal organization of sleep and wake states. The analysis of the SWC of 9 nAChR knock-out animals may help to reveal the contribution of alpha-9 nAChR to sleep chronobiological determinants. Here we explore the polysomnogram in chronically implanted alpha-9 nAChR knock-out (KO and wild-type (WT individuals of the hybrid CBA/Sv129 mouse strain. Records were obtained in isolation chambers under a stable 12:12 light:dark cycle (LD. To unmask the 24-h modulation of the SWC a skeleton photoperiod (SP protocol was performed. Under LD the daily quota (in % of wakefulness (W, NREM sleep and REM sleep obtained in KO and WT animals were 45, 48 and 7, and 46, 46 and 8 respectively. Both groups exhibit nocturnal phase preference of W as well as diurnal and unimodal phase preference of NREM and REM sleep. The acrophase mean angles of KO vs. WT genotypes were not different (Zeitgeber Time: 6.5 vs. 14.9 for W, 4.3 vs. 2.8 for NREM sleep and 5.3 vs. 3.4 for REM sleep, respectively. Transference to SP do not affect daily state quotas, phase preferences and acrophases among genotypes. Unmasking phenomena of the SWC such as wake increment during the rest phase under SP was evident only among WT mice suggesting the involvement of retinal structures containing alpha-9 nAChR in masking processes. Furthermore, KO animals exhibit longer NREM and REM sleep episodes that is independent of illumination conditions. Consolidated diurnal NREM sleep contributed to obtain higher values of NREM sleep delta-EEG activity

  4. community participatory sustainable land management byelaw

    African Journals Online (AJOL)

    ACSS

    2014-02-11

    Feb 11, 2014 ... Public SWC investments were largely based Focus on low cost SLM practices on food for work or cash ... land and environmental protection, livestock production and marketing agency, .... Government policy prohibit free grazing, but SWC structures destroyed, trees trampled and .... Nutrient flows and.

  5. Does land tenure security matter for investment in soil and water conservation? Evidence from Kenya

    NARCIS (Netherlands)

    Kabubo-Mariara, J.; Linderhof, V.G.M.; Kruseman, G.

    2010-01-01

    This paper investigates the impact of tenure security and other factors on investment in soil and water conservation (SWC) in Kenya. Factor analysis, step-wise regression and reduced form model approaches are used to explain the willingness, likelihood and intensity of adoption of SWC investments.

  6. Characterization of key aroma-active compounds in lychee (Litchi chinensis Sonn.).

    Science.gov (United States)

    Feng, Shi; Huang, Mingyang; Crane, Jonathan Henry; Wang, Yu

    2018-04-01

    Volatile compounds in 'Sweetheart' lychee were examined using gas chromatography-olfactometry/mass spectrometry (GC-O/MS). Solvent assisted flavor evaporation (SAFE) technique was used to identify the aroma-active compounds in lychee. Further characterization of the most important odorants in 'Sweetheart' lychee was achieved using aroma extract dilution analysis (AEDA). Thirty-one key aroma-active odorants were identified in the flavor dilution (FD) factor range of 2-1024. Methional (cooked potato) and geraniol (sweet, floral) exhibited the highest FD factors of 1024 and 512, respectively, these were followed by furaneol (sweet, caramel), nerol (floral, sweet), dimethyl trisulfide (DMTS) (preserved vegetable, sulfury), linalool (floral), (E,Z)-2,6 nonadienal (cucumber) and nerolidol (metalic, sesame oil). Furthermore, the flavor profile of 'Sweetheart' lychee was described by sensory analysis. Floral, tropical fruit, peach/apricot and honey were scored with relatively high scores for each aroma attribute. The sweetness rating was the highest score among all the attributes. Copyright © 2017. Published by Elsevier B.V.

  7. A pragmatic approach to modelling soil and water conservation measures with a cathment scale erosion model.

    NARCIS (Netherlands)

    Hessel, R.; Tenge, A.J.M.

    2008-01-01

    To reduce soil erosion, soil and water conservation (SWC) methods are often used. However, no method exists to model beforehand how implementing such measures will affect erosion at catchment scale. A method was developed to simulate the effects of SWC measures with catchment scale erosion models.

  8. Key regulatory and safety issues emerging NEA activities. Lessons Learned from Fukushima Dai-ichi NPS Accident - Key Regulatory and Safety Issues

    International Nuclear Information System (INIS)

    Nakoski, John

    2013-01-01

    A presentation was provided on the key safety and regulatory issues and an update of activities undertaken by the NEA and its members in response to the accident at the Fukushima Daiichi nuclear power stations (NPS) on 11 March 2011. An overview of the accident sequence and the consequences was provided that identified the safety functions that were lost (electrical power, core cooling, and primary containment) that lead to units 1, 2, and 3 being in severe accident conditions with large off-site releases. Key areas identified for which activities of the NEA and member countries are in progress include accident management; defence-in-depth; crisis communication; initiating events; operating experience; deterministic and probabilistic assessments; regulatory infrastructure; radiological protection and public health; and decontamination and recovery. For each of these areas, a brief description of the on-going and planned NEA activities was provided within the three standing technical committees of the NEA with safety and regulatory mandates (the Committee on Nuclear Regulatory Activities - CNRA, the Committee on the Safety of Nuclear Installations - CSNI, and the Committee on Radiation Protection and Public Health - CRPPH). On-going activities of CNRA include a review of enhancement being made to the regulatory aspects for the oversight of on-site accident management strategies and processes in light of the lessons learned from the accident; providing guidance to regulators on crisis communication; and supporting the peer review of the safety assessments of risk-significant research reactor facilities in light of the accident. Within the scope of the CSNI mandate, activities are being undertaken to better understand accident progression; characteristics of new fuel designs; and a benchmarking study of fast-running software for estimating source term under severe accident conditions to support protective measure recommendations. CSNI also has ongoing work in human

  9. Hydrogen energy share improvement along with NOx (oxides of nitrogen) emission reduction in a hydrogen dual-fuel compression ignition engine using water injection

    International Nuclear Information System (INIS)

    Chintala, V.; Subramanian, K.A.

    2014-01-01

    Highlights: • H 2 energy share increased from 20% without water to 39% with SWC 270 g/kWh. • Specific water consumption (SWC) 200 g/kWh was selected as the optimum quantity. • NO x decreased about 24% with the optimum water quantity at 20% H 2 energy share. • At 20% H 2 share, energy efficiency decreased about 5.5% with the optimum water. • HC, CO and smoke emissions increased 38%, 100% and 69% with optimum water at 20% H 2 share. - Abstract: The study aims at enhancement of Hydrogen (H 2 ) energy share and reduction of Oxides of Nitrogen (NO x ) emission in a 7.4 kW-CI engine at 1500 rpm using water injection. The test engine was modified to run under dual-fuel operation with diesel–biodiesel blend (B20) and H 2 fuels for different Specific Water Consumption (SWC) of 130, 200, and 270 g/kWh. Under conventional H 2 dual-fuel mode, energy efficiency and NO x emission increased significantly while Hydrocarbon (HC), Carbon Monoxide (CO) and smoke emissions decreased. The maximum H 2 energy share increased from 20% without water to 32%, 36%, and 39% with SWC of 130, 200, and 270 g/kWh respectively. However, SWC of 200 g/kWh was selected as an optimum water quantity for knock free operation, better performance and lower emissions. At the optimum SWC with 20% H 2 energy share, the NO x emission and energy efficiency decreased about 24% and 5.7%, while HC and smoke emissions increased about 38% and 69%. At 20% H 2 energy share, the CO emission increased from 0.0 g/kWh without water to 1.2 g/kWh with the optimum SWC. However, reduction of these HC and CO emissions using oxidation catalysts needs to be studied further. A new methodology for determining heat release rate with consideration of crevice gas was proposed in the study

  10. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  11. Two novel cyclic peptides are key components of the antimicrobial activity of the Greenlandic isolate Pseudomonas sp. In5

    DEFF Research Database (Denmark)

    Hennessy, Rosanna Catherine; Phippen, Christopher; Nielsen, Kristian F.

    suppressive soil, Pseudomonas sp. In5 is therefore a promising potential biocontrol agent with potent activity against plant pathogens. Studies to date have shown nunamycin and nunapeptin as key components underpinning this antimicrobial activity. Current research is focussed on unravelling the regulation...... and antimicrobial mode of action of both peptides. Functional characterisation of the LuxR-type regulatory gene nunF by targeted knock-out and complementation resulted in the loss and gain of both antimicrobial activity and peptide synthesis respectively. Located downstream of the nunamycin biosynthetic genes, nun......F shows homology to syrF from P. syringae pv. syringae involved in the regulation of the antifungal peptide syringomycin. These results show that nunF is a key component of antimicrobial activity and synthesis of nunamycin and nunapeptin....

  12. What is the effect of local controls on the temporal stability of soil water contents?

    Science.gov (United States)

    Martinez, G.; Pachepsky, Y. A.; Vereecken, H.; Vanderlinden, K.; Hardelauf, H.; Herbst, M.

    2012-04-01

    Temporal stability of soil water content (TS SWC) reflects the spatio-temporal organization of SWC. Factors and their interactions that control this organization, are not completely understood and have not been quantified yet. It is understood that these factors should be classified into groups of local and non-local controls. This work is a first attempt to evaluate the effects of soil properties at a certain location as local controls Time series of SWC were generated by running water flow simulations with the HYDRUS6 code. Bare and grassed sandy loam, loam and clay soils were represented by sets of 100 independent soil columns. Within each set, values of saturated hydraulic conductivity (Ks) were generated randomly assuming for the standard deviation of the scaling factor of ln Ks a value ranging from 0.1 to 1.0. Weather conditions were the same for all of the soil columns. SWC at depths of 0.05 and 0.60 m, and the average water content of the top 1 m were analyzed. The temporal stability was characterized by calculating the mean relative differences (MRD) of soil water content. MRD distributions from simulations, developed from the log-normal distribution of Ks, agreed well with the experimental studies found in the literature. Generally, Ks was the leading variable to define the MRD rank for a specific location. Higher MRD corresponded to the lowest values of Ks when a single textural class was considered. Higher MRD were found in the finer texture when mixtures of textural classes were considered and similar values of Ks were compared. The relationships between the spread of the MRD distributions and the scaling factor of ln Ks were nonlinear. Variation in MRD was higher in coarser textures than in finer ones and more variability was seen in the topsoil than in the subsoil. Established vegetation decreased variability of MRD in the root zone and increased variability below. The dependence of MRD on Ks opens the possibility of using SWC sensor networks to

  13. Farm scale application of EMI and FDR sensors to measuring and mapping soil water content

    Science.gov (United States)

    Rallo, Giovanni; Provenzano, Giuseppe

    2017-04-01

    Soil water content (SWC) controls most water exchange processes within and between the soil-plants-atmosphere continuum and can therefore be considered as a practical variable for irrigation farmer choices. A better knowledge of spatial SWC patterns could improve farmer's awareness about critical crop water status conditions and enhance their capacity to characterize their behavior at the field or farm scale. However, accurate soil moisture measurement across spatial and temporal scales is still a challenging task and, specifically at intermediate spatial (0.1-100 ha) and temporal (minutes to days) scales, a data gap remains that limits our understanding over reliability of the SWC spatial measurements and its practical applicability in irrigation scheduling. In this work we compare the integrated EM38 (Geonics Ltd. Canada) response, collected at different sensor positions above ground to that obtained by integrating the depth profile of volumetric SWC measured with Diviner 2000 (Sentek) in conjunction with the depth response function of the EM38 when operated in both horizontal and vertical dipole configurations. On a 1.0-ha Olive grove site in Sicliy (Italy), 200 data points were collected before and after irrigation or precipitation events following a systematic sampling grid with focused measurements around the tree. Inside two different zone of the field, characterized from different soil physical properties, two Diviner 2000 access tube (1.2 m) were installed and used for the EM38 calibration. After calibration, the work aimed to propose the combined use of the FDR and EMI sensors to measuring and mapping root zone soil water content. We found strong correlations (R2 = 0.66) between Diviner 2000 SWC averaged to a depth of 1.2 m and ECa from an EM38 held in the vertical mode above the soil surface. The site-specific relationship between FDR-based SWC and ECa was linear for the purposes of estimating SWC over the explored range of ECa monitored at field levels

  14. Local and regional energy companies offering energy services: Key activities and implications for the business model

    International Nuclear Information System (INIS)

    Kindström, Daniel; Ottosson, Mikael

    2016-01-01

    Highlights: • Many companies providing energy services are experiencing difficulties. • This research identifies key activities for the provision of energy services. • Findings are aggregated to the business-model level providing managerial insights. • This research identifies two different business model innovation paths. • Energy companies may need to renew parts of, or the entire, business model. - Abstract: Energy services play a key role in increasing energy efficiency in the industry. The key actors in these services are the local and regional energy companies that are increasingly implementing energy services as part of their market offering and developing service portfolios. Although expectations for energy services have been high, progress has so far been limited, and many companies offering energy services, including energy companies, are experiencing difficulties in implementing energy services and providing them to the market. Overall, this research examines what is needed for local and regional energy companies to successfully implement energy services (and consequently provide them to the market). In doing this, a two-stage process is used: first, we identify key activities for the successful implementation of energy services, and second, we aggregate the findings to the business model level. This research demonstrates that to succeed in implementing energy services, an energy company may need to renew parts or all of its existing product-based business model, formulate a new business model, or develop coexisting multiple business models. By discussing two distinct business model innovation processes, this research demonstrates that there can be different paths to success.

  15. Active Rehabilitation-a community peer-based approach for persons with spinal cord injury: international utilisation of key elements.

    Science.gov (United States)

    Divanoglou, A; Tasiemski, T; Augutis, M; Trok, K

    2017-06-01

    Active Rehabilitation (AR) is a community peer-based approach that started in Sweden in 1976. As a key component of the approach, AR training camps provide intensive, goal-oriented, intentional, group-based, customised training and peer-support opportunities in a community environment for individuals with spinal cord injury. Prospective cross-sectional study. To describe the profile of the organisations that use components of the AR approach, and to explore the characteristics and the international variations of the approach. Twenty-two organisations from 21 countries from Europe, Asia and Africa reported using components of the AR approach during the past 10 years. An electronic survey was developed and distributed through a personalised email. Sampling involved a prospective identification of organisations that met the inclusion criteria and snowball strategies. While there were many collaborating links between the organisations, RG Active Rehabilitation from Sweden and Motivation Charitable Trust from the United Kingdom were identified as key supporting organisations. The 10 key elements of the AR approach were found to be used uniformly across the participating organisations. Small variations were associated with variations in country income and key supporting organisation. This is the first study to describe the key elements and international variations of the AR approach. This will provide the basis for further studies exploring the effectiveness of the approach, it will likely facilitate international collaboration on research and operational aspects and it could potentially support higher integration in the health-care system and long-term funding of these programmes.

  16. Decommissioning: Regulatory activities and identification of key organizational and human factors safety issues

    International Nuclear Information System (INIS)

    Durbin, N.E.; Melber, B.D.; Lekberg, A.

    2001-12-01

    In the late 1990's the Swedish government decided to shut down Unit 1 of the Barsebaeck nuclear power plant. This report documents some of the efforts made by the Swedish Nuclear Power Inspectorate (SKI) to address human factors and organizational issues in nuclear safety during decommissioning of a nuclear facility. This report gives a brief review of the background to the decommissioning of Barsebaeck 1 and points out key safety issues that can arise during decommissioning. The main regulatory activities that were undertaken were requirements that the plant provide special safety reports on decommissioning focusing on first, the operation of both units until closure of Unit 1 and second, the operation of Unit 2 when Unit 1 was closed. In addition, SKI identified areas that might be affected by decommissioning and called these areas out for special attention. With regard to these areas of special attention, SKI required that the plant provide monthly reports on changing and emerging issues as well as self-assessments of the areas to be addressed in the special safety reports. Ten key safety issues were identified and evaluated with regard to different stages of decommissioning and with regard to the actions taken by Barsebaeck. Some key conclusions from SKI's experience in regulating a decommissioning nuclear power plant conclude the report

  17. Higher assimilation than respiration sensitivity to drought for a desert ecosystem in Central Asia.

    Science.gov (United States)

    Gu, Daxing; Otieno, Dennis; Huang, Yuqing; Wang, Quan

    2017-12-31

    Responses of ecosystem assimilation and respiration to global climate change vary considerably among terrestrial ecosystems constrained by both biotic and abiotic factors. In this study, net CO 2 exchange between ecosystem and atmosphere (NEE) was measured over a 4-year period (2013-2016) using eddy covariance technology in a desert ecosystem in Central Asia. Ecosystem assimilation (gross primary production, GPP) and respiration (R eco ) were derived from NEE by fitting light response curves to NEE data based on day- and nighttime data, and their responses to soil water content (SWC) and evaporative fraction (EF) were assessed during the growing season. Results indicated that both GPP and R eco linearly decreased with declining SWC, with the sensitivity of GPP to SWC being 3.8 times higher than that of R eco during the entire growing season. As a result, ecosystem CO 2 sequestration capacity decreased from 4.00μmolm -2 s -1 to 1.00μmolm -2 s -1 , with increasing soil drought . On a seasonal scale, significant correlation between GPP and SWC was only found in spring while that between R eco and SWC was found in all growing seasons with the sensitivity increasing steadily from spring to autumn. EF had a low correlation with SWC, GPP and R eco (R 2 =0.03, 0.02, 0.05, respectively), indicating that EF was not a good proxy for soil drought and energy partitioning was not tightly coupled to ecosystem carbon exchanges in this desert ecosystem. The study deepens our knowledge of ecosystem carbon exchange and its response to drought as well as its coupling with ecosystem energy partitioning in an extreme dry desert. The information is critical for better assessing carbon sequestration capacity in dryland, and for understanding its feedback to climate change. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. High atmospheric demand for water can limit forest carbon uptake and transpiration as severely as dry soil

    Science.gov (United States)

    Benjamin N. Sulman; Daniel Tyler Roman; Koong Yi; Lixin Wang; Richard P. Phillips; Kimberly A. Novick

    2016-01-01

    When stressed by low soil water content (SWC) or high vapor pressure deficit (VPD), plants close stomata, reducing transpiration and photosynthesis. However, it has historically been difficult to disentangle the magnitudes of VPD compared to SWC limitations on ecosystem-scale fluxes. We used a 13 year record of eddy covariance measurements from a forest in south...

  19. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  20. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  1. Effects of low level laser therapy and high voltage stimulation on diabetic wound healing

    Directory of Open Access Journals (Sweden)

    María Cristina Sandoval Ortíz

    2014-08-01

    Full Text Available Background: a review of the literature found no clinical studies in which low level laser therapy (LLLT and high voltage pulsed current (HVPC were compared to evaluate their effectiveness in promoting wound healing. Objective: The purpose of this study was compare the effects of LLLT, HVPC and standard wound care (SWC on the healing of diabetic foot ulcers. Methods: randomized controlled clinical trial where diabetic patients were divided in control group (CG treated with SWC; HVPC group received HVPC plus SWC; LLLTgroup, treated with LLLT plus SWC. HVPC was applied 45min, 100pps and 100μs. LLLTparameters were 685nm, 30mW,2J/cm² applied to the wound edges and 1,5J/cm² in the wound bed. All subjects were treated 16 weeks or until the wound closed. The variables were healing, healing proportion, ulcers's characteristics, protective sensation, nerve conduction studies (NCS and quality life. ANCOVA analysis and a Fisher's exact test were applied. Results: Twenty-eight subjects completed the protocol.The healing was reached by 7/9, 8/10 and 6/9 participants of the LLLT, HVPC and CG respectively in the 16th week. There were no statistically significant differences between the groups in the healing proportion, NCS, sensory testing or quality of life (p>0,05. Conclusions: The results of this study did not demonstrated additional effects of LLL or HVPC to the standard wound care (SWC on healing of diabetic ulcers.

  2. Generic superweak chaos induced by Hall effect

    Science.gov (United States)

    Ben-Harush, Moti; Dana, Itzhack

    2016-05-01

    We introduce and study the "kicked Hall system" (KHS), i.e., charged particles periodically kicked in the presence of uniform magnetic (B ) and electric (E ) fields that are perpendicular to each other and to the kicking direction. We show that for resonant values of B and E and in the weak-chaos regime of sufficiently small nonintegrability parameter κ (the kicking strength), there exists a generic family of periodic kicking potentials for which the Hall effect from B and E significantly suppresses the weak chaos, replacing it by "superweak" chaos (SWC). This means that the system behaves as if the kicking strength were κ2 rather than κ . For E =0 , SWC is known to be a classical fingerprint of quantum antiresonance, but it occurs under much less generic conditions, in particular only for very special kicking potentials. Manifestations of SWC are a decrease in the instability of periodic orbits and a narrowing of the chaotic layers, relative to the ordinary weak-chaos case. Also, for global SWC, taking place on an infinite "stochastic web" in phase space, the chaotic diffusion on the web is much slower than the weak-chaos one. Thus, the Hall effect can be relatively stabilizing for small κ . In some special cases, the effect is shown to cause ballistic motion for almost all parameter values. The generic global SWC on stochastic webs in the KHS appears to be the two-dimensional closest analog to the Arnol'd web in higher dimensional systems.

  3. Footprint radius of a cosmic-ray neutron probe for measuring soil-water content and its spatiotemporal variability in an alpine meadow ecosystem

    Science.gov (United States)

    Zhu, Xuchao; Cao, Ruixue; Shao, Mingan; Liang, Yin

    2018-03-01

    Cosmic-ray neutron probes (CRNPs) have footprint radii for measuring soil-water content (SWC). The theoretical radius is much larger at high altitude, such as the northern Tibetan Plateau, than the radius at sea level. The most probable practical radius of CRNPs for the northern Tibetan Plateau, however, is not known due to the lack of SWC data in this hostile environment. We calculated the theoretical footprint of the CRNP based on a recent simulation and analyzed the practical radius of a CRNP for the northern Tibetan Plateau by measuring SWC at 113 sampling locations on 21 measuring occasions to a depth of 30 cm in a 33.5 ha plot in an alpine meadow at 4600 m a.s.l. The temporal variability and spatial heterogeneity of SWC within the footprint were then analyzed. The theoretical footprint radius was between 360 and 420 m after accounting for the influences of air humidity, soil moisture, vegetation and air pressure. A comparison of SWCs measured by the CRNP and a neutron probe from access tubes in circles with different radii conservatively indicated that the most probable experimental footprint radius was >200 m. SWC within the CRNP footprint was moderately variable over both time and space, but the temporal variability was higher. Spatial heterogeneity was weak, but should be considered in future CRNP calibrations. This study provided theoretical and practical bases for the application and promotion of CRNPs in alpine meadows on the Tibetan Plateau.

  4. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1996

    International Nuclear Information System (INIS)

    Garcia, R.S.

    1996-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities tat the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during Fiscal Year 1996

  5. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1995

    International Nuclear Information System (INIS)

    Forman, S.

    1995-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities that the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during fiscal year 1995

  6. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  7. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  8. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    Science.gov (United States)

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  9. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews

    Directory of Open Access Journals (Sweden)

    Brian K. Lo

    2017-10-01

    Full Text Available Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  10. Contrasting response of coexisting plant’s water-use patterns to experimental precipitation manipulation in an alpine grassland community of Qinghai Lake watershed, China

    Science.gov (United States)

    Li, Xiao-Yan; He, Bin; Liu, Jinzhao; Jiang, Zhiyun; Zhang, Cicheng

    2018-01-01

    Understanding species-specific changes in water-use patterns under recent climate scenarios is necessary to predict accurately the responses of seasonally dry ecosystems to future climate. In this study, we conducted a precipitation manipulation experiment to investigate the changes in water-use patterns of two coexisting species (Achnatherum splendens and Allium tanguticum) to alterations in soil water content (SWC) resulting from increased and decreased rainfall treatments. The results showed that the leaf water potential (Ψ) of A. splendens and A. tanguticum responded to changes in shallow and middle SWC at both the control and treatment plots. However, A. splendens proportionally extracted water from the shallow soil layer (0–10cm) when it was available but shifted to absorbing deep soil water (30–60 cm) during drought. By contrast, the A. tanguticum did not differ significantly in uptake depth between treatment and control plots but entirely depended on water from shallow soil layers. The flexible water-use patterns of A.splendens may be a key factor facilitating its dominance and it better acclimates the recent climate change in the alpine grassland community around Qinghai Lake. PMID:29677195

  11. VfrB Is a Key Activator of the Staphylococcus aureus SaeRS Two-Component System.

    Science.gov (United States)

    Krute, Christina N; Rice, Kelly C; Bose, Jeffrey L

    2017-03-01

    In previous studies, we identified the fatty acid kinase virulence factor regulator B (VfrB) as a potent regulator of α-hemolysin and other virulence factors in Staphylococcus aureus In this study, we demonstrated that VfrB is a positive activator of the SaeRS two-component regulatory system. Analysis of vfrB , saeR , and saeS mutant strains revealed that VfrB functions in the same pathway as SaeRS. At the transcriptional level, the promoter activities of SaeRS class I ( coa ) and class II ( hla ) target genes were downregulated during the exponential growth phase in the vfrB mutant, compared to the wild-type strain. In addition, saePQRS expression was decreased in the vfrB mutant strain, demonstrating a need for this protein in the autoregulation of SaeRS. The requirement for VfrB-mediated activation was circumvented when SaeS was constitutively active due to an SaeS (L18P) substitution. Furthermore, activation of SaeS via human neutrophil peptide 1 (HNP-1) overcame the dependence on VfrB for transcription from class I Sae promoters. Consistent with the role of VfrB in fatty acid metabolism, hla expression was decreased in the vfrB mutant with the addition of exogenous myristic acid. Lastly, we determined that aspartic acid residues D38 and D40, which are predicted to be key to VfrB enzymatic activity, were required for VfrB-mediated α-hemolysin production. Collectively, this study implicates VfrB as a novel accessory protein needed for the activation of SaeRS in S. aureus IMPORTANCE The SaeRS two-component system is a key regulator of virulence determinant production in Staphylococcus aureus Although the regulon of this two-component system is well characterized, the activation mechanisms, including the specific signaling molecules, remain elusive. Elucidating the complex regulatory circuit of SaeRS regulation is important for understanding how the system contributes to disease causation by this pathogen. To this end, we have identified the fatty acid kinase

  12. Characteristics of the cold-water belt formed off Soya Warm Current

    Science.gov (United States)

    Ishizu, Miho; Kitade, Yujiro; Matsuyama, Masaji

    2008-12-01

    We examined the data obtained by acoustic Doppler current profiler, conductivity-temperature-depth profiler, and expendable bathythermograph observations, which were collected in the summers of 2000, 2001, and 2002, to clarify the characteristics of the cold-water belt (CWB), i.e., lower-temperature water than the surrounding water extending from the southwest coast of Sakhalin along the offshore side of Soya Warm Current (SWC) and to confirm one of the formation mechanisms of the CWB as suggested by our previous study, i.e., the upwelling due to the convergence of bottom Ekman transport off the SWC region. The CWB was observed at about 30 km off the coast, having a thickness of 14 m and a minimum temperature of 12°C at the sea surface. The CWB does not have the specific water mass, but is constituted of three representative water types off the northeast coast of Hokkaido in summer, i.e., SWC water, Fresh Surface Okhotsk Sea Water, and Okhotsk Sea Intermediate Water. In a comparison of the horizontal distributions of current and temperature, the CWB region is found to be advected to the southeast at an average of 40 ± 29% of the maximum current velocity of the SWC. The pumping speed due to the convergence of the bottom Ekman transport is estimated as (1.5-3.0) × 10-4 m s-1. We examined the mixing ratio of the CWB, and the results implied that the water mass of the CWB is advected southeastward and mixes with a water mass upwelling in a different region off SWC.

  13. Determinants of farmers’ perception to invest in soil and water conservation technologies in the North-Western Highlands of Ethiopia

    Directory of Open Access Journals (Sweden)

    Desalew Meseret Moges

    2017-03-01

    Full Text Available Soil erosion by water is a severe and continuous ecological problem in the north-western Highlands of Ethiopia. Limited perception of farmers to practice soil and water conservation (SWC technologies is one of the major causes that have resulted accelerated soil erosion. Therefore, this paper examines the major determinants of farmers’ perception to use and invest in SWC technologies in Ankasha District, north-western highlands of Ethiopia. A detailed field survey was carried out among 338 households, randomly selected from two rural sample kebeles (called villages here after. Descriptive statistics and logistic regression model were used to analyse the effects of multiple variables on farmers’ perception. The results indicate that educational level of the respondents and their access to trainings were found to have a positive and very significant association (P<0.01 with farmers’ perception. Likewise, land ownership, plot size, slope type, and extension contact positively and significantly influenced farmers’ perception at 5% level of significance. On the other hand, the influence of respondents’ age and plot distance from the homestead was found to be negative and significant (P<0.05. The overall results of this study indicate that the perception of farmers to invest in SWC technologies was highly determined by socioeconomic, institutional, attitudinal and biophysical factors. Thus, a better understanding of constrains that influence farmers' perception is very important while designing and implementing SWC technologies. Frequent contacts between farmers and extension agents and continues agricultural trainings are also needed to increase awareness of the impacts of SWC benefits.

  14. Key beliefs related to decisions for physical activity engagement among first-in-family students transitioning to university.

    Science.gov (United States)

    Cowie, Eloise; Hamilton, Kyra

    2014-08-01

    The current study investigated key beliefs related to decisions for physical activity (PA) engagement among first-in-family (FIF) students transitioning to university. FIF students (n = 157) completed an online questionnaire assessing standard theory of planned behaviour constructs and belief-based items. One week later, participants completed a follow-up questionnaire assessing self-reported PA during the previous week. Results identified a range of behavioural, normative, and control beliefs that were significantly correlated with both PA intention and behaviour. Various key beliefs were also identified in relation to FIF students' decisions to be regularly physically active, with behavioural beliefs such as "take up too much time", normative beliefs including "friends outside of university", and control beliefs such as "cost", identified. Finally, frequencies of those who strongly or fully accepted these beliefs were analysed, demonstrating that typically, a large number of FIF students did not hold the beliefs, and as such, these are relevant to target in resultant interventions. The current study effectively highlights a number of key beliefs that can be targeted in programs aimed at encouraging FIF students' PA. Further, the study addresses a gap in the literature of targeting FIF students, a cohort at risk for inactivity, and utilises a sound theoretical framework to identify the unique set of beliefs guiding decisions for PA for this at-risk community group.

  15. Direct transcriptional activation of BT genes by NLP transcription factors is a key component of the nitrate response in Arabidopsis.

    Science.gov (United States)

    Sato, Takeo; Maekawa, Shugo; Konishi, Mineko; Yoshioka, Nozomi; Sasaki, Yuki; Maeda, Haruna; Ishida, Tetsuya; Kato, Yuki; Yamaguchi, Junji; Yanagisawa, Shuichi

    2017-01-29

    Nitrate modulates growth and development, functioning as a nutrient signal in plants. Although many changes in physiological processes in response to nitrate have been well characterized as nitrate responses, the molecular mechanisms underlying the nitrate response are not yet fully understood. Here, we show that NLP transcription factors, which are key regulators of the nitrate response, directly activate the nitrate-inducible expression of BT1 and BT2 encoding putative scaffold proteins with a plant-specific domain structure in Arabidopsis. Interestingly, the 35S promoter-driven expression of BT2 partially rescued growth inhibition caused by reductions in NLP activity in Arabidopsis. Furthermore, simultaneous disruption of BT1 and BT2 affected nitrate-dependent lateral root development. These results suggest that direct activation of BT1 and BT2 by NLP transcriptional activators is a key component of the molecular mechanism underlying the nitrate response in Arabidopsis. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Effects of soil water content and elevated CO2 concentration on the monoterpene emission rate of Cryptomeria japonica.

    Science.gov (United States)

    Mochizuki, Tomoki; Amagai, Takashi; Tani, Akira

    2018-04-11

    Monoterpenes emitted from plants contribute to the formation of secondary pollution and affect the climate system. Monoterpene emission rates may be affected by environmental changes such as increasing CO 2 concentration caused by fossil fuel burning and drought stress induced by climate change. We measured monoterpene emissions from Cryptomeria japonica clone saplings grown under different CO 2 concentrations (control: ambient CO 2 level, elevated CO 2 : 1000μmolmol -1 ). The saplings were planted in the ground and we did not artificially control the SWC. The relationship between the monoterpene emissions and naturally varying SWC was investigated. The dominant monoterpene was α-pinene, followed by sabinene. The monoterpene emission rates were exponentially correlated with temperature for all measurements and normalized (35°C) for each measurement day. The daily normalized monoterpene emission rates (E s0.10 ) were positively and linearly correlated with SWC under both control and elevated CO 2 conditions (control: r 2 =0.55, elevated CO 2 : r 2 =0.89). The slope of the regression line of E s0.10 against SWC was significantly higher under elevated CO 2 than under control conditions (ANCOVA: P<0.01), indicating that the effect of CO 2 concentration on monoterpene emission rates differed by soil water status. The monoterpene emission rates estimated by considering temperature and SWC (Improved G93 algorithm) better agreed with the measured monoterpene emission rates, when compared with the emission rates estimated by considering temperature alone (G93 algorithm). Our results demonstrated that the combined effects of SWC and CO 2 concentration are important for controlling the monoterpene emissions from C. japonica clone saplings. If these relationships can be applied to the other coniferous tree species, our results may be useful to improve accuracy of monoterpene emission estimates from the coniferous forests as affected by climate change in the present and

  17. FFTF radioactive solid waste handling and transport

    International Nuclear Information System (INIS)

    Thomson, J.D.

    1982-01-01

    The equipment necessary for the disposal of radioactive solid waste from the Fast Flux Test Facility (FFTF) is scheduled to be available for operation in late 1982. The plan for disposal of radioactive waste from FFTF will utilize special waste containers, a reusable Solid Waste Cask (SWC) and a Disposable Solid Waste Cask (DSWC). The SWC will be used to transport the waste from the Reactor Containment Building to a concrete and steel DSWC. The DSWC will then be transported to a burial site on the Hanford Reservation near Richland, Washington. Radioactive solid waste generated during the operation of the FFTF consists of activated test assembly hardware, reflectors, in-core shim assemblies and control rods. This radioactive waste must be cleaned (sodium removed) prior to disposal. This paper provides a description of the solid waste disposal process, and the casks and equipment used for handling and transport

  18. Application of Activity-Based Costing Management System by Key Success Paths to Promote the Competitive Advantages and Operation Performance

    OpenAIRE

    Mei-Fang Wu; Shu-Li Wang; Feng-Tsung Cheng

    2015-01-01

    Highly developed technology and highly competitive global market highlight the important role of competitive advantages and operation performances in sustainable company operation. Activity-Based Costing (ABC) provides accurate operation cost and operation performance information. Rich literatures provide relevant research with cases study on Activity-Based Costing application, but the research on cause relationship between key success factors and its specific outcome, su...

  19. Study on the Correlation between Gene Expression and Enzyme Activity of Seven Key Enzymes and Ginsenoside Content in Ginseng in Over Time in Ji'an, China.

    Science.gov (United States)

    Yin, Juxin; Zhang, Daihui; Zhuang, Jianjian; Huang, Yi; Mu, Ying; Lv, Shaowu

    2017-12-11

    Panax ginseng is a traditional medicine. Fresh ginseng is one of the most important industries related to ginseng development, and fresh ginseng of varying ages has different medicinal properties. Previous research has not systematically reported the correlation between changes in key enzyme activity with changes in ginsenoside content in fresh ginseng over time. In this study, for the first time, we use ginseng samples of varying ages in Ji'an and systematically reported the changes in the activity of seven key enzymes (HMGR, FPS, SS, SE, DS, CYP450, and GT). We investigated the content of ginsenoside and gene expression of these key enzymes. Ginsenoside content was measured using HPLC. HPLC, GC-MS, and LC-MS were combined to measure the enzyme activity of the key enzymes. Quantitative PCR was used in the investigation of gene expression. By analyzing the correlation between the enzyme activity and the transcription level of the key enzymes with ginsenoside content, we found that DS and GT enzyme activities are significantly correlated with the ginsenoside content in different ages of ginseng. Our findings might provide a new strategy to discriminate between ginseng of different years. Meanwhile, this research provides important information for the in-depth study of ginsenoside biosynthesis.

  20. The SEDIBUD (Sediment Budgets in Cold Environments) Programme: Current activities and future key tasks

    Science.gov (United States)

    Beylich, A. A.; Lamoureux, S. F.; Decaulne, A.

    2012-04-01

    Projected climate change in cold regions is expected to alter melt season duration and intensity, along with the number of extreme rainfall events, total annual precipitation and the balance between snowfall and rainfall. Similarly, changes to the thermal balance are expected to reduce the extent of permafrost and seasonal ground frost and increase active layer depths. These effects will undoubtedly change surface environments in cold regions and alter the fluxes of sediments, nutrients and solutes, but the absence of quantitative data and coordinated process monitoring and analysis to understand the sensitivity of the Earth surface environment is acute in cold climate environments. The International Association of Geomorphologists (I.A.G./A.I.G.)SEDIBUD (Sediment Budgets in Cold Environments) Programme was formed in 2005 to address this existing key knowledge gap. SEDIBUD currently has about 400 members worldwide and the Steering Committee of this international programme is composed of ten scientists from eight different countries: Achim A. Beylich (Chair) (Norway), Armelle Decaulne (Secretary) (France), John C. Dixon (USA), Scott F. Lamoureux (Vice-Chair) (Canada), John F. Orwin (Canada), Jan-Christoph Otto (Austria), Irina Overeem (USA), Thorsteinn Saemundsson (Iceland), Jeff Warburton (UK), Zbigniew Zwolinski (Poland). The central research question of this global group of scientists is to: Assess and model the contemporary sedimentary fluxes in cold climates, with emphasis on both particulate and dissolved components. Initially formed as European Science Foundation (ESF) Network SEDIFLUX (2004-2006), SEDIBUD has further expanded to a global group of researchers with field research sites located in polar and alpine regions in the northern and southern hemisphere. Research carried out at each of the close to 50 defined SEDIBUD key test sites varies by programme, logistics and available resources, but typically represent interdisciplinary collaborations of

  1. The New Era in Operational Forecasting

    Science.gov (United States)

    Tobiska, W.; Schunk, R. W.; Sojka, J. J.; Carlson, H. C.; Gardner, L. C.; Scherliess, L.; Zhu, L.; Eccles, J. V.; Rice, D. D.; Bouwer, D.; Bailey, J. J.; Knipp, D. J.; Blake, J. B.; Rex, J.; Fuschino, R.; Mertens, C. J.; Gersey, B.; Wilkins, R.; Atwell, W.

    2012-12-01

    Space weather's effects upon the near-Earth environment are due to dynamic changes in the energy transfer processes from the Sun's photons, particles, and fields. Of the space environment domains that are affected by space weather, the ionosphere, thermosphere, and even troposphere are key regions that are affected. The Utah State University (USU) Space Weather Center (SWC) and Space Environment Technologies (SET) are developing and producing commercial space weather applications. Key systems for providing timely information about the effects of space weather are SWC's Global Assimilation of Ionospheric Measurements (GAIM) system, SET's Magnetosphere Alert and Prediction System (MAPS), and SET's Automated Radiation Measurements for Aviation Safety (ARMAS) system. GAIM, operated by SWC, improves real-time communication and navigation systems by continuously ingesting up to 10,000 slant TEC measurements every 15-minutes from approximately 500 stations. Ionosonde data from several dozen global stations is ingested every 15 minutes to improve the vertical profiles within GAIM. These operational runs enable the reporting of global radio high frequency (HF) signal strengths and near vertical incidence skywave (NVIS) maps used by amateur radio operators and emergency responders via the http://q-upnow.com website. MAPS provides a forecast Dst index out to 6 days through the data-driven Anemomilos algorithm. Anemomilos uses observational proxies for the magnitude, location, and velocity of solar ejecta events. This forecast index is used by satellite operations to characterize upcoming geomagnetic storms, for example. ARMAS is demonstrating a prototype flight of microdosimeters on aircraft to capture the "weather" of the radiation environment for air-crew and passenger safety. It assimilates real-time radiation dose and dose rate data into the global NAIRAS radiation system to correct the global climatology for more accurate radiation fields along flight tracks. This team

  2. Reliability and validity of the Mywellness Key physical activity monitor

    Directory of Open Access Journals (Sweden)

    Sieverdes JC

    2013-01-01

    Full Text Available John C Sieverdes,1 Eric E Wickel,2 Gregory A Hand,3 Marco Bergamin,4 Robert R Moran,5 Steven N Blair3,51Medical University of South Carolina, College of Nursing and Medicine, Charleson, SC, 2University of Tulsa, Exercise and Sport Science, Tulsa, OK, 3University of South Carolina, Department of Exercise Science, Division of Health Aspects of Physical Activity, Arnold School of Public Health, Columbia, SC, USA; 4University of Padova, Department of Medicine, Sports Medicine Division, Padova, Italy; 5University of South Carolina, Department of Epidemiology and Biostatistics, Arnold School of Public Health, Columbia, SC, USABackground: This study evaluated the reliability and criterion validity of the Mywellness Key accelerometer (MWK using treadmill protocols and indirect calorimetry.Methods: Twenty-five participants completed two four-stage 20-minute treadmill protocols while wearing two MWK accelerometers. Reliability was assessed using raw counts. Validity was assessed by comparing the estimated VO2 calculated from the MWK with values from respiratory gas exchange.Results: Good overall and point estimates of reliability were found for the MWK (all intraclass correlations > 0.93. Generalizability theory coefficients showed lower values for running speed (0.70 versus walking speed (all > 0.84, with the majority of the overall percentage of variability derived from the participant (68%–88% of the total 100%. Acceptable validity was found overall (Pearson’s r = 0.895–0.902, P < 0.0001, with an overall mean absolute error of 16.22% and a coefficient of variance of 16.92%. Bland-Altman plots showed an overestimation of energy expenditure during the running speed, but total kilocalories were underestimated during the protocol by approximately 10%.Conclusion: Good validity was found during light and moderate walking, while running was slightly overestimated. The MWK may be useful for clinicians and researchers interested in promotion or assessment

  3. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  4. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  5. Identification of Key Functional Residues in the Active Site of Human β1,4-Galactosyltransferase 7

    Science.gov (United States)

    Talhaoui, Ibtissam; Bui, Catherine; Oriol, Rafael; Mulliert, Guillermo; Gulberti, Sandrine; Netter, Patrick; Coughtrie, Michael W. H.; Ouzzine, Mohamed; Fournel-Gigleux, Sylvie

    2010-01-01

    Glycosaminoglycans (GAGs) play a central role in many pathophysiological events, and exogenous xyloside substrates of β1,4-galactosyltransferase 7 (β4GalT7), a major enzyme of GAG biosynthesis, have interesting biomedical applications. To predict functional peptide regions important for substrate binding and activity of human β4GalT7, we conducted a phylogenetic analysis of the β1,4-galactosyltransferase family and generated a molecular model using the x-ray structure of Drosophila β4GalT7-UDP as template. Two evolutionary conserved motifs, 163DVD165 and 221FWGWGREDDE230, are central in the organization of the enzyme active site. This model was challenged by systematic engineering of point mutations, combined with in vitro and ex vivo functional assays. Investigation of the kinetic properties of purified recombinant wild-type β4GalT7 and selected mutants identified Trp224 as a key residue governing both donor and acceptor substrate binding. Our results also suggested the involvement of the canonical carboxylate residue Asp228 acting as general base in the reaction catalyzed by human β4GalT7. Importantly, ex vivo functional tests demonstrated that regulation of GAG synthesis is highly responsive to modification of these key active site amino acids. Interestingly, engineering mutants at position 224 allowed us to modify the affinity and to modulate the specificity of human β4GalT7 toward UDP-sugars and xyloside acceptors. Furthermore, the W224H mutant was able to sustain decorin GAG chain substitution but not GAG synthesis from exogenously added xyloside. Altogether, this study provides novel insight into human β4GalT7 active site functional domains, allowing manipulation of this enzyme critical for the regulation of GAG synthesis. A better understanding of the mechanism underlying GAG assembly paves the way toward GAG-based therapeutics. PMID:20843813

  6. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  7. Noncoherent Spectral Optical CDMA System Using 1D Active Weight Two-Code Keying Codes

    Directory of Open Access Journals (Sweden)

    Bih-Chyun Yeh

    2016-01-01

    Full Text Available We propose a new family of one-dimensional (1D active weight two-code keying (TCK in spectral amplitude coding (SAC optical code division multiple access (OCDMA networks. We use encoding and decoding transfer functions to operate the 1D active weight TCK. The proposed structure includes an optical line terminal (OLT and optical network units (ONUs to produce the encoding and decoding codes of the proposed OLT and ONUs, respectively. The proposed ONU uses the modified cross-correlation to remove interferences from other simultaneous users, that is, the multiuser interference (MUI. When the phase-induced intensity noise (PIIN is the most important noise, the modified cross-correlation suppresses the PIIN. In the numerical results, we find that the bit error rate (BER for the proposed system using the 1D active weight TCK codes outperforms that for two other systems using the 1D M-Seq codes and 1D balanced incomplete block design (BIBD codes. The effective source power for the proposed system can achieve −10 dBm, which has less power than that for the other systems.

  8. Post-adoption behaviour of farmers towards soil and water conservation technologies of watershed management in India

    Directory of Open Access Journals (Sweden)

    Gopal Lal Bagdi

    2015-09-01

    Full Text Available The Indian Institute of Soil and Water Conservation (IISWC and its Research Centres have developed many successful model watershed projects in India in the past and implemented many Soil and Water Conservation (SWC technologies for sustainable watershed management. While many evaluation studies were conducted on these projects in the past, there has been no assessment of the post-adoption status of the SWC technologies over a longer period. It was imperative to appraise the behaviour of the farmers with regard to the continuance or discontinuance of the technologies adopted, diffusion or infusion that took place and technological gaps that occurred in due course of time in the post watershed programme. Therefore, it was realized that the post-adoption behaviour of beneficiary farmers who have adopted different soil and water conservation technologies for watershed management projects should be studied in detail. The research study was initiated in 2012 as a core project at Vasad as the lead Centre along with IISWC headquarter Dehradun, and Centres Agra, Bellary, Chandigarh, Datia, Kota & Ooty, with the specific objectives of the study to measure the extent of post-adoption behaviour (continued-adoption, discontinuance, technological gap, diffusion and infusion of farmers towards the adopted SWC technologies of watershed management. In the present study various indices regarding continued adoption, dis-adoption (discontinuance, technological gap, diffusion, infusion regarding soil and water conservation technologies for watershed management were developed for measurement of post-adoption behaviour of farmers. It was revealed that a little less than three-fourth (73% of SWC technologies continued to be adopted and more than one-fourth (27% were discontinued by farmers. Out of the total continue adopted SWC technologies by farmers, a little less than one-fifth (19% of technologies continued to be adopted with a technological gap. More than one

  9. Prediction of the Soil Water Characteristic from Soil Particle Volume Fractions

    DEFF Research Database (Denmark)

    Naveed, Muhammad; Møldrup, Per; Tuller, Markus

    2012-01-01

    Modelling water distribution and flow in partially saturated soils requires knowledge of the soil-water characteristic (SWC). However, measurement of the SWC is challenging and time-consuming, and in some cases not feasible. This study introduces two predictive models (Xw-model and Xw......*-model) for the SWC, derived from readily available soil properties such as texture and bulk density. A total of 46 soils from different horizons at 15 locations across Denmark were used for models evaluation. The Xw-model predicts the volumetric water content as a function of volumetric fines content (organic matter...... (organic matter, clay, silt, fine and coarse sand), variably included in the model depending on the pF value. The volumetric content of a particular soil particle size fraction was included in the model if it was assumed to contribute to the pore size fraction still occupied with water at the given p...

  10. Soil respiration sensitivities to water and temperature in a revegetated desert

    Science.gov (United States)

    Zhang, Zhi-Shan; Dong, Xue-Jun; Xu, Bing-Xin; Chen, Yong-Le; Zhao, Yang; Gao, Yan-Hong; Hu, Yi-Gang; Huang, Lei

    2015-04-01

    Soil respiration in water-limited ecosystems is affected intricately by soil water content (SWC), temperature, and soil properties. Eight sites on sand-fixed dunes that revegetated in different years since 1950s, with several topographical positions and various biological soil crusts (BSCs) and soil properties, were selected, as well as a moving sand dune (MSD) and a reference steppe in the Tengger Desert of China. Intact soil samples of 20 cm in depth were taken and incubated randomly at 12 levels of SWC (0 to 0.4 m3 m-3) and at 9 levels of temperature (5 to 45°C) in a growth chamber; additionally, cryptogamic and microbial respirations (RM) were measured. Total soil respiration (RT, including cryptogamic, microbial, and root respiration) was measured for 2 years at the MSD and five sites of sand-fixed dunes. The relationship between RM and SWC under the optimal SWC condition (0.25 m3 m-3) is linear, as is the entire range of RT and SWC. The slope of linear function describes sensitivity of soil respiration to water (SRW) and reflects to soil water availability, which is related significantly to soil physical properties, BSCs, and soil chemical properties, in decreasing importance. Inversely, Q10 for RM is related significantly to abovementioned factors in increasing importance. However, Q10 for RT and respiration rate at 20°C are related significantly to soil texture and depth of BSCs and subsoil only. In conclusion, through affecting SRW, soil physical properties produce significant influences on soil respiration, especially for RT. This indicates that a definition of the biophysical meaning of SRW is necessary, considering the water-limited and coarse-textured soil in most desert ecosystems.

  11. Climate change affects winter chill for temperate fruit and nut trees.

    Science.gov (United States)

    Luedeling, Eike; Girvetz, Evan H; Semenov, Mikhail A; Brown, Patrick H

    2011-01-01

    Temperate fruit and nut trees require adequate winter chill to produce economically viable yields. Global warming has the potential to reduce available winter chill and greatly impact crop yields. We estimated winter chill for two past (1975 and 2000) and 18 future scenarios (mid and end 21st century; 3 Global Climate Models [GCMs]; 3 greenhouse gas emissions [GHG] scenarios). For 4,293 weather stations around the world and GCM projections, Safe Winter Chill (SWC), the amount of winter chill that is exceeded in 90% of all years, was estimated for all scenarios using the "Dynamic Model" and interpolated globally. We found that SWC ranged between 0 and about 170 Chill Portions (CP) for all climate scenarios, but that the global distribution varied across scenarios. Warm regions are likely to experience severe reductions in available winter chill, potentially threatening production there. In contrast, SWC in most temperate growing regions is likely to remain relatively unchanged, and cold regions may even see an increase in SWC. Climate change impacts on SWC differed quantitatively among GCMs and GHG scenarios, with the highest GHG leading to losses up to 40 CP in warm regions, compared to 20 CP for the lowest GHG. The extent of projected changes in winter chill in many major growing regions of fruits and nuts indicates that growers of these commodities will likely experience problems in the future. Mitigation of climate change through reductions in greenhouse gas emissions can help reduce the impacts, however, adaption to changes will have to occur. To better prepare for likely impacts of climate change, efforts should be undertaken to breed tree cultivars for lower chilling requirements, to develop tools to cope with insufficient winter chill, and to better understand the temperature responses of tree crops.

  12. Canopy Transpiration and Stomatal Responses to Prolonged Drought by a Dominant Desert Species in Central Asia

    Directory of Open Access Journals (Sweden)

    Daxing Gu

    2017-06-01

    Full Text Available In arid and semiarid lands, canopy transpiration and its dynamics depend largely on stomatal sensitivity to drought. In this study, the sap flow of a dominant species, Haloxylon ammodendron growing in Central Asian deserts, was monitored using Granier-type sensors, from which the canopy stomatal conductance was derived. The responses of canopy transpiration and stomatal conductance to environmental variables during the second half of the growing season, when annual prolonged drought occurred, was analyzed for four continuous years, from 2013 to 2016. A soil water content (SWC of 3% was identified as the lower soil water threshold for this species, below which the plant lost the ability for stomatal regulation on water loss and suffered the risk of mortality. Above this threshold, the sensitivity of canopy transpiration to vapor pressure deficit, VPD (K, was linearly correlated with SWC, which mainly resulted from different stomatal behaviors at varying drought intensities. Stomatal sensitivity to VPD (m/Gsref increased linearly with soil moisture deficit, inducing a shift from more anisohydric to a more isohydric stomatal behavior. The flexibility of stomatal behavior regarding soil drought was one key element facilitating the survival of H. ammodendron in such an extreme dry environment.

  13. Expression of Peroxisome Proliferator-Activated Receptor-γ in Key Neuronal Subsets Regulating Glucose Metabolism and Energy Homeostasis

    OpenAIRE

    Sarruf, David A.; Yu, Fang; Nguyen, Hong T.; Williams, Diana L.; Printz, Richard L.; Niswender, Kevin D.; Schwartz, Michael W.

    2008-01-01

    In addition to increasing insulin sensitivity and adipogenesis, peroxisome proliferator-activated receptor (PPAR)-γ agonists cause weight gain and hyperphagia. Given the central role of the brain in the control of energy homeostasis, we sought to determine whether PPARγ is expressed in key brain areas involved in metabolic regulation. Using immunohistochemistry, PPARγ distribution and its colocalization with neuron-specific protein markers were investigated in rat and mouse brain sections spa...

  14. Changing land management practices and vegetation on the Central Plateau of Burkina Faso (1968-2002)

    Science.gov (United States)

    Reij, C.; Tappan, G.; Belemvire, A.

    2005-01-01

    In the early 1980s, the situation on the northern part of the Central Plateau of Burkina Faso was characterized by expanding cultivation on lands marginal to agriculture, declining rainfall, low and declining cereal yields, disappearing and impoverishing vegetation, falling ground-water levels and strong outmigration. This crisis situation provoked two reactions. Farmers, as well as technicians working for non-governmental organizations, started to experiment in improving soil and water conservation (SWC) techniques. When these experiments proved successful, donor agencies rapidly designed SWC projects based on simple, effective techniques acceptable to farmers. A study looked at the impact of SWC investments in nine villages and identified a number of major impacts, including: significant increases in millet and sorghum yields since the mid-1980s, cultivated fields treated with SWC techniques have more trees than 10-15 years ago, but the vegetation on most of the non-cultivated areas continues to degrade, greater availability of forage for livestock, increased investment in livestock by men and women and a beginning change in livestock management from extensive to semi-intensive methods, improved soil fertility management by farmers, locally rising ground-water tables, a decrease in outmigration and a significant reduction in rural poverty. Finally, data are presented on the evolution of land use in three villages between 1968 and 2002. ?? 2005 Elsevier Ltd. All rights reserved.

  15. KEY TENDENCIES IN SCIENTIFIC AND TECHNICAL (INNOVATIVE ACTIVITIES OF RUSSIAN INDUSTRIAL COMPANIES

    Directory of Open Access Journals (Sweden)

    K. B. Dobrova

    2015-01-01

    Full Text Available The article off ers the analysis of expenditures on technological innovation in Russia and abroad. The author outlines the main reasons of the low level of technological development of Russian industrial companies. A number of organizational and economic measures to create conditions for technological development of the Russian economy are considered. In recent years, there was an essential increase in output of innovative products, works and services that coincided with the increased ratio of volumes of technological innovations to their costs. However, the expected decrease of this ratio in the coming years may cause slower growth of volumes of innovative production that requires drastic measures, especially aimed at restricting key factors impeding innovative activities. These factors include lack of own funds, high cost of innovations, lack of fi nancial support from the state, high economic risk and low innovative potential of the organization.

  16. Tissue adhesives for simple traumatic lacerations.

    Science.gov (United States)

    Beam, Joel W

    2008-01-01

    Farion K, Osmond MH, Hartling L, et al. Tissue adhesives for traumatic lacerations in children and adults. Cochrane Database Syst Rev. 2001(4);CD003326. What is the clinical evidence base for tissue adhesives in the management of simple traumatic lacerations? Studies were identified by searches of the following databases: Cochrane Wounds Group Specialized Trials Register (September 2003), Cochrane Central Register of Controlled Trials (CENTRAL) (CDROM 2003, issue 3), MEDLINE (1966 to September 2003, week 1), EMBASE (1988 to 2003, week 36), Web of Science Science Citation Index (1975 to September 13, 2003) and various clinical trials registers (September 2003). Investigators and product manufacturers were contacted to identify additional eligible studies. The search terms included wounds and injuries, laceration, face injury, nose injury, tissue adhesives, and acrylates. Each study fulfilled the following criteria: (1) The study was a randomized controlled trial that compared tissue adhesives with standard wound closure (SWC) (sutures, staples, adhesive strips) or tissue adhesive with tissue adhesive. (2) The wounds were acute, linear lacerations less than 12 hours old, resulting from blunt or sharp trauma. (3) The wound length, width, and depth allowed for approximation of the edges with minimal tension after deep sutures were placed, if required. Studies were included with no language or publication status restriction, with participants of any age recruited in an emergency department, outpatient clinic, walk-in clinic, or other primary care setting. Studies were excluded if the wounds were stellate lacerations, puncture wounds, mammalian bites, infected, heavily contaminated or devitalized, crossing joints or mucocutaneous junctions, in hair-bearing areas, or in patients with keloid formation or chronic illness. The characteristics of the study and participants, interventions, outcome measures, and findings were extracted by one author and verified by a second

  17. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  18. Key factors of enterprise innovation activity

    Directory of Open Access Journals (Sweden)

    Pichugina Maryna Anatoliivna

    2015-02-01

    Full Text Available The article deals with the studies of factors and conditions that define enterprise innovative activity. It is distinguished factors that influence the orientation on innovation of a company and factors that influence the innovation ability. It is noted an interdependence between innovative ability, orientation and activity. The article is also dedicated to analyses of influence specific industry characteristics and inner view of enterprise. It is discussed the influence of such factors as knowledge base, the organizational learning mechanisms, an external openness and the structure of innovative connections on the company opportunities to innovate. It is tried to focus on the impact of the environment on enterprise capabilities.

  19. The reliability of running economy expressed as oxygen cost and energy cost in trained distance runners.

    Science.gov (United States)

    Shaw, Andrew J; Ingham, Stephen A; Fudge, Barry W; Folland, Jonathan P

    2013-12-01

    This study assessed the between-test reliability of oxygen cost (OC) and energy cost (EC) in distance runners, and contrasted it with the smallest worthwhile change (SWC) of these measures. OC and EC displayed similar levels of within-subject variation (typical error < 3.85%). However, the typical error (2.75% vs 2.74%) was greater than the SWC (1.38% vs 1.71%) for both OC and EC, respectively, indicating insufficient sensitivity to confidently detect small, but meaningful, changes in OC and EC.

  20. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1997

    International Nuclear Information System (INIS)

    Rittenberg, R.B.

    1998-03-01

    The US Department of Energy (DOE) has responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985 to assist states and compacts in their siting and licensing efforts for low-level radioactive waste disposal facilities. The National Low-Level Waste Management Program (NLLWMP) is the element of the DOE that performs the key support activities under the Act. The NLLWMP's activities are driven by the needs of the states and compacts as they prepare to manage their low-level waste under the Act. Other work is added during the fiscal year as necessary to accommodate new requests brought on by status changes in states' and compacts' siting and licensing efforts. This report summarizes the activities and accomplishments of the NLLWMP during FY 1997

  1. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  2. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  3. Evaluation of a Fully Automated Analyzer for Rapid Measurement of Water Vapor Sorption Isotherms for Applications in Soil Science

    DEFF Research Database (Denmark)

    Arthur, Emmanuel; Tuller, Markus; Moldrup, Per

    2014-01-01

    The characterization and description of important soil processes such as water vapor transport, volatilization of pesticides, and hysteresis require accurate means for measuring the soil water characteristic (SWC) at low water potentials. Until recently, measurement of the SWC at low water...... potentials was constrained by hydraulic decoupling and long equilibration times when pressure plates or single-point, chilled-mirror instruments were used. A new, fully automated Vapor Sorption Analyzer (VSA) helps to overcome these challenges and allows faster measurement of highly detailed water vapor...

  4. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  5. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  6. Water and CO2 fluxes over semiarid alpine steppe and humid alpine meadow ecosystems on the Tibetan Plateau

    Science.gov (United States)

    Wang, Lei; Liu, Huizhi; Shao, Yaping; Liu, Yang; Sun, Jihua

    2018-01-01

    Based on eddy covariance flux data from July 15, 2014, to December 31, 2015, the water and CO2 fluxes were compared over a semiarid alpine steppe (Bange, Tibetan Plateau) and a humid alpine meadow (Lijiang, Yunnan) on the Tibetan Plateau and its surrounding region. During the wet season, the evaporative fraction (EF) was strongly and linearly correlated with the soil water content (SWC) at Bange because of its sparse green grass cover. In contrast, the correlation between the EF at Lijiang and the SWC and the normalized difference vegetation index (NDVI) was very low because the atmosphere was close to saturation and the EF was relatively constant. In the dry season, the EF at both sites decreased with the SWC. The net ecosystem exchange (NEE) at Bange was largely depressed at noon, while this phenomenon did not occur at Lijiang. The saturated NEE at Bange was 24% of that at Lijiang. The temperature sensitivity coefficient of ecosystem respiration at Bange (1.7) was also much lower than that at Lijiang (3.4). The annual total NEE in 2015 was 21.8 and -230.0 g C m-2 yr-1 at Bange and Lijiang, respectively, and the NEE was tightly controlled by the NDVI at the two sites. The distinct differences in the water and CO2 fluxes at Bange and Lijiang are attributed to the large SWC difference and its effect on vegetation growth.

  7. Phosphatase activity in relation to key litter and soil properties in mature subtropical forests in China.

    Science.gov (United States)

    Hou, Enqing; Chen, Chengrong; Wen, Dazhi; Liu, Xian

    2015-05-15

    Phosphatase-mediated phosphorus (P) mineralization is one of the critical processes in biogeochemical cycling of P and determines soil P availability in forest ecosystems; however, the regulation of soil phosphatase activity remains elusive. This study investigated the potential extracellular activities of acid phosphomonoesterase (AcPME) and phosphodiesterase (PDE) and how they were related to key edaphic properties in the L horizon (undecomposed litter) and F/H horizon (fermented and humified litter) and the underlying mineral soil at the 0-15cm depth in eight mature subtropical forests in China. AcPME activity decreased significantly in the order of F/H horizon>L horizon>mineral soil horizon, while the order for PDE activity was L horizon=F/H horizon>mineral soil horizon. AcPME (X axis) and PDE (Y axis) activities were positively correlated in all horizons with significantly higher slope in the L and F/H horizons than in the mineral soil horizon. Both AcPME and PDE activities were positively related to microbial biomass C, moisture content and water-holding capacity in the L horizon, and were positively related to soil C:P, N:P and C:N ratios and fine root (diameter≤2mm) biomass in the mineral soil horizon. Both enzyme activities were also interactively affected by forest and horizon, partly due to the interactive effect of forest and horizon on microbial biomass. Our results suggest that modulator(s) of the potential extracellular activity of phosphatases vary with horizon, depending on the relative C, P and water availability of the horizon. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. How to Tackle Key Challenges in the Promotion of Physical Activity among Older Adults (65+: The AEQUIPA Network Approach

    Directory of Open Access Journals (Sweden)

    Sarah Forberger

    2017-04-01

    Full Text Available The paper introduces the theoretical framework and methods/instruments used by the Physical Activity and Health Equity: Primary Prevention for Healthy Ageing (AEQUIPA prevention research network as an interdisciplinary approach to tackle key challenges in the promotion of physical activity among older people (65+. Drawing on the social-ecological model, the AEQUIPA network developed an interdisciplinary methodological design including quantitative/qualitative studies and systematic reviews, while combining expertise from diverse fields: public health, psychology, urban planning, sports sciences, health technology and geriatrics. AEQUIPA tackles key challenges when promoting physical activity (PA in older adults: tailoring of interventions, fostering community readiness and participation, strengthening intersectoral collaboration, using new technological devices and evaluating intervention generated inequalities. AEQUIPA aims to strengthen the evidence base for age-specific preventive PA interventions and to yield new insights into the explanatory power of individual and contextual factors. Currently, the empirical work is still underway. First experiences indicate that thenetwork has achieved a strong regional linkage with communities, local stakeholders and individuals. However, involving inactive persons and individuals from minority groups remained challenging. A review of existing PA intervention studies among the elderly revealed the potential to assess equity effects. The results will add to the theoretical and methodological discussion on evidence-based age-specific PA interventions and will contribute to the discussion about European and national health targets.

  9. How to Tackle Key Challenges in the Promotion of Physical Activity among Older Adults (65+): The AEQUIPA Network Approach

    Science.gov (United States)

    Forberger, Sarah; Bammann, Karin; Bauer, Jürgen; Boll, Susanne; Bolte, Gabriele; Brand, Tilman; Hein, Andreas; Koppelin, Frauke; Lippke, Sonia; Meyer, Jochen; Pischke, Claudia R.; Voelcker-Rehage, Claudia; Zeeb, Hajo

    2017-01-01

    The paper introduces the theoretical framework and methods/instruments used by the Physical Activity and Health Equity: Primary Prevention for Healthy Ageing (AEQUIPA) prevention research network as an interdisciplinary approach to tackle key challenges in the promotion of physical activity among older people (65+). Drawing on the social-ecological model, the AEQUIPA network developed an interdisciplinary methodological design including quantitative/qualitative studies and systematic reviews, while combining expertise from diverse fields: public health, psychology, urban planning, sports sciences, health technology and geriatrics. AEQUIPA tackles key challenges when promoting physical activity (PA) in older adults: tailoring of interventions, fostering community readiness and participation, strengthening intersectoral collaboration, using new technological devices and evaluating intervention generated inequalities. AEQUIPA aims to strengthen the evidence base for age-specific preventive PA interventions and to yield new insights into the explanatory power of individual and contextual factors. Currently, the empirical work is still underway. First experiences indicate that the network has achieved a strong regional linkage with communities, local stakeholders and individuals. However, involving inactive persons and individuals from minority groups remained challenging. A review of existing PA intervention studies among the elderly revealed the potential to assess equity effects. The results will add to the theoretical and methodological discussion on evidence-based age-specific PA interventions and will contribute to the discussion about European and national health targets. PMID:28375177

  10. How to Tackle Key Challenges in the Promotion of Physical Activity among Older Adults (65+): The AEQUIPA Network Approach.

    Science.gov (United States)

    Forberger, Sarah; Bammann, Karin; Bauer, Jürgen; Boll, Susanne; Bolte, Gabriele; Brand, Tilman; Hein, Andreas; Koppelin, Frauke; Lippke, Sonia; Meyer, Jochen; Pischke, Claudia R; Voelcker-Rehage, Claudia; Zeeb, Hajo

    2017-04-04

    The paper introduces the theoretical framework and methods/instruments used by the Physical Activity and Health Equity: Primary Prevention for Healthy Ageing (AEQUIPA) prevention research network as an interdisciplinary approach to tackle key challenges in the promotion of physical activity among older people (65+). Drawing on the social-ecological model, the AEQUIPA network developed an interdisciplinary methodological design including quantitative/qualitative studies and systematic reviews, while combining expertise from diverse fields: public health, psychology, urban planning, sports sciences, health technology and geriatrics. AEQUIPA tackles key challenges when promoting physical activity (PA) in older adults: tailoring of interventions, fostering community readiness and participation, strengthening intersectoral collaboration, using new technological devices and evaluating intervention generated inequalities. AEQUIPA aims to strengthen the evidence base for age-specific preventive PA interventions and to yield new insights into the explanatory power of individual and contextual factors. Currently, the empirical work is still underway. First experiences indicate that thenetwork has achieved a strong regional linkage with communities, local stakeholders and individuals. However, involving inactive persons and individuals from minority groups remained challenging. A review of existing PA intervention studies among the elderly revealed the potential to assess equity effects. The results will add to the theoretical and methodological discussion on evidence-based age-specific PA interventions and will contribute to the discussion about European and national health targets.

  11. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  12. AMP-Activated Protein Kinase: An Ubiquitous Signaling Pathway With Key Roles in the Cardiovascular System.

    Science.gov (United States)

    Salt, Ian P; Hardie, D Grahame

    2017-05-26

    The AMP-activated protein kinase (AMPK) is a key regulator of cellular and whole-body energy homeostasis, which acts to restore energy homoeostasis whenever cellular energy charge is depleted. Over the last 2 decades, it has become apparent that AMPK regulates several other cellular functions and has specific roles in cardiovascular tissues, acting to regulate cardiac metabolism and contractile function, as well as promoting anticontractile, anti-inflammatory, and antiatherogenic actions in blood vessels. In this review, we discuss the role of AMPK in the cardiovascular system, including the molecular basis of mutations in AMPK that alter cardiac physiology and the proposed mechanisms by which AMPK regulates vascular function under physiological and pathophysiological conditions. © 2017 American Heart Association, Inc.

  13. Influences of recovery from wildfire and thinning on soil respiration of a Mediterranean mixed forest.

    Science.gov (United States)

    López-Serrano, F R; Rubio, E; Dadi, T; Moya, D; Andrés-Abellán, M; García-Morote, F A; Miettinen, H; Martínez-García, E

    2016-12-15

    The ecosystem recovery after wildfire and thinning practices are both key processes that have great potential to influence fluxes and storage of carbon within Mediterranean semiarid ecosystems. In this study, started 7years after a wildfire, soil respiration (SR) patterns measured from 2008 to 2010 were compared between an unmanaged-undisturbed mature forest stand (UB site) and a naturally regenerated post-wildfire stand (B site) in a Mediterranean mixed forest in Spain. The disturbed stand included a control zone (unthinned forest, BUT site) and a thinned zone (BT site). Our results indicated that SR was lower at naturally regenerated after fire sites (BUT and BT) than at unburnt one. Soil under the canopy layer of pine and oak trees exhibited higher SR rates than bare or herbaceous layer soils, regardless of the site. The effect of thinning was only manifest, with a significant increase of SR, during the 1st year after thinning practices. SR showed a clear soil temperature-dependent seasonal pattern, which was strongly modulated by soil water content (SWC), especially in summer. Site-specific polynomial regression models were defined to describe SR responses, being mainly controlled by both soil temperature (Ts) and SWC at UB site, or Ts at burnt sites. The sensitivity of SR rate to Ts variations (Q 10 ) ranged between 0.20 and 6.89, with mean annual values varying between 0.92 and 1.35. Q 10 values were higher at BT than at UB-BUT sites. The results revealed a significant, non-linear dependence, of Q 10 on both Ts and SWC at UB site, and on Ts at both burnt sites. This study contributes to (i) improve the understanding of how natural recovery and management practices affect soil respiration in a Mediterranean forest during their early stages after fire disturbance and (ii) highlight the importance of Q 10 values <1 which emphasizes drought stress effect on SR temperature sensitivity. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Cytotoxic and genotoxic responses of human lung cells to combustion smoke particles of Miscanthus straw, softwood and beech wood chips

    Science.gov (United States)

    Arif, Ali Talib; Maschowski, Christoph; Garra, Patxi; Garcia-Käufer, Manuel; Petithory, Tatiana; Trouvé, Gwenaëlle; Dieterlen, Alain; Mersch-Sundermann, Volker; Khanaqa, Polla; Nazarenko, Irina; Gminski, Richard; Gieré, Reto

    2017-08-01

    Inhalation of particulate matter (PM) from residential biomass combustion is epidemiologically associated with cardiovascular and pulmonary diseases. This study investigates PM0.4-1 emissions from combustion of commercial Miscanthus straw (MS), softwood chips (SWC) and beech wood chips (BWC) in a domestic-scale boiler (40 kW). The PM0.4-1 emitted during combustion of the MS, SWC and BWC were characterized by ICP-MS/OES, XRD, SEM, TEM, and DLS. Cytotoxicity and genotoxicity in human alveolar epithelial A549 and human bronchial epithelial BEAS-2B cells were assessed by the WST-1 assay and the DNA-Alkaline Unwinding Assay (DAUA). PM0.4-1 uptake/translocation in cells was investigated with a new method developed using a confocal reflection microscope. SWC and BWC had a inherently higher residual water content than MS. The PM0.4-1 emitted during combustion of SWC and BWC exhibited higher levels of Polycyclic Aromatic Hydrocarbons (PAHs), a greater variety of mineral species and a higher heavy metal content than PM0.4-1 from MS combustion. Exposure to PM0.4-1 from combustion of SWC and BWC induced cytotoxic and genotoxic effects in human alveolar and bronchial cells, whereby the strongest effect was observed for BWC and was comparable to that caused by diesel PM (SRM 2 975), In contrast, PM0.4-1 from MS combustion did not induce cellular responses in the studied lung cells. A high PAH content in PM emissions seems to be a reliable chemical marker of both combustion efficiency and particle toxicity. Residual biomass water content strongly affects particulate emissions and their toxic potential. Therefore, to minimize the harmful effects of fine PM on health, improvement of combustion efficiency (aiming to reduce the presence of incomplete combustion products bound to PM) and application of fly ash capture technology, as well as use of novel biomass fuels like Miscanthus straw is recommended.

  15. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  16. Effects of gas periodic stimulation on key enzyme activity in gas double-dynamic solid state fermentation (GDD-SSF).

    Science.gov (United States)

    Chen, Hongzhang; Shao, Meixue; Li, Hongqiang

    2014-03-05

    The heat and mass transfer have been proved to be the important factors in air pressure pulsation for cellulase production. However, as process of enzyme secretion, the cellulase formation has not been studied in the view of microorganism metabolism and metabolic key enzyme activity under air pressure pulsation condition. Two fermentation methods in ATPase activity, cellulase productivity, weight lose rate and membrane permeability were systematically compared. Results indicated that gas double-dynamic solid state fermentation had no obviously effect on cell membrane permeability. However, the relation between ATPase activity and weight loss rate was linearly dependent with r=0.9784. Meanwhile, the results also implied that gas periodic stimulation had apparently strengthened microbial metabolism through increasing ATPase activity during gas double-dynamic solid state fermentation, resulting in motivating the production of cellulase by Trichoderma reesei YG3. Therefore, the increase of ATPase activity would be another crucial factor to strengthen fermentation process for cellulase production under gas double-dynamic solid state fermentation. Copyright © 2013 Elsevier Inc. All rights reserved.

  17. The I.A.G./A.I.G. SEDIBUD (Sediment Budgets in Cold Environments) Program (2005 - 2017): Key activities and outcomes

    Science.gov (United States)

    Beylich, Achim A.

    2017-04-01

    Amplified climate change and ecological sensitivity of high-latitude and high-altitude cold climate environments has been highlighted as a key global environmental issue. Projected climate change in largely undisturbed cold regions is expected to alter melt-season duration and intensity, along with the number of extreme rainfall events, total annual precipitation and the balance between snowfall and rainfall. Similarly, changes to the thermal balance are expected to reduce the extent of permafrost and seasonal ground frost and increase active-layer depths. These combined effects will undoubtedly change Earth surface environments in cold regions and will alter the fluxes of sediments, solutes and nutrients. However, the absence of quantitative data and coordinated analysis to understand the sensitivity of the Earth surface environment are acute in cold regions. Contemporary cold climate environments generally provide the opportunity to identify solute and sedimentary systems where anthropogenic impacts are still less important than the effects of climate change. Accordingly, it is still possible to develop a library of baseline fluvial yields and sedimentary budgets before the natural environment is completely transformed. The SEDIBUD (Sediment Budgets in Cold Environments) Program, building on the European Science Foundation (ESF) Network SEDIFLUX (Sedimentary Source-to-Sink Fluxes in Cold Environments, since 2004) was formed in 2005 as a new Program (Working Group) of the International Association of Geomorphologists (I.A.G./A.I.G.) to address this still existing key knowledge gap. SEDIBUD (2005-2017) has currently about 400 members worldwide and the Steering Committee of this international program is composed of eleven scientists from ten different countries. The central research question of this global program is to: Assess and model the contemporary sedimentary fluxes in cold climates, with emphasis on both particulate and dissolved components. Research carried

  18. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  19. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  20. Code for plant identification (KKS) key in PC version

    International Nuclear Information System (INIS)

    Pannenbaecker, K.

    1991-01-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.) [de

  1. Retail market opening plan : key activities and milestones to market opening on May 1, 2002

    International Nuclear Information System (INIS)

    2002-01-01

    The Ontario Energy Board (OEB) published its Retail Market Readiness Plan in January 2000 with particular focus on what is needed by distributors to become ready for self certification on December 14, 2001. The market opening date has now been set for May 1, 2002 so the framework has been updated to focus on what is needed to open the electricity market to retail competition. This report describes the activities required for the opening of the retail electricity market with reference to the activities that the participants, distributors and retailers need to complete to properly interact at market opening. The measures that other organizations such as EBT hubs should take were also identified for cases where the measures involve cooperation and interaction with distributors and retailers to ensure a smooth transition to competition within the industry. While schedules of individual organizations will vary, market participants should try to align with the overall framework at key milestones. The mandatory requirements associated with milestones were included in Appendix B. These included requirements for: market opening baseline; market readiness activities; participant systems and organizational preparations; loading of new rates into systems; cutover to new systems by market participants; data scrubbing; multiple contract resolution; pre-market processing; distributor-retailer service agreement; retail prudential posting; inter-participant testing; contingency arrangements; stability period; and, market opening. Appendix A includes the Market Opening Gantt Chart. 1 tab

  2. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  3. Using Cosmic-Ray Neutron Probes to Monitor Landscape Scale Soil Water Content in Mixed Land Use Agricultural Systems

    International Nuclear Information System (INIS)

    Franz, Trenton E.; Wahbi, Ammar; Weltin, Georg; Heng, Lee; Dercon, Gerd; Vreugdenhi, Mariette; Oismueller, Markus; Strauss, Peter; Desilets, Darin

    2016-01-01

    With an ever-increasing demand for natural resources and the societal need to understand and predict natural disasters such as flood, soil water content (SWC) observations remain a critical variable to monitor in order to optimally allocate resources, establish early warning systems, and improve weather forecasts. However, routine agricultural production practices of soil cultivation, planting, and harvest make the operation and maintenance of direct contact point sensors for long-term monitoring a challenging task. In this work, we used Cosmic-Ray Neutron Probe (CRNP) to monitor landscape average SWC in a mixed agricultural land use system in northeast Austria since December 2013.

  4. A constitutively activating mutation alters the dynamics and energetics of a key conformational change in a ligand-free G protein-coupled receptor.

    Science.gov (United States)

    Tsukamoto, Hisao; Farrens, David L

    2013-09-27

    G protein-coupled receptors (GPCRs) undergo dynamic transitions between active and inactive conformations. Usually, these conversions are triggered when the receptor detects an external signal, but some so-called constitutively activating mutations, or CAMs, induce a GPCR to bind and activate G proteins in the absence of external stimulation, in ways still not fully understood. Here, we investigated how a CAM alters the structure of a GPCR and the dynamics involved as the receptor transitions between different conformations. Our approach used site-directed fluorescence labeling (SDFL) spectroscopy to compare opsin, the ligand-free form of the GPCR rhodopsin, with opsin containing the CAM M257Y, focusing specifically on key movements that occur in the sixth transmembrane helix (TM6) during GPCR activation. The site-directed fluorescence labeling data indicate opsin is constrained to an inactive conformation both in detergent micelles and lipid membranes, but when it contains the M257Y CAM, opsin is more dynamic and can interact with a G protein mimetic. Further study of these receptors using tryptophan-induced quenching (TrIQ) methods indicates that in detergent, the CAM significantly increases the population of receptors in the active state, but not in lipids. Subsequent Arrhenius analysis of the TrIQ data suggests that, both in detergent and lipids, the CAM lowers the energy barrier for TM6 movement, a key transition required for conversion between the inactive and active conformations. Together, these data suggest that the lowered energy barrier is a primary effect of the CAM on the receptor dynamics and energetics.

  5. Simple and robust determination of the activity signature of key carbohydrate metabolism enzymes for physiological phenotyping in model and crop plants

    DEFF Research Database (Denmark)

    Jammer, Alexandra; Gasperl, Anna; Luschin-Ebengreuth, Nora

    2015-01-01

    The analysis of physiological parameters is important to understand the link between plant phenotypes and their genetic bases, and therefore is needed as an important element in the analysis of model and crop plants. The activities of enzymes involved in primary carbohydrate metabolism have been...... shown to be strongly associated with growth performance, crop yield, and quality, as well as stress responses. A simple, fast, and cost-effective method to determine activities for 13 key enzymes involved in carbohydrate metabolism has been established, mainly based on coupled spectrophotometric kinetic...

  6. The importance of delineating networks by activity type in bottlenose dolphins (Tursiops truncatus) in Cedar Key, Florida.

    Science.gov (United States)

    Gazda, Stefanie; Iyer, Swami; Killingback, Timothy; Connor, Richard; Brault, Solange

    2015-03-01

    Network analysis has proved to be a valuable tool for studying the behavioural patterns of complex social animals. Often such studies either do not distinguish between different behavioural states of the organisms or simply focus attention on a single behavioural state to the exclusion of all others. In either of these approaches it is impossible to ascertain how the behavioural patterns of individuals depend on the type of activity they are engaged in. Here we report on a network-based analysis of the behavioural associations in a population of bottlenose dolphins (Tursiops truncatus) in Cedar Key, Florida. We consider three distinct behavioural states-socializing, travelling and foraging-and analyse the association networks corresponding to each activity. Moreover, in constructing the different activity networks we do not simply record a spatial association between two individuals as being either present or absent, but rather quantify the degree of any association, thus allowing us to construct weighted networks describing each activity. The results of these weighted activity networks indicate that networks can reveal detailed patterns of bottlenose dolphins at the population level; dolphins socialize in large groups with preferential associations; travel in small groups with preferential associates; and spread out to forage in very small, weakly connected groups. There is some overlap in the socialize and travel networks but little overlap between the forage and other networks. This indicates that the social bonds maintained in other activities are less important as they forage on dispersed, solitary prey. The overall network, not sorted by activity, does not accurately represent any of these patterns.

  7. Activation of factor VII bound to tissue factor: A key early step in the tissue factor pathway of blood coagulation

    International Nuclear Information System (INIS)

    Rao, L.V.M.; Rapaport, S.I.

    1988-01-01

    Whether the factor VII/tissue factor complex that forms in tissue factor-dependent blood coagulation must be activated to factor VIIa/tissue factor before it can activate its substrates, factor X and IX, has been a difficult question to answer because the substrates, once activated, back-activate factor VII. The earlier studies suggested that human factor VII/tissue factor cannot activate factor IX. Studies have now been extended to the activation of factor X. Reaction mixtures were made with purified factor VII, X, and tissue factor; in some experiments antithrombin III and heparin were added to prevent back-activation of factor VII. Factor X was activated at similar rates in reaction mixtures containing either VII or factor VIIa after an initial 30-sec lag with factor VII. In reaction mixtures with factor VII a linear activation of factor X was established several minutes before cleavage of 125 I-labeled factor VII to the two-chain activated molecule was demonstrable on gel profiles. These data suggest that factor VII/tissue factor cannot activate measurable amounts of factor X over several minutes. Overall, the results support the hypothesis that a rapid preferential activation of factor VII bound to tissue factor by trace amounts of factor Xa is a key early step in tissue factor-dependent blood coagulation

  8. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  9. Key directions of the Russian economy innovative development with the innovative activity practice of the integrated corporate structures

    Directory of Open Access Journals (Sweden)

    F. I. Shamhalov

    2016-01-01

    Full Text Available The article deals with the problems and the key directions of The article deals with the problems and key directions of innovative development of the Russian industry in connection with the need to reduce the dependence of the national economy on the situation on world commodity markets, as well as to create the conditions and incentives for the introduction and modern technologies development, improving energy and environmental efficiency of the economy and productivity for the development of economic sectors and industries, producing goods with high added value for the implementation of innovative projects and in general - to upgrade the socio-economic system of the country.The following statement is given: the development of innovative high-tech and knowledge-intensive industries must ensure import substitution products at the first stage, primarily in the militaryindustrial complex, and in the future - export-oriented competitive product.The article analyzes the experience of innovative activity of the integrated corporate structures with the participation of the state in the following areas: the integration of the industrial and financial capital; the concentration of capital (through the merger and acquisition of enterprises, strategic alliances; diversification of forms and fields of activity; globalization of activities (creation of subsidiaries in the most attractive countries and working on promising markets; capital internationalization (through the creation of transnational companies.On the basis of generalization of global corporate management experience in the state corporations the article analyzes key conditions and factors that determine the efficiency of the state-owned companies as a whole: a clear statement of goals and objectives of the state as the owner, whose interests go beyond the usual business purposes; fixing of these goals and objectives in the regulations, in the concepts and programs of long-term socioeconomic

  10. Between-game variation of physical soccer performance measures in highly trained youth soccer players.

    Science.gov (United States)

    Doncaster, Greg; Unnithan, Viswanath

    2017-07-12

    To assess the between-game variation in measures of physical performance during 11 v 11 soccer match-play, over a short period of time, in highly trained youth soccer players. A single cohort observational study design was employed. Physical match performance data were collected from 17 male, highly trained youth soccer players (age: 13.3 ± 0.4 y) over three, 2 x 20min, 11 v 11 matches. Using 10 Hz GPS, the variables selected for analyses were total distance (TD), high-speed running (HSR), very high-speed running (VHSR), number of high-speed running efforts (HSReff) and number of very high-speed running efforts (VHSReff). Match data was also separated into cumulative 5 min epochs, to identify the peak 5 min epoch and the mean of the cumulative 5 min epochs for each match. Variability was quantified using the coefficient of variation (CV), Standard error of measurement (SEM) and intra-class correlation coefficient (ICC). Between- and within-player smallest worthwhile changes (SWC) were also calculated for each variable to aid in the interpretation of the data. Analysis of the variance between games reported a low CV for TD (3.8%) but larger CVs for HSR (33.3%), HSReff (35.4%) and VHSR and VHSReff (59.6 and 57.4 %, respectively). Analysis of 5 min epochs (peak and average) found an increase in the CVs beyond that of the values reported for the whole match. Between-player SWC in high intensity physical performance data ranged from 24.7 - 42.4 %, whereas within-player SWC ranged from 1.2 - 79.9%. The between-game variability of high and very high intensity activities in youth soccer players, across three soccer matches over a short period of time (2 weeks), is relatively 'large' and specific to the individual, thus highlighting the need for caution when interpreting physical performance data between games and players.

  11. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  12. Effect of thermal state and thermal comfort on cycling performance in the heat.

    Science.gov (United States)

    Schulze, Emiel; Daanen, Hein A M; Levels, Koen; Casadio, Julia R; Plews, Daniel J; Kilding, Andrew E; Siegel, Rodney; Laursen, Paul B

    2015-07-01

    To determine the effect of thermal state and thermal comfort on cycling performance in the heat. Seven well-trained male triathletes completed 3 performance trials consisting of 60 min cycling at a fixed rating of perceived exertion (14) followed immediately by a 20-km time trial in hot (30°C) and humid (80% relative humidity) conditions. In a randomized order, cyclists either drank ambient-temperature (30°C) fluid ad libitum during exercise (CON), drank ice slurry (-1°C) ad libitum during exercise (ICE), or precooled with iced towels and ice slurry ingestion (15 g/kg) before drinking ice slurry ad libitum during exercise (PC+ICE). Power output, rectal temperature, and ratings of thermal comfort were measured. Overall mean power output was possibly higher in ICE (+1.4%±1.8% [90% confidence limit]; 0.4> smallest worthwhile change [SWC]) and likely higher PC+ICE (+2.5%±1.9%; 1.5>SWC) than in CON; however, no substantial differences were shown between PC+ICE and ICE (unclear). Time-trial performance was likely enhanced in ICE compared with CON (+2.4%±2.7%; 1.4>SWC) and PC+ICE (+2.9%±3.2%; 1.9>SWC). Differences in mean rectal temperature during exercise were unclear between trials. Ratings of thermal comfort were likely and very likely lower during exercise in ICE and PC+ICE, respectively, than in CON. While PC+ICE had a stronger effect on mean power output compared with CON than ICE did, the ICE strategy enhanced late-stage time-trial performance the most. Findings suggest that thermal comfort may be as important as thermal state for maximizing performance in the heat.

  13. The Dynamic Trend of Soil Water Content in Artificial Forests on the Loess Plateau, China

    Directory of Open Access Journals (Sweden)

    Yu Wang

    2016-10-01

    Full Text Available Extensive vegetation restoration projects have been widely implemented on the Loess Plateau, China, since 1998. In addition, increasing attention has been paid to the influence of revegetation on soil water. However, the response of the soil water content (SWC to vegetation construction and management has not been adequately studied. In this study, three types of typical artificial vegetation on level bench land were selected, including Pinus tabulaeformis Carr., Prunus sibirica L., and Hippophae rhamnoides Linn., with the natural grassland used as a control group in Wuqi County. The 0–160 cm SWC was monitored biweekly from August 2010 to June 2013 using a portable time domain reflectometry system. The serial autocorrelation test, Mann–Kendall trend test, and prewhitening Mann–Kendall test were employed to systematically analyze the trends in soil water dynamics. The results show that the SWC of the three selected artificial forests/shrub had a significant accumulation process in the 0–160 cm profile during the monitoring period, whereas such an increasing tendency was not observed for natural grassland. Furthermore, the greatest responses were observed in the Pinus tabulaeformis Carr. plantation.

  14. Process optimization by decoupled control of key microbial populations: distribution of activity and abundance of polyphosphate-accumulating organisms and nitrifying populations in a full-scale IFAS-EBPR plant

    DEFF Research Database (Denmark)

    Onnis-Hayden, Annalisa; Majed, Nehreen; Schramm, Andreas

    2011-01-01

    This study investigated the abundance and distribution of key functional microbial populations and their activities in a full-scale integrated fixed film activated sludgeeenhanced biological phosphorus removal (IFAS-EBPR) process. Polyphosphate accumulating organisms (PAOs) including Accumulibacter...

  15. Physical Activity and Obesity: Biomechanical and Physiological Key Concepts

    Directory of Open Access Journals (Sweden)

    Julie Nantel

    2011-01-01

    Full Text Available Overweight (OW and obesity (OB are often associated with low levels of physical activity. Physical activity is recommended to reduce excess body weight, prevent body weight regain, and decrease the subsequent risks of developing metabolic and orthopedic conditions. However, the impact of OW and OB on motor function and daily living activities must be taken into account. OW and OB are associated with musculoskeletal structure changes, decreased mobility, modification of the gait pattern, and changes in the absolute and relative energy expenditures for a given activity. While changes in the gait pattern have been reported at the ankle, knee, and hip, modifications at the knee level might be the most challenging for articular integrity. This review of the literature combines concepts and aims to provide insights into the prescription of physical activity for this population. Topics covered include the repercussions of OW and OB on biomechanical and physiological responses associated with the musculoskeletal system and daily physical activity. Special attention is given to the effect of OW and OB in youth during postural (standing and various locomotor (walking, running, and cycling activities.

  16. [Sap flux density in response to rainfall pulses for Pinus tabuliformis and Hippophae rhamnoides from mixed plantation in hilly Loess Plateau].

    Science.gov (United States)

    Lu, Sen Bao; Chen, Yun Ming; Tang, Ya Kun; Wu, Xu; Wen, Jie

    2017-11-01

    Thermal dissipation probe (TDP) was used to continuously measure the sap flux density (F d ) of Pinus tabuliformis and Hippophae rhamnoides individuals in hilly Loess Plateau, from June to October 2015, and the environmental factors, i.e., photosynthetic active radiation (PAR), water vapor pressure deficit (VPD), and soil water content (SWC), were simultaneously monitored to clarify the difference of rainfall utilization between the two tree species in a mixed plantation. Using the methods of a Threshold-delay model, stepwise multiple regression analyses, and partial correlation analyses, this paper studied the process of F d in these two species in response to the rainfall pulses and then determined the effects of environmental factors on F d . The results showed that, with the increase of rainfall, the response percentages of F d in both P. tabuliformis and H. rhamnoides increased at first but then decreased; specifically, in the range of 0-1 mm rainfall, the F d of P. tabuliformis (-16.3%) and H. rhamnoides (-6.3%) clearly decreased; in the range of 1-5 mm rainfall, the F d of P. tabuliformis decreased (-0.4%), whereas that of H. rhamnoides significantly increased (9.0%). The lower rainfall thresholds (R L ) of F d for P. tabuliformis and H. rhamnoides were 6.4 and 1.9 mm, respectively, with a corresponding time-lag (τ) of 1.96 and 1.67 days. In the pre-rainfall period, the peak time of F d of P. tabuliformis converged upon 12:00-12:30 (70%), while the F d of H. rhamnoides peaked twice, between 10:30 and 12:00 (48%) and again between 16:00 and 16:30 (30%). In the post-rainfall period, the peak time of F d of P. tabuliformis converged upon 11:00-13:00 (40%), while that of H. rhamnoides peaked twice, between 12:00 and 13:00 (52%) and again between 16:30 and 17:00 (24%). Among the environmental factors, the rank order of factors associated with the F d of both P. tabuliformis and H. rhamnoides was PAR>VPD, before rainfall. However, the rank order of factors

  17. Gross primary production of a semiarid grassland is enhanced by six years of exposure to elevated atmospheric CO2, warming, and irrigation.

    Science.gov (United States)

    Ryan, E.; Ogle, K.; Peltier, D.; Williams, D. G.; Pendall, E.

    2014-12-01

    The goal of this study was to quantify interannual variation of gross primary production (GPP) and evaluate potential drivers of GPP with global change using the Prairie Heating and CO2 Enrichment (PHACE) experiment in semiarid grassland in southeastern Wyoming. PHACE consists of the treatments: control, warming only, elevated CO2 (eCO2) only, eCO2 and warming, and irrigation only. We expected that GPP would be most strongly influenced by interannual variability in precipitation under all PHACE treatments, soil water availability under eCO2, and nitrogen availability. GPP data were obtained from paired measurements of net ecosystem exchange (NEE) and ecosystem respiration (Reco; GPP = Reco - NEE) made on 2-4 week intervals over six growing seasons (2007-2012). Soil temperature (T), soil water content (SWC), vapor pressure deficit (VPD), and photosynthetically active radiation (PAR) were continuously recorded at the plot (T, SWC) and site (VPD, PAR) scales. Annual, plot-level aboveground plant nitrogen content (N) was measured during peak biomass. We fit a non-linear light-response model to the GPP data within a Bayesian framework, and modeled the maximum GPP rate (Gmax) and canopy light-use efficiency (Q) as functions of N and current and antecedent SWC, T, and VPD. The model fit the GPP data well (R2 = 0.64), and regardless of the PHACE treatment the most important drivers of GPP were N (for Gmax), VPD (Gmax and Q), antecedent T (Gmax), and antecedent VPD (Q). Model simulations predicted that annual GPP increased on average by about 16% with eCO2, 14% with warming, 12% with eCO2 and warming, and 23% with irrigation. For four of the six years, annual GPP was significantly affected by either eCO2 alone or when combined with warming. The increase in annual GPP under irrigation was similar to the increase under eCO2 during a dry year (2012), but irrigation stimulated GPP to a greater degree than eCO2 during wet years (2008, 2009). Hence, increases in GPP under eCO2

  18. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  19. Changes to soil water content and biomass yield under combined maize and maize-weed vegetation with different fertilization treatments in loam soil

    Directory of Open Access Journals (Sweden)

    Lehoczky Éva

    2016-06-01

    Full Text Available Especially during early developmental stages, competition with weeds can reduce crop growth and have a serious effect on productivity. Here, the effects of interactions between soil water content (SWC, nutrient availability, and competition from weeds on early stage crop growth were investigated, to better understand this problem. Field experiments were conducted in 2013 and 2014 using long-term study plots on loam soil in Hungary. Plots of maize (Zea mays L. and a weed-maize combination were exposed to five fertilization treatments. SWC was observed along the 0–80 cm depth soil profile and harvested aboveground biomass (HAB was measured.

  20. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  1. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  2. Deep Random based Key Exchange protocol resisting unlimited MITM

    OpenAIRE

    de Valroger, Thibault

    2018-01-01

    We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resis...

  3. Using high resolution aridity and drainage position data to better predict rainfall-runoff relationships in complex upland topography

    Science.gov (United States)

    Metzen, D.; Sheridan, G. J.; Benyon, R. G.; Lane, P. N. J.

    2015-12-01

    In topographically complex terrain, the interaction of aspect-dependent solar exposure and drainage-position-dependent flow accumulation results in energy and water partitioning that is highly spatially variable. Catchment scale rainfall-runoff relationships are dependent on these smaller scale spatial patterns. However, there remains considerable uncertainty as to how to represent this smaller scale variability within lumped parameter, catchment scale rainfall-runoff models. In this study we aim to measure and represent the key interactions between aridity and drainage position in complex terrain to inform the development of simple catchment-scale hydrologic model parameters. Six measurement plots were setup on opposing slopes in an east-west facing eucalypt forest headwater catchment. The field sites are spanning three drainage positions with two contrasting aridity indices each, while minimizing variations in other factors, e.g. geology and weather patterns. Sapflow, soil water content (SWC) and throughfall were continuously monitored on two convergent hillslopes with similar size (1.3 and 1.6ha) but contrasting aspects (north and south). Soil depth varied from 0.6m at the topslope to >2m at the bottomslope positions. Maximum tree heights ranged from 16.2m to 36.9m on the equator-facing slope and from 30.1m to 45.5m on the pole-facing slope, with height decreasing upslope on both aspects. Two evapotranspiration (ET) patterns emerged in relation to aridity and drainage position. On the equator-facing slope (AI~ 2.1), seasonal understorey and overstorey ET patterns were in sync, whereas on the pole-facing slope (AI~1.5) understorey ET showed larger seasonal fluctuations than overstorey ET. Seasonal ET patterns and competition between soil evaporation and root water uptake lead to distinct differences in profile SWC across the sites, likely caused by depletion from different depths. Topsoil water content on equator-facing slopes was generally lower and responded

  4. Mosquito larvicidal activity of Cassia tora seed extract and its key anthraquinones aurantio-obtusin and obtusin

    Directory of Open Access Journals (Sweden)

    Valentine C. Mbatchou

    2017-11-01

    Full Text Available Abstract Background The edible and medicinal leguminous plant Cassia tora L. (Fabaceae is known to possess insecticidal properties against a wide range of plant-feeding insects. However, the bioactivity of extracts of this plant and their constituents against vectors of medical importance has been largely unexplored. We investigated the mosquito larvicidal activity of the seed extract and its major anthraquinones against larvae of the African malaria vector Anopheles gambiae (s.s.. Methods Third-fourth instar larval mortality was observed after 24, 48, 72 and 96 h of exposure to varying doses of the extracts, and two anthraquinones isolates identified using liquid chromatography- quadrupole time of flight mass spectrometry (LC-QtoF-MS. The mosquito larval mortality was evaluated relative to the natural insecticide azadirachtin. Results Fractionation of the crude extract decreased mosquito larvicidal activity, however, larvicidal activity increased with increasing dose of the treatment and exposure time. The known anthraquinones aurantio-obtusin and obtusin were identified as key larvicidal compounds. Aurantio-obtusin and obtusin, exhibited similar toxicity to larvae of A. gambiae (s.s. with LD50 values of 10 and 10.2 ppm, respectively. However, the two anthraquinones were four- and ~ six-fold less potent than that of the crude seed extract and azadirachtin, which had comparable LD50 values of 2.5 and 1.7 ppm, respectively. Conclusion Both aurantio-obtusin and obtusin showed mosquito larvicidal activity which were comparable to their respective fractions although they were less potent relative to the crude extract and azadirachtin. Further studies need to be conducted on C. tora for its exploitation as a potential eco-friendly tool in mosquito larval source reduction.

  5. ETHICS AND ORGANIZATIONAL CULTURE – KEY ELEMENTS REGARDING THE DEVELOPMENT OF ECONOMIC ACTIVITIES

    Directory of Open Access Journals (Sweden)

    Loredana TEREC-VLAD

    2016-02-01

    Full Text Available The aim of this paper is to analyse the organizational culture within the business environment. The paper analyzes the ethical criteria of the entrepreneurs and the way they relate to the consumer, as well as the reinforcement of the moral values so that the final result of the economic activity is represented by sustainability and economic profit. We thought it would be important to point out that promoting an ethical firm can ensure the well-needed trust capital in a constantly changing society. In this context, corporate responsibility is a key element that ensures both the sustainability of the company as well as the sustainability of the relations with the business partners. In our view, a strong corporate culture must integrate ethics and responsibility in all its activities, since the focus is often laid on obtaining profit, not on the values ​​that should lead the organization towards success over a long period of time. Since our society provides both positive and negative information regarding any company or organization, the focus should be laid increasingly more on the ethics and responsibility of the human resources in regard to the external environment of the company. We thought it would be appropriate to bring up these issues since the issue of building an organizational culture is at a very early stage in our country, and most entrepreneurs only aim at obtaining short-term profit. The fees and taxes are high and the thick legislation often does not provide alternatives; therefore, one must take into account the fact that the real profit is not represented by the short-term benefits, but rather by the benefits obtained in a constant manner over medium-long periods of time.

  6. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  7. The origins of enhanced activity in factor VIIa analogs and the interplay between key allosteric sites revealed by hydrogen exchange mass spectrometry

    DEFF Research Database (Denmark)

    Rand, Kasper D; Andersen, Mette D; Olsen, Ole H

    2008-01-01

    Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry to invest......Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry...... to investigate the conformational effects of site-directed mutagenesis at key positions in FVIIa and the origins of enhanced intrinsic activity of FVIIa analogs. The differences in hydrogen exchange of two highly active variants, FVIIa(DVQ) and FVIIa(VEAY), imply that enhanced catalytic efficiency was attained...

  8. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  9. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  10. Key instruments of improving the export marketing system effectiveness

    OpenAIRE

    Yu.I. Prodius; V.Yu. Kolomiets

    2014-01-01

    There were considered the essence and definition of the marketing mix, marketing system in international business activity and defined the key tools to improve its performance on foreign markets in this article.

  11. Identification of Key Residues for Enzymatic Carboxylate Reduction

    Directory of Open Access Journals (Sweden)

    Holly Stolterfoht

    2018-02-01

    Full Text Available Carboxylate reductases (CARs, E.C. 1.2.1.30 generate aldehydes from their corresponding carboxylic acid with high selectivity. Little is known about the structure of CARs and their catalytically important amino acid residues. The identification of key residues for carboxylate reduction provides a starting point to gain deeper understanding of enzymatic carboxylate reduction. A multiple sequence alignment of CARs with confirmed activity recently identified in our lab and from the literature revealed a fingerprint of conserved amino acids. We studied the function of conserved residues by multiple sequence alignments and mutational replacements of these residues. In this study, single-site alanine variants of Neurospora crassa CAR were investigated to determine the contribution of conserved residues to the function, expressability or stability of the enzyme. The effect of amino acid replacements was investigated by analyzing enzymatic activity of the variants in vivo and in vitro. Supported by molecular modeling, we interpreted that five of these residues are essential for catalytic activity, or substrate and co-substrate binding. We identified amino acid residues having significant impact on CAR activity. Replacement of His 237, Glu 433, Ser 595, Tyr 844, and Lys 848 by Ala abolish CAR activity, indicating their key role in acid reduction. These results may assist in the functional annotation of CAR coding genes in genomic databases. While some other conserved residues decreased activity or had no significant impact, four residues increased the specific activity of NcCAR variants when replaced by alanine. Finally, we showed that NcCAR wild-type and mutants efficiently reduce aliphatic acids.

  12. THEORETICAL APPROACHES TO ASSESS EFFICIENCY OF THE TRANSFORMATION OF THE KEY BUSINESS PROCESSES IN THE PUBLISHING AND PRINTING ACTIVITIES IN THE REGION

    Directory of Open Access Journals (Sweden)

    Volodymyr Bazyliuk

    2016-11-01

    Full Text Available The purpose of the paper is the theoretical study and the analysis of the basic methodological approaches to assess the effectiveness of the transformation of key business processes in the PPA (publishing and printing activity in the region in order to choose the best option. Methodology. The overview of the main assessment methods of the effectiveness of business processes: EVA (Economic value added; ABC (Activity-based costing; Tableau of bord and BSC (Balanced Scorecard is provided. In order to ensure the formalization of the intergrated assessment of the effectiveness of the business process in the publishing and printing activities in the region it is suggested to apply to the methodological apparatus of the fuzzy sets. Statistical analysis, comparison and synthesis are necessary to study the efficiency of the transformation of the key business processes in the PPA in the region. Results. The review and analysis of the most common methods for evaluating the effectiveness of the transformation of key business processes were conducted; the basic advantages and disadvantages of each of the proposed methods in the light of PPA were studied. It was proved that a single business process involves the use of a scorecard that is specific and peculiar for it only whereas completeness of its analysis depends on the kind of the business process: basic, developmental, managing or providing one. The approach to the formalization of the integrated assememnt of the effectiveness of business process in PPA in the region, based on the theory of fuzzy sets was formulated. Practical significance. The mathematical formulation of the problem, an integrated assessment of the efficiency of the business process for each of the possible options for its implementation was developed, and the algorithm of assessing the effectiveness of the business process in the PPA in the region was generated by the apparatus of fuzzy sets. Value/originality. Implementing the

  13. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  14. Sublethal Effects of Insecticide Exposure on Megacopta cribraria (Fabricius) Nymphs: Key Biological Traits and Acetylcholinesterase Activity.

    Science.gov (United States)

    Miao, Jin; Reisig, Dominic D; Li, Guoping; Wu, Yuqing

    2016-01-01

    Megacopta cribraria F. (Hemiptera: Plataspidae), the kudzu bug, is an invasive insect pest of U.S. soybean. At present, insecticide application is the primary and most effective control option for M. cribraria In this study, the potential effects of sublethal and low-lethal concentrations (LC10 and LC40) of three common insecticides on key biological traits and acetylcholinesterase (AChE) activity of the treated nymphal stage of insect were assessed. The results show that the sublethal concentration of imidacloprid significantly reduced adult emergence rate of M. cribraria A low-lethal concentration of imidacloprid significantly increased nymphal development time, but significantly decreased adult emergence rate and adult longevity. Both sublethal and low-lethal concentrations of acephate caused an increase in nymphal development time and a reduction in adult emergence rate and adult longevity. Fecundity of females was significantly reduced only by exposure to low-lethal concentrations of acephate. Sublethal and low-lethal concentrations of bifenthrin increased nymphal development time, but significantly decreased adult emergence rate. In addition, we found that the AChE activity of M. cribraria was significantly increased only by LC40 imidacloprid, but strongly inhibited by acephate. © The Author 2016. Published by Oxford University Press on behalf of the Entomological Society of America.

  15. Effects of soil water depletion on the water relations in tropical kudzu

    Directory of Open Access Journals (Sweden)

    Adaucto Bellarmino de Pereira-Netto

    1999-07-01

    Full Text Available Tropical kudzu (Pueraria phaseoloides (Roxb. Benth., Leguminosae: Faboideae is native to the humid Southeastern Asia. Tropical kudzu has potential as a cover crop in regions subjected to dryness. The objective of this paper was to evaluate the effect of soil water depletion on leaflet relative water content (RWC, stomatal conductance (g and temperature (T L in tropical kudzu. RWC of waterstressed plants dropped from 96 to 78%, following a reduction in SWC from 0.25 to 0.17 g (H2O.g (dry soil-1.Stomatal conductance of stressed plants decreased from 221 to 98 mmol.m-2.s-1, following the reduction in soil water content (SWC. The day after re-irrigation, g of water stressed plants was 15% lower than g of unstressed plants. Differences in T L between waterstressed and unstressed plants (deltaT L rose linearly from 0.1 to 2.2ºC following progressive water deficit. RWC and T L of waterstressed plants paralled RWC and T L of unstressed plants the day after reirrigation. The strong decrease in SWC found in this study only induced moderate water stress in tropical kudzu. In addition, tropical kudzu recover rapidly from the induced water stress after the re-irrigation.

  16. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  17. Model of key success factors for Business Intelligence implementation

    Directory of Open Access Journals (Sweden)

    Peter Mesaros

    2016-07-01

    Full Text Available New progressive technologies recorded growth in every area. Information-communication technologies facilitate the exchange of information and it facilitates management of everyday activities in enterprises. Specific modules (such as Business Intelligence facilitate decision-making. Several studies have demonstrated the positive impact of Business Intelligence to decision-making. The first step is to put in place the enterprise. The implementation process is influenced by many factors. This article discusses the issue of key success factors affecting to successful implementation of Business Intelligence. The article describes the key success factors for successful implementation and use of Business Intelligence based on multiple studies. The main objective of this study is to verify the effects and dependence of selected factors and proposes a model of key success factors for successful implementation of Business Intelligence. Key success factors and the proposed model are studied in Slovak enterprises.

  18. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  19. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  20. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  1. High-capacity quantum key distribution via hyperentangled degrees of freedom

    International Nuclear Information System (INIS)

    Simon, David S; Sergienko, Alexander V

    2014-01-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical. (paper)

  2. Relationships between carbon fluxes and environmental factors in a drip-irrigated, film-mulched cotton field in arid region.

    Directory of Open Access Journals (Sweden)

    Xiaoyu Li

    Full Text Available Environmental factors and human activities play important roles in carbon fixation and emissions generated from croplands. Eddy covariance measurements in a drip-irrigated, film-mulched cotton field were used to analyze the relationships between carbon fluxes and environmental factors in Wulanwusu, northern Xinjiang, an arid region of Northwest China. Our results showed that the cumulative net carbon flux (NEE was -304.8 g C m-2 (a strong sink over the whole cotton growing season in 2012, which was more than that in cotton cropland without plastic film mulching and drip-irrigation. Moreover, when time is scaled up from a half-hour to a month, the correlations of gross primary production (GPP to air temperature (Tair, net solar radiation (Rn and soil water content (SWC gradually become stronger due to ecosystem resistance and resilience as well as the protection of plastic film mulching. The GPP is more strongly correlated with Rn than Tair at time scales from minutes to days, while it reverses at time scales from days to weeks. This outcome is largely determined by the biochemical characteristics of photosynthesis. SWC and vapor pressure deficit (VPD at all time scales are weakly correlated with GPP because plastic film mulching and regularly drip-irrigation allow soil to maintain sufficient water.

  3. Agriculture at the Edge: Landscape Variability of Soil C Stocks and Fluxes in the Tropical Andes

    Science.gov (United States)

    Riveros-Iregui, D. A.; Peña, C.

    2015-12-01

    Paramos, or tropical alpine grasslands occurring right above the forest tree-line (2,800 - 4,700 m), are among the most transformed landscapes in the humid tropics. In the Tropical Andes, Paramos form an archipelago-like pattern from Northern Colombia to Central Peru that effectively captures atmospheric moisture originated in the Amazon-Orinoco basins, while marking the highest altitude capable of sustaining vegetation growth (i.e., 'the edge'). This study investigates the role of land management on mediating soil carbon stocks and fluxes in Paramo ecosystems of the Eastern Cordillera of Colombia. Observations were collected at a Paramo site strongly modified by land use change, including active potato plantations, pasture, tillage, and land abandonment. Results show that undisturbed Paramos soils have high total organic carbon (TOC), high soil water content (SWC), and low soil CO2 efflux (RS) rates. However, Paramo soils that experience human intervention show lower TOC, higher and more variable RS rates, and lower SWC. This study demonstrates that changes in land use in Paramos affect differentially the accumulation and exchange of soil carbon with the atmosphere and offers implications for management and protection strategies of what has been deemed the fastest evolving biodiversity ecosystem in the world.

  4. Fabrication of superhydrophobic and antibacterial surface on cotton fabric by doped silica -based sols with nanoparticles of copper

    Science.gov (United States)

    Berendjchi, Amirhosein; Khajavi, Ramin; Yazdanshenas, Mohammad Esmaeil

    2011-11-01

    The study discussed the synthesis of silica sol using the sol-gel method, doped with two different amounts of Cu nanoparticles. Cotton fabric samples were impregnated by the prepared sols and then dried and cured. To block hydroxyl groups, some samples were also treated with hexadecyltrimethoxysilane. The average particle size of colloidal silica nanoparticles were measured by the particle size analyzer. The morphology, roughness, and hydrophobic properties of the surface fabricated on cotton samples were analyzed and compared via the scanning electron microscopy, the transmission electron microscopy, the scanning probe microscopy, with static water contact angle (SWC), and water shedding angle measurements. Furthermore, the antibacterial efficiency of samples was quantitatively evaluated using AATCC 100 method. The addition of 0.5% (wt/wt) Cu into silica sol caused the silica nanoparticles to agglomerate in more grape-like clusters on cotton fabrics. Such fabricated surface revealed the highest value of SWC (155° for a 10-μl droplet) due to air trapping capability of its inclined structure. However, the presence of higher amounts of Cu nanoparticles (2% wt/wt) in silica sol resulted in the most slippery smooth surface on cotton fabrics. All fabricated surfaces containing Cu nanoparticles showed the perfect antibacterial activity against both of gram-negative and gram-positive bacteria.

  5. Entrepreneurship in the Area of Activity of Key ICT Clusters in Poland

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Key words- cluster organization, entrepreneurship, ICT clusters, ICT sector ... In the next part of the article on the basis of own studies based on data from public .... pointed to the lack of such structures in Poland [17], while in. 2006 as many as 43 .... Manufacture of computers and peripheral equipment. 2630.

  6. Where's the Noise? Key Features of Spontaneous Activity and Neural Variability Arise through Learning in a Deterministic Network.

    Directory of Open Access Journals (Sweden)

    Christoph Hartmann

    2015-12-01

    Full Text Available Even in the absence of sensory stimulation the brain is spontaneously active. This background "noise" seems to be the dominant cause of the notoriously high trial-to-trial variability of neural recordings. Recent experimental observations have extended our knowledge of trial-to-trial variability and spontaneous activity in several directions: 1. Trial-to-trial variability systematically decreases following the onset of a sensory stimulus or the start of a motor act. 2. Spontaneous activity states in sensory cortex outline the region of evoked sensory responses. 3. Across development, spontaneous activity aligns itself with typical evoked activity patterns. 4. The spontaneous brain activity prior to the presentation of an ambiguous stimulus predicts how the stimulus will be interpreted. At present it is unclear how these observations relate to each other and how they arise in cortical circuits. Here we demonstrate that all of these phenomena can be accounted for by a deterministic self-organizing recurrent neural network model (SORN, which learns a predictive model of its sensory environment. The SORN comprises recurrently coupled populations of excitatory and inhibitory threshold units and learns via a combination of spike-timing dependent plasticity (STDP and homeostatic plasticity mechanisms. Similar to balanced network architectures, units in the network show irregular activity and variable responses to inputs. Additionally, however, the SORN exhibits sequence learning abilities matching recent findings from visual cortex and the network's spontaneous activity reproduces the experimental findings mentioned above. Intriguingly, the network's behaviour is reminiscent of sampling-based probabilistic inference, suggesting that correlates of sampling-based inference can develop from the interaction of STDP and homeostasis in deterministic networks. We conclude that key observations on spontaneous brain activity and the variability of neural

  7. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  8. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  9. Influence of Conservation Tillage and Soil Water Content on Crop Yield in Dryland Compacted Alfisol of Central Chile Influencia de la Labranza de Conservación y el Contenido de Agua sobre el Rendimiento del Cultivo en un Alfisol compactado del Secano Central de Chile

    Directory of Open Access Journals (Sweden)

    Ingrid Martinez G

    2011-12-01

    Full Text Available Chilean dryland areas of the Mediterranean climate region are characterized by highly degraded and compacted soils, which require the use of conservation tillage systems to mitigate water erosion as well as to improve soil water storage. An oat (Avena sativa L. cv. Supernova-INIA - wheat (Triticum aestivum L. cv. Pandora-INIA crop rotation was established under the following conservation systems: no tillage (Nt, Nt + contour plowing (Nt+Cp, Nt + barrier hedge (Nt+Bh, and Nt + subsoiling (Nt+Sb, compared to conventional tillage (Ct to evaluate their influence on soil water content (SWC in the profile (10 to 110 cm depth, the soil compaction and their interaction with the crop yield. Experimental plots were established in 2007 and lasted 3 yr till 2009 in a compacted Alfisol. At the end of the growing seasons, SWC was reduced by 44 to 51% in conservation tillage systems and 60% in Ct. Soil water content had a significant (p En Chile, las zonas de clima mediterráneo se caracterizan por suelos altamente degradados y compactados por erosión, lo que requiere el uso de sistemas de labranza conservacionista para mitigar la erosión hídrica, así como incrementar el contenido de agua en el suelo. Se evaluó una rotación avena (Avena sativa L. cv. Supernova-INIA - trigo (Triticum aestivum L. cv. Pandora-INIA establecida bajo los siguientes sistemas conservacionistas: cero labranza (Nt, Nt + curvas de nivel (Nt+Cp, Nt + franjas vivas (Nt+Bh y Nt + subsolado (Nt+Sb, las que fueron comparadas al sistema de labranza convencional (Ct, para evaluar su influencia en el contenido de agua en el suelo (SWC en el perfil (10 a 110 cm profundidad, la compactación del suelo y su interacción con el rendimiento del cultivo. Las parcelas experimentales fueron establecidas 3 años seguidos (2007 al 2009 en un Alfisol compactado. Al final de la temporada, el SWC disminuyó 44 a 51% en los sistemas conservacionistas y 60% en el sistema convencional. El sistema de

  10. Soil Water Measurement Using Actively Heated Fiber Optics at Field Scale.

    Science.gov (United States)

    Vidana Gamage, Duminda N; Biswas, Asim; Strachan, Ian B; Adamchuk, Viacheslav I

    2018-04-06

    Several studies have demonstrated the potential of actively heated fiber optics (AHFO) to measure soil water content (SWC) at high spatial and temporal resolutions. This study tested the feasibility of the AHFO technique to measure soil water in the surface soil of a crop grown field over a growing season using an in-situ calibration approach. Heat pulses of five minutes duration were applied at a rate of 7.28 W m -1 along eighteen fiber optic cable transects installed at three depths (0.05, 0.10 and 0.20 m) at six-hour intervals. Cumulative temperature increase (T cum ) during heat pulses was calculated at locations along the cable. While predicting commercial sensor measurements, the AHFO showed root mean square errors (RMSE) of 2.8, 3.7 and 3.7% for 0.05, 0.10 and 0.20 m depths, respectively. Further, the coefficients of determination (R²) for depth specific relationships were 0.87 (0.05 m depth), 0.46 (0.10 m depth), 0.86 (0.20 m depth) and 0.66 (all depths combined). This study showed a great potential of the AHFO technique to measure soil water at high spatial resolutions (<1 m) and to monitor soil water dynamics of surface soil in a crop grown field over a cropping season with a reasonable compromise between accuracy and practicality.

  11. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  12. Differentiation of water-related traits in terrestrial and epiphytic Cymbidium species

    Directory of Open Access Journals (Sweden)

    Shi-Bao eZhang

    2015-04-01

    Full Text Available Epiphytes that grow in the canopies of tropical and subtropical forests experience different water regimes when compared with terrestrial plants. However, the differences in adaptive strategies between epiphytic and terrestrial plants with respect to plant water relations remain poorly understood. To understand how water-related traits contrast between epiphytic and terrestrial growth forms within the Cymbidium (Orchidaceae, we assessed leaf anatomy, hydraulics, and physiology of seven terrestrial and 13 epiphytic species using a common garden experiment. Compared with terrestrial species, epiphytic species had higher values for leaf mass per unit area (LMA, leaf thickness (LT, epidermal thickness, saturated water content (SWC and the time required to dry saturated leaves to 70% relative water content (T70. However, vein density (Dvein, stomatal density (SD, and photosynthetic capacity (Amax did not differ significantly between the two forms. T70 was positively correlated with LT, LMA, and SWC, and negatively correlated with stomatal index (SI. Amax showed positive correlations with SD and SI, but not with Dvein. Vein density was marginally correlated with SD, and significantly correlated with SI. Overall, epiphytic orchids exhibited substantial ecophysiological differentiations from terrestrial species, with the former type showing trait values indicative of greater drought tolerance and increased water storage capacity. The ability to retain water in the leaves plays a key role in maintaining a water balance in those epiphytes. Therefore, the process of transpiration depends less upon the current substrate water supply and enables epiphytic Cymbidium species to adapt more easily to canopy habitats.

  13. Productivity and seed health of husked oats (Avena sativa L. grown under different soil moisture conditions

    Directory of Open Access Journals (Sweden)

    Agnieszka Pszczółkowska

    2012-12-01

    Full Text Available The present study investigated the effect of different soil moisture content levels (60 - 70% SWC (soil water capacity - control; 30 - 35% SWC - water stress on yields, gas exchange parameters, seed health, and protein fractions of husked oat grain. The study showed that water deficit resulted in a decrease in grain weight per plant and a reduction in the gas exchange rates, primarily the photosynthesis and transpiration rates. Cladosporium cladosporioides was the dominant species on oat kernels in both experimental treatment options and in both years of the study. The presence of Fusarium poae was also found. Higher contents of prolamin, albumin and globulin fractions were found in the oat grain harvested from plants grown under soil water deficit conditions.

  14. A multi-sites analysis on the ozone effects on Gross Primary Production of European forests

    Energy Technology Data Exchange (ETDEWEB)

    Proietti, C. [Department of Environmental Biology, Sapienza University of Rome, Piazzale Aldo Moro, 5, 00185 Rome (Italy); Anav, A. [Italian National Agency for New Technologies, Energy and the Environment (ENEA), C.R. Casaccia, Via Anguillarese 301, 00123 S. Maria di Galeria, Rome (Italy); University of Exeter, College of Engineering, Mathematics and Physical Sciences, Exeter (United Kingdom); De Marco, A. [Italian National Agency for New Technologies, Energy and the Environment (ENEA), C.R. Casaccia, Via Anguillarese 301, 00123 S. Maria di Galeria, Rome (Italy); Sicard, P. [ACRI-HE, 260 route du Pin Montard BP234, 06904 Sophia Antipolis-cedex (France); Vitale, M., E-mail: marcello.vitale@uniroma1.it [Department of Environmental Biology, Sapienza University of Rome, Piazzale Aldo Moro, 5, 00185 Rome (Italy)

    2016-06-15

    Ozone (O{sub 3}) is both a greenhouse gas and a secondary air pollutant causing adverse impacts on forests ecosystems at different scales, from cellular to ecosystem level. Specifically, the phytotoxic nature of O{sub 3} can impair CO{sub 2} assimilation that, in turn affects forest productivity. This study aims to evaluate the effects of tropospheric O{sub 3} on Gross Primary Production (GPP) at 37 European forest sites during the time period 2000–2010. Due to the lack of carbon assimilation data at O{sub 3} monitoring stations (and vice-versa) this study makes a first attempt to combine high resolution MODIS Gross Primary Production (GPP) estimates and O{sub 3} measurement data. Partial Correlations, Anomalies Analysis and the Random Forests Analysis (RFA) were used to quantify the effects of tropospheric O{sub 3} concentration and its uptake on GPP and to evaluate the most important factors affecting inter-annual GPP changes. Our results showed, along a North-West/South-East European transect, a negative impact of O{sub 3} on GPP ranging from 0.4% to 30%, although a key role of meteorological parameters respect to pollutant variables in affecting GPP was found. In particular, meteorological parameters, namely air temperature (T), soil water content (SWC) and relative humidity (RH) are the most important predictors at 81% of test sites. Moreover, it is interesting to highlight a key role of SWC in the Mediterranean areas (Spanish, Italian and French test sites) confirming that, soil moisture and soil water availability affect vegetation growth and photosynthesis especially in arid or semi-arid ecosystems such as the Mediterranean climate regions. Considering the pivotal role of GPP in the global carbon balance and the O{sub 3} ability to reduce primary productivity of the forests, this study can help in assessing the O{sub 3} impacts on ecosystem services, including wood production and carbon sequestration. - Highlights: • Assessment of the surface O{sub 3

  15. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  16. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  17. Cardioprotective role of IGF-1 in the hypertrophied myocardium of the spontaneously hypertensive rats: A key effect on NHE-1 activity.

    Science.gov (United States)

    Yeves, A M; Burgos, J I; Medina, A J; Villa-Abrille, M C; Ennis, I L

    2018-05-13

    Myocardial Na + /H + exchanger-1 (NHE-1) hyperactivity and oxidative stress are interrelated phenomena playing pivotal roles in the development of pathological cardiac hypertrophy and heart failure. Exercise training is effective to convert pathological into physiological hypertrophy in the spontaneously hypertensive rats (SHR), and IGF-1-key humoral mediator of exercise training-inhibits myocardial NHE-1, at least in normotensive rats. Therefore, we hypothesize that IGF-1 by hampering NHE-1 hyperactivity and oxidative stress should exert a cardioprotective effect in the SHR. NHE-1 activity [proton efflux (JH+) mmol L -1  min -1 ], expression and phosphorylation; H 2 O 2 production; superoxide dismutase (SOD) activity; contractility and calcium transients were measured in SHR hearts in the presence/absence of IGF-1. IGF-1 significantly decreased NHE-1 activity (JH+ at pH i 6.95: 1.39 ± 0.32, n = 9 vs C 3.27 ± 0.3, n = 20, P IGF-1 receptor (2.7 ± 0.4, n = 7); by the PI3K inhibitor wortmannin (3.14 ± 0.41, n = 7); and the AKT inhibitor MK2206 (3.37 ± 0.43, n = 14). Moreover, IGF-1 exerted an antioxidant effect revealed by a significant reduction in H 2 O 2 production accompanied by an increase in SOD activity. In addition, IGF-1 improved cardiomyocyte contractility as evidenced by an increase in sarcomere shortening and a decrease in the relaxation constant, underlined by an increase in the amplitude and rate of decay of the calcium transients. IGF-1 exerts a cardioprotective role on the hypertrophied hearts of the SHR, in which the inhibition of NHE-1 hyperactivity, as well as the positive inotropic and antioxidant effects, emerges as key players. © 2018 Scandinavian Physiological Society. Published by John Wiley & Sons Ltd.

  18. Key factors influencing rates of heterotrophic sulfate reduction in active seafloor hydrothermal massive sulfide deposits

    Directory of Open Access Journals (Sweden)

    Kiana Laieikawai Frank

    2015-12-01

    Full Text Available Hydrothermal vents are thermally and geochemically dynamic habitats, and the organisms therein are subject to steep gradients in temperature and chemistry. To date, the influence of these environmental dynamics on microbial sulfate reduction has not been well constrained. Here, via multivariate experiments, we evaluate the effects of key environmental variables (temperature, pH, H2S, SO42-, DOC on sulfate reduction rates and metabolic energy yields in material recovered from a hydrothermal flange from the Grotto edifice in the Main Endeavor Field, Juan de Fuca Ridge. Sulfate reduction was measured in batch reactions across a range of physico-chemical conditions. Temperature and pH were the strongest stimuli, and maximum sulfate reduction rates were observed at 50 °C and pH 6, suggesting that the in situ community of sulfate-reducing organisms in Grotto flanges may be most active in a slightly acidic and moderate thermal/chemical regime. At pH 4, sulfate reduction rates increased with sulfide concentrations most likely due to the mitigation of metal toxicity. While substrate concentrations also influenced sulfate reduction rates, energy-rich conditions muted the effect of metabolic energetics on sulfate reduction rates. We posit that variability in sulfate reduction rates reflect the response of the active microbial consortia to environmental constraints on in situ microbial physiology, toxicity, and the type and extent of energy limitation. These experiments help to constrain models of the spatial contribution of heterotrophic sulfate reduction within the complex gradients inherent to seafloor hydrothermal deposits.

  19. Regulation of sucrose metabolism in higher plants: localization and regulation of activity of key enzymes

    Science.gov (United States)

    Winter, H.; Huber, S. C.; Brown, C. S. (Principal Investigator)

    2000-01-01

    Sucrose (Suc) plays a central role in plant growth and development. It is a major end product of photosynthesis and functions as a primary transport sugar and in some cases as a direct or indirect regulator of gene expression. Research during the last 2 decades has identified the pathways involved and which enzymes contribute to the control of flux. Availability of metabolites for Suc synthesis and 'demand' for products of sucrose degradation are important factors, but this review specifically focuses on the biosynthetic enzyme sucrose-phosphate synthase (SPS), and the degradative enzymes, sucrose synthase (SuSy), and the invertases. Recent progress has included the cloning of genes encoding these enzymes and the elucidation of posttranslational regulatory mechanisms. Protein phosphorylation is emerging as an important mechanism controlling SPS activity in response to various environmental and endogenous signals. In terms of Suc degradation, invertase-catalyzed hydrolysis generally has been associated with cell expansion, whereas SuSy-catalyzed metabolism has been linked with biosynthetic processes (e.g., cell wall or storage products). Recent results indicate that SuSy may be localized in multiple cellular compartments: (1) as a soluble enzyme in the cytosol (as traditionally assumed); (2) associated with the plasma membrane; and (3) associated with the actin cytoskeleton. Phosphorylation of SuSy has been shown to occur and may be one of the factors controlling localization of the enzyme. The purpose of this review is to summarize some of the recent developments relating to regulation of activity and localization of key enzymes involved in sucrose metabolism in plants.

  20. IFMIF (International Fusion Materials Irradiation Facility) key element technology phase interim report

    International Nuclear Information System (INIS)

    Nakamura, Hiroo; Ida, Mizuho; Sugimoto, Masayoshi; Takeuchi, Hiroshi; Yutani, Toshiaki

    2002-03-01

    Activities of International Fusion Materials Irradiation Facility (IFMIF) have been performed under an IEA collaboration since 1995. IFMIF is an accelerator-based deuteron (D + )-lithium (Li) neutron source designed to produce an intense neutron field (2 MW/m 2 , 20 dpa/year for Fe) in a volume of 500 cm 3 for testing candidate fusion materials. In 2000, a 3 year Key Element technology Phase (KEP) of IFMIF was started to reduce the key technology risk factors. This interim report summarizes the KEP activities until mid 2001 in the major project work-breakdown areas of accelerator, target, test facilities and design integration. (author)

  1. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  2. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  3. Integration of Ground and Multi-Resolution Satellite Data for Predicting the Water Balance of a Mediterranean Two-Layer Agro-Ecosystem

    Directory of Open Access Journals (Sweden)

    Piero Battista

    2016-09-01

    Full Text Available The estimation of site water budget is important in Mediterranean areas, where it represents a crucial factor affecting the quantity and quality of traditional crop production. This is particularly the case for spatially fragmented, multi-layer agricultural ecosystems such as olive groves, which are traditional cultivations of the Mediterranean basin. The current paper aims at demonstrating the effectiveness of spatialized meteorological data and remote sensing techniques to estimate the actual evapotranspiration (ETA and the soil water content (SWC of an olive orchard in Central Italy. The relatively small size of this orchard (about 0.1 ha and its two-layer structure (i.e., olive trees and grasses require the integration of remotely sensed data with different spatial and temporal resolutions (Terra-MODIS, Landsat 8-OLI and Ikonos. These data are used to drive a recently proposed water balance method (NDVI-Cws and predict ETA and then site SWC, which are assessed through comparison with sap flow and soil wetness measurements taken in 2013. The results obtained indicate the importance of integrating satellite imageries having different spatio-temporal properties in order to properly characterize the examined olive orchard. More generally, the experimental evidences support the possibility of using widely available remotely sensed and ancillary datasets for the operational estimation of ETA and SWC in olive tree cultivation systems.

  4. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  5. European Society of Gastrointestinal Endoscopy - Establishing the key unanswered research questions within gastrointestinal endoscopy

    DEFF Research Database (Denmark)

    Rees, Colin J; Ngu, Wee Sing; Regula, Jaroslaw

    2016-01-01

    Background and study aim: Gastrointestinal endoscopy is a rapidly evolving research field. The European Society of Gastrointestinal Endoscopy (ESGE) plays a key role in shaping opinion and endoscopy activity throughout Europe and further afield. Establishing key unanswered questions within the fi...

  6. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  7. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  8. Linkage Mechanisms among key Actors in Rice Innovation System ...

    African Journals Online (AJOL)

    In assessment of linkage mechanisms among key actors in rice innovation system in southeast Nigeria, actors were classified into six major groups according to their main activity in the system namely research agency, policy personnel, technology transfer agencies, farmers, marketers and consumers. These constituted the ...

  9. Experimental investigation of hydrogen energy share improvement in a compression ignition engine using water injection and compression ratio reduction

    International Nuclear Information System (INIS)

    Chintala, V.; Subramanian, K.A.

    2016-01-01

    Highlights: • Energy efficiency (EE) increased with increase in hydrogen (H_2) energy share. • H_2 energy share increased from 19% to 79% with combined CR reduction and water. • In-cylinder temperature decreased significantly with water addition and CR reduction. • HC, CO, smoke and NO_x emissions with water and CR are lower than base diesel. - Abstract: This study deals with the effect of water addition on enhancement of maximum hydrogen energy share in a compression ignition engine (7.4 kW rated power at 1500 rpm) under dual fuel mode. The specific water consumption (SWC) was varied from 130 to 480 g/kW h in step of 70 g/kW h using manifold and port injection methods. Subsequently, the combined effect of reduction of compression ratio (CR) of the engine (from 19.5:1 (base) to 16.5:1 and 15.4:1) along with water addition on further enhancement of hydrogen energy share is investigated. The hydrogen energy share was limited to 18.8% with conventional dual fuel mode due to knocking. However, the energy share increased to 66.5% with water addition (maximum SWC: 480 g/kW h), and 79% with combined control strategies (SWC of 340 g/kW h and CR reduction to 16.5:1). Thermal efficiency of the engine under water added dual fuel mode is higher than base diesel mode (single fuel mode), but it is lower than the conventional dual fuel mode without water. The efficiency of the engine with reduced CR and water addition is lower than the conventional dual fuel mode, however at the CR of 16.5:1 and SWC of 340 g/kW h, the efficiency is comparable with base diesel mode efficiency. Hydrocarbon, carbon monoxide, smoke, and oxides of nitrogen emissions of the engine with water addition (340 g/kW h) and CR reduction (to 16.5:1) decreased significantly as compared to base diesel mode, but slightly higher than conventional dual fuel mode.

  10. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  11. IFMIF (International Fusion Materials Irradiation Facility) key element technology phase interim report

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, Hiroo; Ida, Mizuho; Sugimoto, Masayoshi; Takeuchi, Hiroshi; Yutani, Toshiaki (eds.) [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2002-03-01

    Activities of International Fusion Materials Irradiation Facility (IFMIF) have been performed under an IEA collaboration since 1995. IFMIF is an accelerator-based deuteron (D{sup +})-lithium (Li) neutron source designed to produce an intense neutron field (2 MW/m{sup 2}, 20 dpa/year for Fe) in a volume of 500 cm{sup 3} for testing candidate fusion materials. In 2000, a 3 year Key Element technology Phase (KEP) of IFMIF was started to reduce the key technology risk factors. This interim report summarizes the KEP activities until mid 2001 in the major project work-breakdown areas of accelerator, target, test facilities and design integration. (author)

  12. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  13. AMP-activated kinase in human spermatozoa: identification, intracellular localization, and key function in the regulation of sperm motility

    Science.gov (United States)

    Calle-Guisado, Violeta; de Llera, Ana Hurtado; Martin-Hidalgo, David; Mijares, Jose; Gil, Maria C; Alvarez, Ignacio S; Bragado, Maria J; Garcia-Marin, Luis J

    2017-01-01

    AMP-activated kinase (AMPK), a protein that regulates energy balance and metabolism, has recently been identified in boar spermatozoa where regulates key functional sperm processes essential for fertilization. This work's aims are AMPK identification, intracellular localization, and their role in human spermatozoa function. Semen was obtained from healthy human donors. Sperm AMPK and phospho-Thr172-AMPK were analyzed by Western blotting and indirect immunofluorescence. High- and low-quality sperm populations were separated by a 40%–80% density gradient. Human spermatozoa motility was evaluated by an Integrated Semen Analysis System (ISAS) in the presence or absence of the AMPK inhibitor compound C (CC). AMPK is localized along the human spermatozoa, at the entire acrosome, midpiece and tail with variable intensity, whereas its active form, phospho-Thr172-AMPK, shows a prominent staining at the acrosome and sperm tail with a weaker staining in the midpiece and the postacrosomal region. Interestingly, spermatozoa bearing an excess residual cytoplasm show strong AMPK staining in this subcellular compartment. Both AMPK and phospho-Thr172-AMPK human spermatozoa contents exhibit important individual variations. Moreover, active AMPK is predominant in the high motility sperm population, where shows a stronger intensity compared with the low motility sperm population. Inhibition of AMPK activity in human spermatozoa by CC treatment leads to a significant reduction in any sperm motility parameter analyzed: percent of motile sperm, sperm velocities, progressivity, and other motility coefficients. This work identifies and points out AMPK as a new molecular mechanism involved in human spermatozoa motility. Further AMPK implications in the clinical efficiency of assisted reproduction and in other reproductive areas need to be studied. PMID:27678462

  14. AMP-activated kinase in human spermatozoa: identification, intracellular localization, and key function in the regulation of sperm motility

    Directory of Open Access Journals (Sweden)

    Violeta Calle-Guisado

    2017-01-01

    Full Text Available AMP-activated kinase (AMPK, a protein that regulates energy balance and metabolism, has recently been identified in boar spermatozoa where regulates key functional sperm processes essential for fertilization. This work′s aims are AMPK identification, intracellular localization, and their role in human spermatozoa function. Semen was obtained from healthy human donors. Sperm AMPK and phospho-Thr172-AMPK were analyzed by Western blotting and indirect immunofluorescence. High- and low-quality sperm populations were separated by a 40%-80% density gradient. Human spermatozoa motility was evaluated by an Integrated Semen Analysis System (ISAS in the presence or absence of the AMPK inhibitor compound C (CC. AMPK is localized along the human spermatozoa, at the entire acrosome, midpiece and tail with variable intensity, whereas its active form, phospho-Thr172-AMPK, shows a prominent staining at the acrosome and sperm tail with a weaker staining in the midpiece and the postacrosomal region. Interestingly, spermatozoa bearing an excess residual cytoplasm show strong AMPK staining in this subcellular compartment. Both AMPK and phospho-Thr172-AMPK human spermatozoa contents exhibit important individual variations. Moreover, active AMPK is predominant in the high motility sperm population, where shows a stronger intensity compared with the low motility sperm population. Inhibition of AMPK activity in human spermatozoa by CC treatment leads to a significant reduction in any sperm motility parameter analyzed: percent of motile sperm, sperm velocities, progressivity, and other motility coefficients. This work identifies and points out AMPK as a new molecular mechanism involved in human spermatozoa motility. Further AMPK implications in the clinical efficiency of assisted reproduction and in other reproductive areas need to be studied.

  15. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  16. RULES FOR SELECTING AND USING KEY PERFORMANCE INDICATORS FOR THE SERVICE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Alexandra - Elena RUSĂNEANU

    2014-06-01

    Full Text Available There is no question that performance is the desired result of every activity or action. In order to correctly measure an organization’s performance it is necessary to select key performance indicators (KPIs that will deliver long-term value to the company. KPIs are presenting performance information for all levels of the organization and they are reflecting the progress made so far to achieve strategic objectives. The selection of the key performance indicators must be made according to the organization’s industry and activity. The company must truly understand its business and its mission. Also, KPIs must be closely linked to the strategic objectives. The focus of this research is to present effective rules for defining key performance indicators for the Service industry. This sector of economy consists in generating intangible goods like experience, expertise and information. Therefore, monitoring this type of services requires a different approach when defining performance indicators compared to the manufacturing industry.

  17. Key interactions by conserved polar amino acids located at the transmembrane helical boundaries in Class B GPCRs modulate activation, effector specificity and biased signalling in the glucagon-like peptide-1 receptor

    OpenAIRE

    Wootten, Denise; Reynolds, Christopher A.; Smith, Kevin J.; Mobarec, Juan C.; Furness, Sebastian G.B.; Miller, Laurence J.; Christopoulos, Arthur; Sexton, Patrick M.

    2016-01-01

    Class B GPCRs can activate multiple signalling effectors with the potential to exhibit biased agonism in response to ligand stimulation. Previously, we highlighted key TM domain polar amino acids that were crucial for the function of the GLP-1 receptor, a key therapeutic target for diabetes and obesity. Using a combination of mutagenesis, pharmacological characterisation, mathematical and computational molecular modelling, this study identifies additional highly conserved polar residues locat...

  18. The emerging role of Big Data in key development issues: Opportunities, challenges, and concerns

    Directory of Open Access Journals (Sweden)

    Nir Kshetri

    2014-12-01

    Full Text Available This paper presents a review of academic literature, policy documents from government organizations and international agencies, and reports from industries and popular media on the trends in Big Data utilization in key development issues and its worthwhileness, usefulness, and relevance. By looking at Big Data deployment in a number of key economic sectors, it seeks to provide a better understanding of the opportunities and challenges of using it for addressing key issues facing the developing world. It reviews the uses of Big Data in agriculture and farming activities in developing countries to assess the capabilities required at various levels to benefit from Big Data. It also provides insights into how the current digital divide is associated with and facilitated by the pattern of Big Data diffusion and its effective use in key development areas. It also discusses the lessons that developing countries can learn from the utilization of Big Data in big corporations as well as in other activities in industrialized countries.

  19. Soil and Water Conservation Strategies in Cape Verde (Cabo Verde in Portuguese and Their Impacts on Livelihoods: An Overview from the Ribeira Seca Watershed

    Directory of Open Access Journals (Sweden)

    Isaurinda Baptista

    2015-01-01

    Full Text Available Severe land degradation has strongly affected both people’s livelihood and the environment in Cape Verde (Cabo Verde in Portuguese, a natural resource poor country. Despite the enormous investment in soil and water conservation measures (SWC or SLM, which are visible throughout the landscape, and the recognition of their benefits, their biophysical and socioeconomic impacts have been poorly assessed and scientifically documented. This paper contributes to filling this gap, by bringing together insights from literature and policy review, field survey and participatory assessment in the Ribeira Seca Watershed through a concerted approach devised by the DESIRE project (the “Desire approach”. Specifically, we analyze government strategies towards building resilience against the harsh conditions, analyze the state of land degradation and its drivers, survey and map the existing SWC measures, and assess their effectiveness against land degradation, on crop yield and people’s livelihood. We infer that the relative success of Cape Verde in tackling desertification and rural poverty owes to an integrated governance strategy that comprises raising awareness, institutional framework development, financial resource allocation, capacity building, and active participation of rural communities. We recommend that specific, scientific-based monitoring and assessment studies be carried out on the biophysical and socioeconomic impact of SLM and that the “Desire approach” be scaled-up to other watersheds in the country.

  20. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  1. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  2. Inhibitory Activities of Zygophyllum album: A Natural Weight-Lowering Plant on Key Enzymes in High-Fat Diet-Fed Rats

    Science.gov (United States)

    Mnafgui, Kais; Hamden, Khaled; Ben Salah, Hichem; Kchaou, Mouna; Nasri, Mbarek; Slama, Sadok; Derbali, Fatma; Allouche, Noureddine; Elfeki, Abdelfattah

    2012-01-01

    Obesity is a serious health problem that increased risk for many complications, including diabetes and cardiovascular disease. The results showed EZA, which found rich in flavonoids and phenolic compounds, exhibited an inhibitory activity on pancreatic lipase in vitro with IC50 of 91.07 μg/mL. In vivo administration of this extract to HFD-rats lowered body weight and serum leptin level; and inhibited lipase activity of obese rats by 37% leading to notable decrease of T-Ch, TGs and LDL-c levels accompanied with an increase in HDL-c concentration in serum and liver of EZA treated HFD-rats. Moreover, the findings revealed that EZA helped to protect liver tissue from the appearance of fatty cysts. Interestingly, supplementation of EZA modulated key enzyme related to hypertension such as ACE by 36% in serum of HFD animals and improve some of serum electrolytes such as Na+, K+, Cl−, Ca2+ and Mg2+. Moreover, EZA significantly protected the liver-kidney function by reverted back near to normal the values of the liver-kidney dysfunction indices AST&ALT, ALP, CPK and GGT activities, decreased T-Bili, creat, urea and uric acid rates. In conclusion, these results showed a strong antihypelipidemic effect of EZA which can delay the occurrence of dislipidemia and hypertension. PMID:23258993

  3. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  4. Progress, opportunities, and key fields for groundwater quality research under the impacts of human activities in China with a special focus on western China.

    Science.gov (United States)

    Li, Peiyue; Tian, Rui; Xue, Chenyang; Wu, Jianhua

    2017-05-01

    Groundwater quality research is extremely important for supporting the safety of the water supply and human health in arid and semi-arid areas of China. This review article was constructed to report the latest research progress of groundwater quality in western China where groundwater quality is undergoing fast deterioration because of fast economic development and extensive anthropogenic activities. The opportunities brought by increasing public awareness of groundwater quality protection were also highlighted and discussed. To guide and promote further development of groundwater quality research in China, especially in western China, ten key groundwater quality research fields were proposed. The review shows that the intensification of human activities and the associated impacts on groundwater quality in China, especially in western China, has made groundwater quality research increasingly important, and has caught the attention of local, national, and international agencies and scholars. China has achieved some progress in groundwater quality research in terms of national and regional laws, regulations, and financial supports. The future of groundwater quality research in China, especially in western China, is promising reflected by the opportunities highlighted. The key research fields proposed in this article may also inform groundwater quality protection and management at the national and international level.

  5. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  6. Performance analysis of joint multi-branch switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Qaraqe, Khalid A.; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2012-01-01

    desired performance for the primary link. The proposed switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan and wait combining technique (SWC) where a transmission occurs only when a branch with an acceptable performance

  7. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  8. Permeability of uncharged organic molecules in reverse osmosis desalination membranes.

    Science.gov (United States)

    Dražević, Emil; Košutić, Krešimir; Svalina, Marin; Catalano, Jacopo

    2017-06-01

    Reverse osmosis (RO) membranes are primarily designed for removal of salts i.e. for desalination of brackish and seawater, but they have also found applications in removal of organic molecules. While it is clear that steric exclusion is the dominant removal mechanism, the fundamental explanation for how and why the separation occurs remains elusive. Until recently there was no strong microscopic evidences elucidating the structure of the active polyamide layers of RO membranes, and thus they have been conceived as "black boxes"; or as an array of straight capillaries with a distribution of radii; or as polymers with a small amount of polymer free domains. The knowledge of diffusion and sorption coefficients is a prerequisite for understanding the intrinsic permeability of any organic solute in any polymer. At the same time, it is technically challenging to accurately measure these two fundamental parameters in very thin (20-300 nm) water-swollen active layers. In this work we have measured partition and diffusion coefficients and RO permeabilities of ten organic solutes in water-swollen active layers of two types of RO membranes, low (SWC4+) and high flux (XLE). We deduced from our results and recent microscopic studies that the solute flux of organic molecules in polyamide layer of RO membranes occurs in two domains, dense polymer (the key barrier layer) and the water filled domains. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  10. Shielding analysis of the IEM cell offset adapter plate

    International Nuclear Information System (INIS)

    Simons, R.L.

    1995-01-01

    The adapter plate for the Interim Examination and Maintenance (IEM) cell ten foot ceiling valve was modified so that the penetration through the valve is offset to the north side of the steel plate. The modifications required that the shielding effectiveness be evaluated for several operating conditions. The highest gamma ray dose rate (51 mrem/hr) occurs when a Core Component Container (CCC) with six high burn-up driver fuel assemblies is transferred into or out of Solid Waste Cask (SWC). The neutron dose rate at the same source location is 2.5 mrem/hr. The total dose rate during the transfer is less than the 200 mrem/hr limit. If the ten foot ceiling valve is closed, the dose rate with twelve DFA in the cell will be less than 0.1 mrem/hr. However, with the ceiling valve open the dose rate will be as high as 12 mrem/hr. The latter condition will require controlled access to the area around the offset adapter plate when the ceiling valve is open. It was found that gaps in the shield block around the SWC floor valve will allow contact dose rates as high as 350 mrem/hr during the transfer of a fully loaded CCC. Although this situation does not pertain to the offset adapter plate, it will require controlled access around the SWC valve during the transfer of a fully loaded CCC

  11. Karstic water storage response to the recent droughts in Southwest China estimated from satellite gravimetry

    Science.gov (United States)

    Yao, Chaolong; Luo, Zhicai

    2015-12-01

    The water resources crisis is intensifying in Southwest China (SWC), which includes the world's largest continuous coverage of karst landforms, due to recent severe drought events. However, because of the special properties of karstic water system, such as strong heterogeneity, monitoring the variation of karstic water resources at large scales remains still difficult. Satellite gravimetry has emerged as an effective tool for investigating the global and regional water cycles. In this study, we used GRACE (Gravity Recovery and Climate Experiment) data from January 2003 to January 2013 to investigate karstic water storage variability over the karst region of SWC. We assessed the impacts of the recent severe droughts on karst water resources, including two heavy droughts in September 2010 to May 2010 and August 2011 to January 2012. Results show a slightly water increase tend during the studied period, but these two severe droughts have resulted in significant water depletion in the studied karst region. The latter drought during 2011 and 2012 caused more water deficits than that of the drought in 2010. Strong correlation between the variations of GRACE-based total water storage and precipitation suggests that climate change is the main driving force for the significant water absent over the studied karst region. As the world's largest continuous coverage karst aquifer, the karst region of SWC offers an example of GRACE applications to a karst system incisively and will benefit for water management from a long-term perspective in karst systems throughout the world.

  12. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  13. Code for plant identification (KKS) key in PC version. KKS-Schluessel-Programm in PC-Version

    Energy Technology Data Exchange (ETDEWEB)

    Pannenbaecker, K. (GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Erlangen (Germany) GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Muenchen (Germany))

    1991-11-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.).

  14. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  15. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  16. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  17. Active living neighborhoods: is neighborhood walkability a key element for Belgian adolescents?

    Science.gov (United States)

    De Meester, Femke; Van Dyck, Delfien; De Bourdeaudhuij, Ilse; Deforche, Benedicte; Sallis, James F; Cardon, Greet

    2012-01-04

    In adult research, neighborhood walkability has been acknowledged as an important construct among the built environmental correlates of physical activity. Research into this association has only recently been extended to adolescents and the current empirical evidence is not consistent. This study investigated whether neighborhood walkability and neighborhood socioeconomic status (SES) are associated with physical activity among Belgian adolescents and whether the association between neighborhood walkability and physical activity is moderated by neighborhood SES and gender. In Ghent (Belgium), 32 neighborhoods were selected based on GIS-based walkability and SES derived from census data. In total, 637 adolescents (aged 13-15 year, 49.6% male) participated in the study. Physical activity was assessed using accelerometers and the Flemish Physical Activity Questionnaire. To analyze the associations between neighborhood walkability, neighborhood SES and individual physical activity, multivariate multi-level regression analyses were conducted. Only in low-SES neighborhoods, neighborhood walkability was positively associated with accelerometer-based moderate to vigorous physical activity and the average activity level expressed in counts/minute. For active transport to and from school, cycling for transport during leisure time and sport during leisure time no association with neighborhood walkability nor, with neighborhood SES was found. For walking for transport during leisure time a negative association with neighborhood SES was found. Gender did not moderate the associations of neighborhood walkability and SES with adolescent physical activity. Neighborhood walkability was related to accelerometer-based physical activity only among adolescent boys and girls living in low-SES neighborhoods. The relation of built environment to adolescent physical activity may depend on the context.

  18. Activation/modulation of adaptive immunity emerges simultaneously after 17DD yellow fever first-time vaccination: is this the key to prevent severe adverse reactions following immunization?

    Science.gov (United States)

    Martins, M A; Silva, M L; Marciano, A P V; Peruhype-Magalhães, V; Eloi-Santos, S M; Ribeiro, j G L; Correa-Oliveira, R; Homma, A; Kroon, E G; Teixeira-Carvalho, A; Martins-Filho, O A

    2007-04-01

    Over past decades the 17DD yellow fever vaccine has proved to be effective in controlling yellow fever and promises to be a vaccine vector for other diseases, but the cellular and molecular mechanisms by which it elicits such broad-based immunity are still unclear. In this study we describe a detailed phenotypic investigation of major and minor peripheral blood lymphocyte subpopulations aimed at characterizing the kinetics of the adaptive immune response following primary 17DD vaccination. Our major finding is a decreased frequency of circulating CD19+ cells at day 7 followed by emerging activation/modulation phenotypic features (CD19+interleukin(IL)10R+/CD19+CD32+) at day 15. Increased frequency of CD4+human leucocyte antigen D-related(HLA-DR+) at day 7 and CD8+HLA-DR+ at day 30 suggest distinct kinetics of T cell activation, with CD4+ T cells being activated early and CD8+ T cells representing a later event following 17DD vaccination. Up-regulation of modulatory features on CD4+ and CD8+ cells at day 15 seems to be the key event leading to lower frequency of CD38+ T cells at day 30. Taken together, our findings demonstrate the co-existence of phenotypic features associated with activation events and modulatory pathways. Positive correlations between CD4+HLA-DR+ cells and CD4+CD25high regulatory T cells and the association between the type 0 chemokine receptor CCR2 and the activation status of CD4+ and CD8+ cells further support this hypothesis. We hypothesize that this controlled microenviroment seems to be the key to prevent the development of serious adverse events, and even deaths, associated with the 17DD vaccine reported in the literature.

  19. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  20. Active living neighborhoods: is neighborhood walkability a key element for Belgian adolescents?

    Directory of Open Access Journals (Sweden)

    De Meester Femke

    2012-01-01

    Full Text Available Abstract Background In adult research, neighborhood walkability has been acknowledged as an important construct among the built environmental correlates of physical activity. Research into this association has only recently been extended to adolescents and the current empirical evidence is not consistent. This study investigated whether neighborhood walkability and neighborhood socioeconomic status (SES are associated with physical activity among Belgian adolescents and whether the association between neighborhood walkability and physical activity is moderated by neighborhood SES and gender. Methods In Ghent (Belgium, 32 neighborhoods were selected based on GIS-based walkability and SES derived from census data. In total, 637 adolescents (aged 13-15 year, 49.6% male participated in the study. Physical activity was assessed using accelerometers and the Flemish Physical Activity Questionnaire. To analyze the associations between neighborhood walkability, neighborhood SES and individual physical activity, multivariate multi-level regression analyses were conducted. Results Only in low-SES neighborhoods, neighborhood walkability was positively associated with accelerometer-based moderate to vigorous physical activity and the average activity level expressed in counts/minute. For active transport to and from school, cycling for transport during leisure time and sport during leisure time no association with neighborhood walkability nor, with neighborhood SES was found. For walking for transport during leisure time a negative association with neighborhood SES was found. Gender did not moderate the associations of neighborhood walkability and SES with adolescent physical activity. Conclusions Neighborhood walkability was related to accelerometer-based physical activity only among adolescent boys and girls living in low-SES neighborhoods. The relation of built environment to adolescent physical activity may depend on the context.

  1. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  2. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  3. Soil conservation in Burkina Faso: is international cooperation effective?

    Science.gov (United States)

    Angeluccetti, Irene; Coviello, Velio; Grimaldi, Stefania; Vezza, Paolo; Koussubé, Alain

    2017-04-01

    Challenges related to Soil and Water Conservation (SWC) have been documented in Burkina Faso for many decades so far. The ever-growing population of this country, a landlocked desertification-prone one, is daily facing the visible impact of increasingly intense rainfall and concentrated rainy days. Agricultural soil erosion and reservoir siltation are two of the main issues affecting Burkina Faso subsistence agriculture sector, whose revenues largely contribute to people's income. From the sixties onwards locally-developed SWC techniques (e.g. permeable rock dams and gabion check dams) have been widely, though geographically variably, employed in the country. The effectiveness of these techniques in locally increasing soil moisture and reducing soil erosion is well proven, while their long term effect in decreasing the reservoir siltation is still under debate and shall be addressed with a whole-catchment approach often overlooked by international donors. This research aims to analyze the history of the use of these techniques by reviewing the results of several cooperation projects that dealt with the implementation of nearly 200 conservation works. These case studies are representative of 5 out of 12 regions of Burkina Faso and span over two decades. Local people levels of (i) awareness, (ii) technique appropriation, (iii) involvement and the degree of (iv) effectiveness and (v) maintenance of these SWC works have been taken into account. The analysis of the afore-mentioned five indicators let the authors draw a list of features that are needed for this kind of projects to be successful in the SWC domain. Moreover the differences that exist between the approach to the community-works, normally employed for SWC realizations, of different ethnical groups is highlighted. The degree of degradation of the environment also plays an important role in the involvement of the local community together with the familiarity of the population with these techniques. For

  4. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  5. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  6. Prospecting exploration and development of the uranium deposits Key Lake, Canada

    International Nuclear Information System (INIS)

    Kirchner, G.; Tan, B.H.

    1977-01-01

    This lecture gives a survey of the methods employed by the Uranerzbergbau-GmbH and Co. KG and the experience gained in connection with prospecting and exploration activities at the uranium deposits in Saskatchewan, illustrated by the case history Key Lake. (orig.) [de

  7. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  8. IFMIF-KEP. International fusion materials irradiation facility key element technology phase report

    International Nuclear Information System (INIS)

    2003-03-01

    The International Fusion Materials Irradiation Facility (IFMIF) is an accelerator-based D-Li neutron source designed to produce an intense neutron field that will simulate the neutron environment of a D-T fusion reactor. IFMIF will provide a neutron flux equivalent to 2 MW/m 2 , 20 dpa/y in Fe, in a volume of 500 cm 3 and will be used in the development and qualification of materials for fusion systems. The design activities of IFMIF are performed under an IEA collaboration which began in 1995. In 2000, a three-year Key Element Technology Phase (KEP) of IFMIF was undertaken to reduce the key technology risk factors. This KEP report describes the results of the three-year KEP activities in the major project areas of accelerator, target, test facilities and design integration. (author)

  9. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  10. Key factors of successful JIT integration with IBS - An overview

    Science.gov (United States)

    Asri, Mohammad Azwanie Naim Mohammad; Nawi, Mohd Nasrun Mohd; Nadarajan, Santhirasegaran

    2016-08-01

    The Just-In-Time (JIT) philosophy has been used for many decades to increase productivity through waste elimination process. The purpose of this paper is to contribute to the knowledge by addressing the transportation and material delivery activities in Industrialized Building System (IBS) and integrating JIT to improve the performance of those activities. The literature review has been conducted through relevant database. It was found that there is a need for more holistic approach to be adopted to integrate JIT in IBS project. This paper discusses the key success factors for effective integration between JIT and IBS in the context of transportation and material delivery activities.

  11. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  12. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  13. Using Soil and Water Conservation Contests for Extension: Experiences from the Bolivian Mountain Valleys

    NARCIS (Netherlands)

    Kessler, A.; Graaff, de J.

    2007-01-01

    Soil and water conservation (SWC) contests among farmer groups were organized in five rural villages in the Bolivian mountain valleys. The contests were aimed at quickly achieving widespread sustainable results. This article analyzes the effectiveness of these contests as an extension tool. Mixed

  14. Concurrent temporal stability of the apparent electrical conductivity and soil water content

    Science.gov (United States)

    Knowledge of spatio-temporal soil water content (SWC) variability within agricultural fields is useful to improve crop management. Spatial patterns of soil water contents can be characterized using the temporal stability analysis, however high density sampling is required. Soil apparent electrical c...

  15. ANALYSIS OF THE KEY ACTIVITIES OF THE LIFE CYCLE OF KNOWLEDGE MANAGEMENT IN THE UNIVERSITY AND DEVELOPMENT OF THE CONCEPTUAL ARCHITECTURE OF THE KNOWLEDGE MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Eugene N. Tcheremsina

    2013-01-01

    Full Text Available This article gives an analysis of the key activities of the life cycle of knowledge management in terms of the features of knowledge management in higher education. Based on the analysis we propose the model of the conceptual architecture of virtual knowledge-space of a university. The proposed model is the basis for the development of kernel intercollegiate virtual knowledge-space, based on cloud technology. 

  16. WITNESSING THE KEY EARLY PHASE OF QUASAR EVOLUTION: AN OBSCURED ACTIVE GALACTIC NUCLEUS PAIR IN THE INTERACTING GALAXY IRAS 20210+1121

    International Nuclear Information System (INIS)

    Piconcelli, Enrico; Fiore, Fabrizio; Maiolino, Roberto; Nicastro, Fabrizio; Vignali, Cristian; Bianchi, Stefano; Mathur, Smita; Guainazzi, Matteo; Lanzuisi, Giorgio

    2010-01-01

    We report the discovery of an active galactic nucleus (AGN) pair in the interacting galaxy system IRAS 20210+1121 at z = 0.056. An XMM-Newton observation reveals the presence of an obscured (N H ∼ 5 x 10 23 cm -2 ), Seyfert-like (L 2-10keV = 4.7 x 10 42 erg s -1 ) nucleus in the northern galaxy, which lacks unambiguous optical AGN signatures. Our spectral analysis also provides strong evidence that the IR-luminous southern galaxy hosts a Type 2 quasar embedded in a bright starburst emission. In particular, the X-ray primary continuum from the nucleus appears totally depressed in the XMM-Newton band as expected in the case of a Compton-thick absorber, and only the emission produced by Compton scattering ('reflection') of the continuum from circumnuclear matter is seen. As such, IRAS 20210+1121 seems to provide an excellent opportunity to witness a key, early phase in the quasar evolution predicted by the theoretical models of quasar activation by galaxy collisions.

  17. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  18. The Design of High-Q Sallen-Key Biquads with Unity-Gain Buffer Amplifiers

    DEFF Research Database (Denmark)

    Gaunholt, Hans; Guldbrandsen, Birthe

    1997-01-01

    In the design of active biquads with negative feedback frequently referred to as Sallen-Key networks the assumption of a low quality- or Q-factor is recommended in order to keep the active sensitivities at a reasonable low value. In this paper it will be shown that it is possible to design and to...

  19. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  20. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  1. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  2. [Heavy episodic drinking, cannabis use and unsafe sex among university students].

    Science.gov (United States)

    Moure-Rodríguez, Lucía; Doallo, Sonia; Juan-Salvadores, Pablo; Corral, Montserrat; Cadaveira, Fernando; Caamaño-Isorna, Francisco

    To determine the incidence of unsafe sex among university students and its association with heavy episodic drinking (HED) and cannabis use. A cohort study was carried out from 2005 to 2011 among university students of the Compostela Cohort (n=517). HED was measured using the third question of the Alcohol Use Disorders Identification Test (AUDIT). Unsafe sex was considered to be sex under the influence of alcohol (SUA) and sex without a condom (SWC). Logistic regression models were created. The incidence of SUA was 40.9% for women and 53.0% for men, while the SWC incidence ranged from 13.7% for women to 25.7% for men. HED and cannabis use were associated with SUA in both women (OR=2.08, 95% CI: 1.03-4.21; OR=2.78, 95%CI: 1.57-4.92) and men (OR=4.74 (95%CI: 1.49-15.09; OR=4.37, 95%CI: 1.17- 16.36). Moreover, cannabis use in women was associated with SWC (OR=2.96, 95%CI: 1.52-5.75). The population attributable fractions of SUA for HED were 24.7% and 52.9% for women and men, respectively. HED and cannabis use represent a public health problem due to their association with a variety of problems, including engagement in unsafe sex. Our results suggest that a significant proportion of unsafe sex could be avoided by reducing this consumption pattern of alcohol. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  3. IFMIF-KEP. International fusion materials irradiation facility key element technology phase report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-01

    The International Fusion Materials Irradiation Facility (IFMIF) is an accelerator-based D-Li neutron source designed to produce an intense neutron field that will simulate the neutron environment of a D-T fusion reactor. IFMIF will provide a neutron flux equivalent to 2 MW/m{sup 2}, 20 dpa/y in Fe, in a volume of 500 cm{sup 3} and will be used in the development and qualification of materials for fusion systems. The design activities of IFMIF are performed under an IEA collaboration which began in 1995. In 2000, a three-year Key Element Technology Phase (KEP) of IFMIF was undertaken to reduce the key technology risk factors. This KEP report describes the results of the three-year KEP activities in the major project areas of accelerator, target, test facilities and design integration. (author)

  4. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  5. Key Metabolic Enzymes Underlying Astrocytic Upregulation of GABAergic Plasticity

    Directory of Open Access Journals (Sweden)

    Przemysław T. Kaczor

    2017-05-01

    Full Text Available GABAergic plasticity is recognized as a key mechanism of shaping the activity of the neuronal networks. However, its description is challenging because of numerous neuron-specific mechanisms. In particular, while essential role of glial cells in the excitatory plasticity is well established, their involvement in GABAergic plasticity only starts to emerge. To address this problem, we used two models: neuronal cell culture (NC and astrocyte-neuronal co-culture (ANCC, where we chemically induced long-term potentiation at inhibitory synapses (iLTP. iLTP could be induced both in NC and ANCC but in ANCC its extent was larger. Importantly, this functional iLTP manifestation was accompanied by an increase in gephyrin puncta size. Furthermore, blocking astrocyte Krebs cycle with fluoroacetate (FA in ANCC prevented enhancement of both mIPSC amplitude and gephyrin puncta size but this effect was not observed in NC, indicating a key role in neuron-astrocyte cross-talk. Blockade of monocarboxylate transport with α-Cyano-4-hydroxycinnamic acid (4CIN abolished iLTP both in NC and ANCC and in the latter model prevented also enlargement of gephyrin puncta. Similarly, blockade of glycogen phosphorylase with BAYU6751 prevented enlargement of gephyrin puncta upon iLTP induction. Finally, block of glutamine synthetase with methionine sulfoxide (MSO nearly abolished mIPSC increase in both NMDA stimulated cell groups but did not prevent enlargement of gephyrin puncta. In conclusion, we provide further evidence that GABAergic plasticity is strongly regulated by astrocytes and the underlying mechanisms involve key metabolic enzymes. Considering the strategic role of GABAergic interneurons, the plasticity described here indicates possible mechanism whereby metabolism regulates the network activity.

  6. Disclosure of key stereoelectronic factors for efficient H2 binding and cleavage in the active site of [NiFe]-hydrogenases.

    Science.gov (United States)

    Bruschi, Maurizio; Tiberti, Matteo; Guerra, Alessandro; De Gioia, Luca

    2014-02-05

    A comparative analysis of a series of DFT models of [NiFe]-hydrogenases, ranging from minimal NiFe clusters to very large systems including both the first and second coordination sphere of the bimetallic cofactor, was carried out with the aim of unraveling which stereoelectronic properties of the active site of [NiFe]-hydrogenases are crucial for efficient H2 binding and cleavage. H2 binding to the Ni-SIa redox state is energetically favored (by 4.0 kcal mol(-1)) only when H2 binds to Ni, the NiFe metal cluster is in a low spin state, and the Ni cysteine ligands have a peculiar seesaw coordination geometry, which in the enzyme is stabilized by the protein environment. The influence of the Ni coordination geometry on the H2 binding affinity was then quantitatively evaluated and rationalized analyzing frontier molecular orbitals and populations. Several plausible reaction pathways leading to H2 cleavage were also studied. It turned out that a two-step pathway, where H2 cleavage takes place on the Ni-SIa redox state of the enzyme, is characterized by very low reaction barriers and favorable reaction energies. More importantly, the seesaw coordination geometry of Ni was found to be a key feature for facile H2 cleavage. The discovery of the crucial influence of the Ni coordination geometry on H2 binding and activation in the active site of [NiFe]-hydrogenases could be exploited in the design of novel biomimetic synthetic catalysts.

  7. Self-regulated learning: A key learning effect of feedback in a ...

    African Journals Online (AJOL)

    Background. Problem-based learning (PBL) has been adopted across many health professions training institutions. Small-group student tutorials are a major component of PBL. Facilitator feedback during a tutorial is a key activity to promote self-regulated learning. Objective. To explore ways in which students use feedback ...

  8. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  9. Spatio-temporal availability of field crop residues for biofuel production in Northwest and Southwest China

    NARCIS (Netherlands)

    Han, L.; Wang, X.; Spiertz, J.H.J.; Yang, L.; Zhou, Y.; Liu, J.; Xie, G.

    2015-01-01

    Developing bioenergy from plant feedstocks is considered an opportunity to reduce greenhouse gas emissions and secure biofuel supply. This study is an assessment of the availability of field crop residues for bioenergy feedstocks in northwest China (NWC) and southwest China (SWC). The amount of

  10. Financial viability of soil and water conservation technologies in northwestern Ethiopian highlands

    NARCIS (Netherlands)

    Teshome, Akalu; Rolker, D.; Graaff, de J.

    2013-01-01

    Soil erosion by water is a major threat to food security, environmental sustainability and prospects for rural development in Ethiopia. Successive governments have promoted various soil and water conservation (SWC) measures in order to reduce the effects of land degradation, but adoption rates vary

  11. Participatory integrated watershed management in the north-western highlands of Rwanda

    NARCIS (Netherlands)

    Kagabo, M.D.

    2013-01-01

    This thesis is the result of assessments on the extent of existing resource use and management practices using a Participatory Integrated Watershed Management (PIWM) as a viable approach to promote best soil water conservation (SWC) measures towards more sustainable land use. The study was

  12. Sternal wound complications after primary isolated myocardial revascularization: the importance of the post-operative variables.

    NARCIS (Netherlands)

    Noyez, L.; Druten, J.A.M. van; Mulder, J.; Schroen, A.M.; Skotnicki, S.H.; Brouwer, R.

    2001-01-01

    OBJECTIVE: Select pre-, peri-, and post-operative variables, predictive for sternal wound complications (SWC), in a clinical setting. METHODS: We analyzed pre-, peri-, and post-operative data of 3815 patients who underwent a primary isolated bypass grafting. 100 patients (2.6%) had post-operative

  13. Exercise and Activity: Key Elements in the Management of OI

    Science.gov (United States)

    ... with peers. Children and adults with OI will benefit from a regular program of physical activity to promote optimal function through muscle strengthening, aerobic exercise, and recreational pursuits. Specifics of the exercise program vary depending ...

  14. Intrinsically stable phase-modulated polarization encoding system for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaobao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China); Liao Changjun [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)], E-mail: chliao@scnu.edu.cn; Mi Jinglong; Wang Jindong; Liu Songhao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)

    2008-12-22

    We demonstrate experimentally an intrinsically stable polarization coding and decoding system composed of optical-fiber Sagnac interferometers with integrated phase modulators for quantum key distribution. An interference visibility of 98.35% can be kept longtime during the experiment without any efforts of active compensation for coding all four desired polarization states.

  15. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  16. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  17. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  18. Carbonylation as a key reaction in anaerobic acetone activation by Desulfococcus biacutus.

    Science.gov (United States)

    Gutiérrez Acosta, Olga B; Hardt, Norman; Schink, Bernhard

    2013-10-01

    Acetone is activated by aerobic and nitrate-reducing bacteria via an ATP-dependent carboxylation reaction to form acetoacetate as the first reaction product. In the activation of acetone by sulfate-reducing bacteria, acetoacetate has not been found to be an intermediate. Here, we present evidence of a carbonylation reaction as the initial step in the activation of acetone by the strictly anaerobic sulfate reducer Desulfococcus biacutus. In cell suspension experiments, CO was found to be a far better cosubstrate for acetone activation than CO2. The hypothetical reaction product, acetoacetaldehyde, is extremely reactive and could not be identified as a free intermediate. However, acetoacetaldehyde dinitrophenylhydrazone was detected by mass spectrometry in cell extract experiments as a reaction product of acetone, CO, and dinitrophenylhydrazine. In a similar assay, 2-amino-4-methylpyrimidine was formed as the product of a reaction between acetoacetaldehyde and guanidine. The reaction depended on ATP as a cosubstrate. Moreover, the specific activity of aldehyde dehydrogenase (coenzyme A [CoA] acylating) tested with the putative physiological substrate was found to be 153 ± 36 mU mg(-1) protein, and its activity was specifically induced in extracts of acetone-grown cells. Moreover, acetoacetyl-CoA was detected (by mass spectrometry) after the carbonylation reaction as the subsequent intermediate after acetoacetaldehyde was formed. These results together provide evidence that acetoacetaldehyde is an intermediate in the activation of acetone by sulfate-reducing bacteria.

  19. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  20. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  1. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  2. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  3. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  4. Critical evaluation of the Laboratory of Radionuclide Metrology results of the Institute of Radiation Protection and Dosimetry - IRD in the international key comparisons of activity measurement of radioactive solutions

    International Nuclear Information System (INIS)

    Iwahara, A.; Tauhata, L.; Silva, C.J. da

    2014-01-01

    The Radionuclide Metrology Laboratory (LMR) of LNMRI/IRD has been participating since 1984, in international key-comparisons of activity measurement of radioactive sources organized by BIPM and the Regional Metrology Organizations as EURAMET and APMP. The measured quantity is the activity of a radioactive solution, in becquerel (Bq), containing the radionuclide involved and the of measurement methods used are 4αβ-γ coincidence/anticoincidence, coincidence sum-peak and liquid scintillation. In this paper a summary of the methods used and a performance analysis of the results obtained are presented. (author)

  5. Aloe arborescens aqueous gel extract alters the activities of key ...

    African Journals Online (AJOL)

    Mogale

    2011-05-16

    May 16, 2011 ... glucose uptake by fat and muscle cells; 3) altering the activity of some ... aqueous A. arborescens leaf gel extract on fasting blood glucose levels, insulin ..... weight loss of treated diabetic rats as compared to untreated alloxan ...

  6. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  7. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  8. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  9. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  10. The effectiveness of soil conservation measures at a landscape scale in the West Usambara highlands, Tanzania

    NARCIS (Netherlands)

    Wickama, Juma; Masselink, Rens; Sterk, Geert

    2015-01-01

    The adoption of soil and water conservation (SWC) technologies among small holder farmers in the East African highlands is an area which poses many challenges. When adoption occurs across a vast landscape, the locations and effectiveness of the adopted measures are often not adequately known. For

  11. Assessing the variation in bund structure dimensions and its impact on soil physical properties and hydrology in Koga catchment, Highlands of Ethiopia

    NARCIS (Netherlands)

    Jemberu, Walle; Baartman, Jantiene E.M.; Fleskens, Luuk; Selassie, Yihenew G.; Ritsema, Coen J.

    2017-01-01

    Prolonged soil drying and severe moisture stress during the dry season, and soil saturation and erosion during the short rainy season are critical problems in the Ethiopian highlands. Large-scale implementation of bund structures has been used as soil and water conservation (SWC) measures to

  12. Financial efficiency of major soil and water conservation measures in West Usambara highlands, Tanzania

    NARCIS (Netherlands)

    Tenge, A.J.M.; Graaff, de J.; Hella, J.P.

    2005-01-01

    Soil and Water Conservation (SWC) measures are needed to control soil erosion and sustain agricultural production on steep slopes of West Usambara mountains. However, the adoption by farmers of the recommended soil and water conservation measures is low and soil erosion continues to be a problem. It

  13. Scale issues in soil hydrology related to measurement and simulation: A case study in Colorado

    Science.gov (United States)

    State variables, such as soil water content (SWC), are typically measured or inferred at very small scales while being simulated at larger scales relevant to spatial management or hillslope areas. Thus there is an implicit spatial disparity that is often ignored. Surface runoff, on the other hand, ...

  14. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Key mediators of intracellular amino acids signaling to mTORC1 activation.

    Science.gov (United States)

    Duan, Yehui; Li, Fengna; Tan, Kunrong; Liu, Hongnan; Li, Yinghui; Liu, Yingying; Kong, Xiangfeng; Tang, Yulong; Wu, Guoyao; Yin, Yulong

    2015-05-01

    Mammalian target of rapamycin complex 1 (mTORC1) is activated by amino acids to promote cell growth via protein synthesis. Specifically, Ras-related guanosine triphosphatases (Rag GTPases) are activated by amino acids, and then translocate mTORC1 to the surface of late endosomes and lysosomes. Ras homolog enriched in brain (Rheb) resides on this surface and directly activates mTORC1. Apart from the presence of intracellular amino acids, Rag GTPases and Rheb, other mediators involved in intracellular amino acid signaling to mTORC1 activation include human vacuolar sorting protein-34 (hVps34) and mitogen-activating protein kinase kinase kinase kinase-3 (MAP4K3). Those molecular links between mTORC1 and its mediators form a complicate signaling network that controls cellular growth, proliferation, and metabolism. Moreover, it is speculated that amino acid signaling to mTORC1 may start from the lysosomal lumen. In this review, we discussed the function of these mediators in mTORC1 pathway and how these mediators are regulated by amino acids in details.

  16. Quantum Key Distribution with High Order Fibonacci-like Orbital Angular Momentum States

    Science.gov (United States)

    Pan, Ziwen; Cai, Jiarui; Wang, Chuan

    2017-08-01

    The coding space in quantum communication could be expanded to high-dimensional space by using orbital angular momentum (OAM) states of photons, as both the capacity of the channel and security are enhanced. Here we present a novel approach to realize high-capacity quantum key distribution (QKD) by exploiting OAM states. The innovation of the proposed approach relies on a unique type of entangled-photon source which produces entangled photons with OAM randomly distributed among high order Fiboncci-like numbers and a new physical mechanism for efficiently sharing keys. This combination of entanglement with mathematical properties of high order Fibonacci sequences provides the QKD protocol immunity to photon-number-splitting attacks and allows secure generation of long keys from few photons. Unlike other protocols, reference frame alignment and active modulation of production and detection bases are unnecessary.

  17. Secondary prevention through cardiac rehabilitation: physical activity counselling and exercise training: key components of the position paper from the Cardiac Rehabilitation Section of the European Association of Cardiovascular Prevention and Rehabilitation

    DEFF Research Database (Denmark)

    Corrà, Ugo; Piepoli, Massimo F; Carré, François

    2010-01-01

    , exercise training, diet/nutritional counselling, weight control management, lipid management, blood pressure monitoring, smoking cessation, and psychosocial management. Cardiac rehabilitation services are by definition multi-factorial and comprehensive, with physical activity counselling and exercise...... training as central components in all rehabilitation and preventive interventions. Many of the risk factor improvements occurring in CR can be mediated through exercise training programmes. This call-for-action paper presents the key components of a CR programme: physical activity counselling and exercise...

  18. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  19. An assessment of key health indicators among emergency medical services professionals.

    Science.gov (United States)

    Studnek, Jonathan R; Bentley, Melissa; Crawford, J Mac; Fernandez, Antonio R

    2010-01-01

    Ensuring the health and productivity of emergency medical services (EMS) professionals is important. However, there has been no known national baseline assessment of the health and wellness of EMS professionals in the United States. According to Healthy People 2010, top indicators of personal health include physical activity, body mass index (BMI), and smoking prevalence. The objectives of this study included quantifying existing health conditions and describing key health indicators among EMS professionals. It was hypothesized that work-life characteristics were associated with existing health conditions and key health indicators. Data utilized for this analysis were obtained from a 2007 questionnaire included in biennial national recertification packets. This questionnaire utilized validated items from the Behavioral Risk Factor Surveillance System (BRFSS) and the Longitudinal EMT Attributes and Demographics Study (LEADS). Along with common demographic characteristics, items inquired about existing health conditions (diabetes, asthma, hypertension, myocardial infarction, angina, stroke, and/or high blood cholesterol level), general health, physical activity, and smoking status. Descriptive analyses were performed utilizing chi-square tests, and logistic regression was utilized to describe associations between existing health conditions and the key health indicators. There were 58,435 individuals who became recertified in 2007, with 30,560 (52%) returning questionnaires. Individuals with missing data were removed, leaving 19,960 individual records. There were 4,681 (23.5%) individuals who reported at least one existing health condition. The mean BMI for the study participants was 27.69 kg/m(2). There were 5,742 (28.8%) individuals classified as having normal weight and 5,146 (25.8%) who were obese. The overwhelming majority of individuals did not meet the Centers for Disease Control and Prevention (CDC) recommendations for physical activity (15,022, 75.3%). There

  20. Analysis of the key enzymes of butyric and acetic acid fermentation in biogas reactors

    Science.gov (United States)

    Gabris, Christina; Bengelsdorf, Frank R; Dürre, Peter

    2015-01-01

    This study aimed at the investigation of the mechanisms of acidogenesis, which is a key process during anaerobic digestion. To expose possible bottlenecks, specific activities of the key enzymes of acidification, such as acetate kinase (Ack, 0.23–0.99 U mg−1 protein), butyrate kinase (Buk, biogas reactor content from three different biogas reactors. Furthermore, the detection of Ack was successful via Western blot analysis. Quantification of corresponding functional genes encoding Buk (buk) and But (but) was not feasible, although an amplification was possible. Thus, phylogenetic trees were constructed based on respective gene fragments. Four new clades of possible butyrate-producing bacteria were postulated, as well as bacteria of the genera Roseburia or Clostridium identified. The low Buk activity was in contrast to the high specific But activity in the analysed samples. Butyrate formation via Buk activity does barely occur in the investigated biogas reactor. Specific enzyme activities (Ack, Buk and But) in samples drawn from three different biogas reactors correlated with ammonia and ammonium concentrations (NH3 and NH4+-N), and a negative dependency can be postulated. Thus, high concentrations of NH3 and NH4+-N may lead to a bottleneck in acidogenesis due to decreased specific acidogenic enzyme activities. PMID:26086956

  1. Physical Activity Guidelines

    Science.gov (United States)

    ... use this site. health.gov Physical Activity Guidelines Physical Activity Physical activity is key to improving the health of the Nation. Based on the latest science, the Physical Activity Guidelines for Americans is an essential resource for ...

  2. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  3. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  4. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  5. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  6. Aloe arborescens aqueous gel extract alters the activities of key ...

    African Journals Online (AJOL)

    The present study investigated the antidiabetic activity and the possible mechanisms of action of aqueous extract of Aloe arborescens leaf gel (AALGEt) on normal and alloxan-induced diabetic rats. Diabetes was induced in 12 h fasted rats by intraperitoneal injection of 140 mg/kg body weight of alloxan. Blood glucose ...

  7. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  8. Prospecting and exploration of the Key Lake uranium deposits, Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Tan, B.H.

    1980-01-01

    The research activities which led to the detection of the Key Lake deposit and their model character for uranium prospecting in this area are discussed. The genesis of the ores and the surrounding rocks are described, and the possible genesis of the deposit is discussed on the basis of the present state of knowledge. (HP) [de

  9. Co-evolution of soil and water conservation policy and human-environment linkages in the Yellow River Basin since 1949

    NARCIS (Netherlands)

    Wang, F.; Mu, X.; Li, R.; Fleskens, L.; Stringer, L.C.; Ritsema, C.J.

    2015-01-01

    Policy plays a very important role in natural resource management as it lays out a government framework for guiding long-term decisions, and evolves in light of the interactions between human and environment. This paper focuses on soil and water conservation (SWC) policy in the Yellow River Basin

  10. Improving drought and salinity tolerance in barley by application of salicylic acid and potassium nitrate

    Directory of Open Access Journals (Sweden)

    Khalaf Ali Fayez

    2014-01-01

    Full Text Available Growth and physiological activities of barley (Hordeum vulgare L. cv. Gustoe grown in soil cultures were evaluated to recognize the ameliorative role of salicylic acid (SA and KNO3 against the negative effects of salt and water deficit stresses. Barley plants were subjected to three levels of NaCl (50, 100 and 150 mM, three levels of water stress (80%, 70% and 50% of the soil water content (SWC and the combination of 150 mM NaCl + 50 μM SA, 150 mM NaCl + 10 mM KNO3, 50% SWC + 50 μM SA and 50% SWC + 10 mM KNO3 for two weeks. Salt and water deficit stresses reduced the shoot growth, leaf photosynthetic pigments, K+ contents and provoked oxidative stress in leaves confirmed by considerable changes in soluble carbohydrate, proline, malondialdehyde (MDA, total phenolic compounds, antioxidant activity and Na+ contents. Leaf soluble protein of salt and water deficit treated plants was unaffected. The Na+/K+ ratio increased with increasing salt and water deficit treated plants. Application of 50 μM SA or 10 mM KNO3 to150 mM NaCl and/or 50% SWC treated plants improved these attributes under salt and water stresses. Soluble carbohydrates in stressed plants may have a significant role in osmotic adjustment. It can be concluded that the addition of SA or KNO3 can ameliorate the oxidative stress in barley stressed plants. This ameliorative effect might be maintained through low MDA contents and decreased Na+/K+ ratio in leaves. This study also provided evidence for the ability of barley cultivation in salt and water deficit soils due to its capacity for osmotic adjustment.

  11. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  12. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  13. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  14. The key role of extracellular vesicles in the metastatic process.

    Science.gov (United States)

    Zhao, Hongyun; Achreja, Abhinav; Iessi, Elisabetta; Logozzi, Mariantonia; Mizzoni, Davide; Di Raimo, Rossella; Nagrath, Deepak; Fais, Stefano

    2018-01-01

    Extracellular vesicles (EVs), including exosomes, have a key role in the paracrine communication between organs and compartments. EVs shuttle virtually all types of biomolecules such as proteins, lipids, nucleic acids, metabolites and even pharmacological compounds. Their ability to transfer their biomolecular cargo into target cells enables EVs to play a key role in intercellular communication that can regulate cellular functions such as proliferation, apoptosis and migration. This has led to the emergence of EVs as a key player in tumor growth and metastasis through the formation of "tumor niches" in target organs. Recent data have also been shown that EVs may transform the microenvironment of primary tumors thus favoring the selection of cancer cells with a metastatic behavior. The release of EVs from resident non-malignant cells may contribute to the metastatic processes as well. However, cancer EVs may induce malignant transformation in resident mesenchymal stem cells, suggesting that the metastatic process is not exclusively due to circulating tumor cells. In this review, we outline and discuss evidence-based roles of EVs in actively regulating multiple steps of the metastatic process and how we can leverage EVs to impair metastasis. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2015-01-01

    Full Text Available We present the first provably-secure three-party password-only authenticated key exchange (PAKE protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000 without any idealized assumptions on the cryptographic primitives used. We also investigate the security of the two-round, three-party PAKE protocol of Wang, Hu and Li (2010 and demonstrate that this protocol cannot achieve implicit key authentication in the presence of an active adversary.

  16. Hydrological regime as key to the morpho-texture and activity of braided streams

    Science.gov (United States)

    Storz-Peretz, Y.; Laronne, J. B.

    2012-04-01

    recession is responsible for deposition of finer sediment with minimal winnowing in the branch channels. Therefore, channels are finer-grained than the bars. This process is associated with the mid-channel deposition of central bars. However, the steeper chutes and coarser anabranches are associated with erosive braiding processes, such as chute cutoffs and multiple bar dissection, allowing winnowing to occur also during rapid recession. Hence coarser-grained anabranches in drylands are essentially chutes. Lengthy flow recession in humid braided channels allows winnowing of fines, thereby generating armored channels, the finer sedimentary particles often deposited downstream as unit bars. Therefore, channels are coarser-grained than the bars they surround. Even though the steep Saisera is in a humid region, its hydrological regime is ephemeral with rapid and short recessions, responsible for a morpho-texture similar to that of dryland braided streams. Hence, the hydrologic regimen is a key to understanding the morpho-textural character of braided channels and for the higher activity of the ephemeral unarmoured channels in sub-barful events compared to their humid counterparts.

  17. Biorthogonal moment expansions in coupled-cluster theory: Review of key concepts and merging the renormalized and active-space coupled-cluster methods

    International Nuclear Information System (INIS)

    Shen Jun; Piecuch, Piotr

    2012-01-01

    Graphical abstract: The key ideas behind biorthogonal moment expansions in coupled-cluster theory are discussed. Methods that enable merging active-space and renormalized coupled-cluster approaches are proposed and tested. Abstract: After reviewing recent progress in the area of the development of coupled-cluster (CC) methods for quasi-degenerate electronic states that are characterized by stronger non-dynamical correlation effects, including new generations of single- and multi-reference approaches that can handle bond breaking and excited states dominated by many-electron transitions, and after discussing the key elements of the left-eigenstate completely renormalized (CR) CC and equation-of-motion (EOM) CC methods, and the underlying biorthogonal method of moments of CC (MMCC) equations [P. Piecuch, M. Włoch, J. Chem. Phys. 123 (2005) 224105; P. Piecuch, M. Włoch, J.R. Gour, A. Kinal, Chem. Phys. Lett. 418 (2006) 467; M. Włoch, M.D. Lodriguito, P. Piecuch, J.R. Gour, Mol. Phys. 104 (2006) 2149], it is argued that it is beneficial to merge the CR-CC/EOMCC and active-space CC/EOMCC [P. Piecuch, Mol. Phys. 108 (2010) 2987, and references therein] theories into a single formalism. In order to accomplish this goal, the biorthogonal MMCC theory, which provides compact many-body expansions for the differences between the full configuration interaction and CC or, in the case of excited states, EOMCC energies, obtained using conventional truncation schemes in the cluster operator T and excitation operator R μ , is generalized, so that one can correct the CC/EOMCC energies obtained with arbitrary truncations in T and R μ for the selected many-electron correlation effects of interest. The resulting moment expansions, defining the new, Flexible MMCC (Flex-MMCC) formalism, and the ensuing CC(P; Q) hierarchy, proposed in the present work, enable one to correct energies obtained in the active-space CC and EOMCC calculations, in which one selects higher many

  18. Determining RUSLE P-factors for stonebunds and trenches in rangeland and cropland, Northern Ethiopia

    Science.gov (United States)

    Taye, Gebeyehu; Poesen, Jean; Vanmaercke, Matthias; Van Wesemael, Bas; Tesfay, Samuel; Teka, Daniel; Nyssen, Jan; Deckers, Jozef; Haregeweyn, Nigussie

    2017-04-01

    The implementation of soil and water conservation (SWC) measures in the Ethiopian highlands is a top priority to reduce soil erosion rates and to enhance the sustainability of agroecosystem. Nonetheless, the effectiveness of many of these measures for different hillslope and land use conditions remains currently poorly understood. As a result, the overall effects of these measures at regional or catchment scale remain hard to quantify. This study addresses this knowledge gap by determining the cover-management (C) and support practice (P) factors of the Revised Universal Soil Loss Equation (RUSLE), for commonly used SWC measures in semi-arid environments (i.e. stone bunds, trenches and a combination of both). Calculations were based on soil loss data collected with runoff plots in Tigray, northern Ethiopia (i.e. 21 runoff plots of 600 to 1000 m2, monitored during 2010, 2011 and 2012). The runoff plots were installed in rangeland and cropland sites corresponding to a gentle (5%), medium (12%) and steep (16%) slope gradients. The C and P factors of the RUSLE were calculated following the recommended standard procedures. Results show that the C-factor for rangeland ranges from 0.31 to 0.98 and from 0.06 to 0.39 for cropland. For rangeland, this large variability is due to variations in vegetation cover caused by grazing. In cropland, C-factors vary with tillage practices and crop types. The calculated P-factors ranged from 0.32 to 0.74 for stone bunds, from 0.07 to 0.65 for trenches and from 0.03 to 0.22 for a combination of both stone bunds and trenches. This variability is partly due to variations in the density of the implemented measures in relation to land use (cropland vs rangeland) and slope angles. However, also annual variations in P factor values are highly significant. Especially trenches showed a very significant decline of effectiveness over time, which is attributable to their reduced static storage capacity as a result of sediment deposition (e.g. for

  19. Key properties of expert movement systems in sport : an ecological dynamics perspective.

    Science.gov (United States)

    Seifert, Ludovic; Button, Chris; Davids, Keith

    2013-03-01

    This paper identifies key properties of expertise in sport predicated on the performer-environment relationship. Weaknesses of traditional approaches to expert performance, which uniquely focus on the performer and the environment separately, are highlighted by an ecological dynamics perspective. Key properties of expert movement systems include 'multi- and meta-stability', 'adaptive variability', 'redundancy', 'degeneracy' and the 'attunement to affordances'. Empirical research on these expert system properties indicates that skill acquisition does not emerge from the internal representation of declarative and procedural knowledge, or the imitation of expert behaviours to linearly reduce a perceived 'gap' separating movements of beginners and a putative expert model. Rather, expert performance corresponds with the ongoing co-adaptation of an individual's behaviours to dynamically changing, interacting constraints, individually perceived and encountered. The functional role of adaptive movement variability is essential to expert performance in many different sports (involving individuals and teams; ball games and outdoor activities; land and aquatic environments). These key properties signify that, in sport performance, although basic movement patterns need to be acquired by developing athletes, there exists no ideal movement template towards which all learners should aspire, since relatively unique functional movement solutions emerge from the interaction of key constraints.

  20. On the coupling between precipitation and potential evapotranspiration: contributions to decadal drought anomalies in the Southwest China

    Science.gov (United States)

    Shanlei Sun; Haishan Chen; Weimin Ju; Guojie Wang; Ge Sun; Jin Huang; Hedi Ma; Chujie Gao; Wenjian Hua; Guixia Yan

    2016-01-01

    Under the exacerbation of climate change, cli· mate extreme events. especially for drought, happened frequently and intensively across the globe with greater spatial differences. We used the Standardized Precipitation-Evapotranspiration Index computed from the routine meteorological observations at 269 sites in Southwest China (SWC) to study the drought characteristics...

  1. Implications of market access on soil and water conservation ...

    African Journals Online (AJOL)

    Market access is one of the motivating mechanisms for farmers to invest in soil and water conservation (SWC). Areas of relatively high agricultural potential but remote from major markets face numerous challenges in marketing their outputs. The objective of this study was to explore the market access determinants of farmer ...

  2. EST Table: CK503389 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available CK503389 rswcc0_003345.y1 10/09/29 66 %/142 aa ref|XP_002423503.1| mandelate racema...se, putative [Pediculus humanus corporis] gb|EEB10765.1| mandelate racemase, putative [Pediculus humanus cor...ref|XP_972041.1| PREDICTED: similar to mandelate racemase [Tribolium castaneum] FS795479 swc ...

  3. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  4. Key asset - inherent safety of LMFBR Pool Plant

    International Nuclear Information System (INIS)

    Marchaterre, J.F.; Sevy, R.H.; Lancet, R.T.; Mills, J.C.

    1984-04-01

    The safety approach used in the design of the Large Pool Plant emphasizes use of the intrinsic characteristics of Liquid Metal Fast Breeder Reactors to incorporate a high degree of safety in the design and reduce cost by providing simpler (more reliable) dedicated safety systems. Correspondingly, a goal was not to require the action of active systems to prevent significant core damage and/or provide large grace periods for all anticipated transients. The key safety features of the plant are presented and the analysis of representative flow and power transients are presented to show that the design goal has been satisfied

  5. Key asset--Inherent safety of LFMBR pool plant

    International Nuclear Information System (INIS)

    Marchaterre, J.F.; Lancet, R.T.; Mills, J.C.; Sevy, R.H.

    1984-01-01

    The safety approach used in the design of the Large Pool Plant emphasizes use of the intrinsic characteristics of Liquid Metal Fast Breeder Reactors to incorporate a high degree of safety in the design and reduce cost by providing simpler (more reliable) dedicated safety systems. Correspondingly, a goal was not to require the action of active systems to prevent significant core damage and/or provide large grace periods for all anticipated transients. The key safety features of the plant are presented and the analysis of representative flow and power transients are presented to show that the design goal has been satisfied

  6. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  7. The interleukin (IL-1a precursor is biologically active and is likely a key alarmin in the IL-1 family of cytokines

    Directory of Open Access Journals (Sweden)

    Busun eKim

    2013-11-01

    Full Text Available Among the eleven members of the IL-1 family cytokines, the precursors of IL-1a, IL-1b, and IL-33 have relatively long N-terminal pro-sequences of approximately one hundred amino acid residues prior to the N-terminus of the mature forms. Compared to the mature forms secreted from the cell, 80-90% of the primary translation product is in the intracellular compartment in the precursor form. However, the precursors are readily released from cells during infections but also with non-infectious conditions such a hypoxia and trauma. In this setting, the precursors act rapidly as alarmins in the absence of a processing mechanism to remove the pro-sequence and generate a mature form. In the case of IL-1a, the release of the precursor activates adjacent cells via receptor-mediated signaling. However, there are no data comparing the specific activity of the IL-1a precursor to the mature form. In the present study, we compared the precursor and mature forms of recombinant human IL-1a, IL-1b and IL-33 proteins on the induction of cytokines from A549 cells as well as from human peripheral blood mononuclear cells (PBMC. Similar to the mature form, the IL-1a precursor was active in inducing IL 6 and TNFa, whereas the precursor forms of IL 1b and IL-33 were not active. On PBMC, precursor and mature IL-1a at 0.04 and 0.2 nano-mole were equally active in inducing IL-6. Given the fact that during necrotic cell death, the IL-1a precursor is released intact and triggers IL-1 receptors on tissue macrophages, these data identify the precursor form of IL-1a as a key player in sterile inflammation.

  8. FEVER AS KEY SYMPTOM OF ACUTE RESPIRATORY INFECTIONS AND MODERN METHODS OF THERAPY FOR HIGH TEMPERATURE IN CHILDREN

    Directory of Open Access Journals (Sweden)

    O.A. Solntseva

    2010-01-01

    Full Text Available Hyperthermia is the key symptom of acute respiratory infections (ARI. An increase in the body temperature is accompanied with phagocytosis activation, increased interferon synthesis, antibody genesis stimulation, lymphocytes activation and differentiation. Nevertheless, significant hyperthermia may result in my unfavourable consequences. It may particularly cause an exacerbation of chronic diseases. Modern therapy for hyperthermia is, therefore, an important aspect of treating children with ARI. The article outlines the modern approach to treating fever in children, identifies key criteria for selecting a medication. It also contains a case study of applying ibuprofen and data from various trials which verify the rationale for applying ibuprofen in children with hyperthermia that developed in conjunction with ARI.Key words: children, acute respiratory infections, hyperthermia, ibuprofen.(Voprosy sovremennoi pediatrii — Current Pediatrics. 2010;9(5:80-84

  9. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  10. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  11. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  12. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  13. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  14. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  15. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  16. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  17. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  18. Quantification of the Impact of Integrated Soil and Water ...

    African Journals Online (AJOL)

    Bheema

    can be retained by these physical measures were computed using the measured dimensions of the structures (Table 1). Table 1. Physical conservation measures and actual volume of surface runoff that can be contained by the structures (as it was measured in April 2012). No. Type of physical SWC Unit Volume of work.

  19. Relationships between fluid pressure and capillary pressure in ...

    African Journals Online (AJOL)

    In this work, the Bower's and Gardner's technique of velocity-to fluid pressure gradient methods were applied on seismic reflection data in order to predict fluid pressure of an X- oil field in Niger Delta Basin. Results show significant deflection common with fluid pressure zones . With average connate water saturation Swc ...

  20. Supply capability creation process: Key milestone criteria and activities

    Energy Technology Data Exchange (ETDEWEB)

    Verrollot, J.; Tolonen, A.; Harkonen, J.; Haapasalo, H.

    2017-07-01

    The article focuses on supply capability creation (SCC) within the new product development (NPD). The purpose is to establish an SCC process describing the main SCC activities and milestone criteria in preparing the supply process for new products Design/methodology/approach: The article analyses the earlier research, carries out current state analysis of six case companies regarding the SCC areas, and proposes a SCC process. Findings: The developed SCC process aims at preparing the operational supply capability for a developed new product based on the preferred, qualified and contracted suppliers and materials along the NPD process, and ultimately at the product ramp-up. Originality/value: This paper introduces a SCC process that has not been presented earlier in the literature, highlighting the important role of the SCC for successful product ramp-ups.

  1. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  2. Robust de novo pathway enrichment with KeyPathwayMiner 5

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; List, Markus; Dissing-Hansen, Martin

    2016-01-01

    Identifying functional modules or novel active pathways, recently termed de novo pathway enrichment, is a computational systems biology challenge that has gained much attention during the last decade. Given a large biological interaction network, KeyPathwayMiner extracts connected subnetworks tha...

  3. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  4. Biomechanical loading on the upper extremity increases from single key tapping to directional tapping.

    Science.gov (United States)

    Qin, Jin; Trudeau, Matthieu; Katz, Jeffrey N; Buchholz, Bryan; Dennerlein, Jack T

    2011-08-01

    Musculoskeletal disorders associated with computer use span the joints of the upper extremity. Computing typically involves tapping in multiple directions. Thus, we sought to describe the loading on the finger, wrist, elbow and shoulder joints in terms of kinematic and kinetic difference across single key switch tapping to directional tapping on multiple keys. An experiment with repeated measures design was conducted. Six subjects tapped with their right index finger on a stand-alone number keypad placed horizontally in three conditions: (1) on single key switch (the number key 5); (2) left and right on number key 4 and 6; (3) top and bottom on number key 8 and 2. A force-torque transducer underneath the keypad measured the fingertip force. An active-marker infrared motion analysis system measured the kinematics of the fingertip, hand, forearm, upper arm and torso. Joint moments for the metacarpophalangeal, wrist, elbow, and shoulder joints were estimated using inverse dynamics. Tapping in the top-bottom orientation introduced the largest biomechanical loading on the upper extremity especially for the proximal joint, followed by tapping in the left-right orientation, and the lowest loading was observed during single key switch tapping. Directional tapping on average increased the fingertip force, joint excursion, and peak-to-peak joint torque by 45%, 190% and 55%, respectively. Identifying the biomechanical loading patterns associated with these fundamental movements of keying improves the understanding of the risks of upper extremity musculoskeletal disorders for computer keyboard users. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. Nine key principles to guide youth mental health: development of service models in New South Wales.

    Science.gov (United States)

    Howe, Deborah; Batchelor, Samantha; Coates, Dominiek; Cashman, Emma

    2014-05-01

    Historically, the Australian health system has failed to meet the needs of young people with mental health problems and mental illness. In 2006, New South Wales (NSW) Health allocated considerable funds to the reform agenda of mental health services in NSW to address this inadequacy. Children and Young People's Mental Health (CYPMH), a service that provides mental health care for young people aged 12-24 years, with moderate to severe mental health problems, was chosen to establish a prototype Youth Mental Health (YMH) Service Model for NSW. This paper describes nine key principles developed by CYPMH to guide the development of YMH Service Models in NSW. A literature review, numerous stakeholder consultations and consideration of clinical best practice were utilized to inform the development of the key principles. Subsequent to their development, the nine key principles were formally endorsed by the Mental Health Program Council to ensure consistency and monitor the progress of YMH services across NSW. As a result, between 2008 and 2012 YMH Services across NSW regularly reported on their activities against each of the nine key principles demonstrating how each principle was addressed within their service. The nine key principles provide mental health services a framework for how to reorient services to accommodate YMH and provide a high-quality model of care. [Corrections added on 29 November 2013, after first online publication: The last two sentences of the Results section have been replaced with "As a result, between 2008 and 2012 YMH Services across NSW regularly reported on their activities against each of the nine key principles demonstrating how each principle was addressed within their service."]. © 2013 Wiley Publishing Asia Pty Ltd.

  6. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  7. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  8. THE KEY ACTIVITIES OF GREEN LOGISTICS MANAGEMENT IN THE THAI AUTOMOTIVE INDUSTRY

    OpenAIRE

    Thanyaphat Muangpan; Mana Chaowarat; Jutaporn Neamvonk

    2016-01-01

    Thai automotive industry needs to be developed for understanding activities management on inbound logistics that is an essential element of business operations for a manufacturing firm. The purpose of research is to study the main activities of green logistics management (inbound logistics) in the Thai automotive industry. Survey research was used in this study to collect data by sampling from the people in the field of logistics and environmental management of Thai automotive industry to exa...

  9. Supply capability creation process: Key milestone criteria and activities

    Directory of Open Access Journals (Sweden)

    Jordan Verrollot

    2017-09-01

    Full Text Available Purpose: The article focuses on supply capability creation (SCC within the new product development (NPD. The purpose is to establish an SCC process describing the main SCC activities and milestone criteria in preparing the supply process for new products Design/methodology/approach: The article analyses the earlier research, carries out current state analysis of six case companies regarding the SCC areas, and proposes a SCC process. Findings: The developed SCC process aims at preparing the operational supply capability for a developed new product based on the preferred, qualified and contracted suppliers and materials along the NPD process, and ultimately at the product ramp-up. Originality/value: This paper introduces a SCC process that has not been presented earlier in the literature, highlighting the important role of the SCC for successful product ramp-ups.

  10. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  11. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  12. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  13. The Effect of Community-Based Soil and Water Conservation Practices on Abundance and Diversity of Soil Macroinvertebrates in the Northern Highlands of Ethiopia

    Directory of Open Access Journals (Sweden)

    Mengistu Welemariam

    2018-04-01

    Full Text Available Soil and water conservation (SWC practices in the northern highlands of Ethiopia have important implications for land restoration and biodiversity recovery. The present study determined soil macroinvertebrate (SMI abundance and diversity in response to spatial conditions i.e., generated by different conservation practices, soil depth, and temporal seasonality with the wet and dry season. The SWC practices considered were exclosure + terrace, exclosure alone, terraces, and non-conserved grazing lands. Each SWC measure was selected in three sites that were considered as replications due to low heterogeneity in terms of human and livestock disturbances and biophysical factors. Soil macroinvertebrates were collected using a monolith according to tropical soil biology and fertility (TSBF method. The highest density (55% of SMI was found in exclosures followed by terraces 26%. Non-conserved communal grazing lands account for only 19% of the total. Shannon diversity index was significantly (P < 0.05 higher (1.21 in the exclosures supported with terraces and the lowest (0.9 was observed in the non-conserved communal grazing lands. Diversity was also significantly (P < 0.05 higher (1.26 in wet than dry season (0.70. The highest (41% Sorensen similarity index among SMI was found between exclosures with terraces and exclosures alone during the wet season. The lowest (20% Sorensen similarity index was found between terraces alone and exclosures with terraces in dry season. Soil macroinvertebrate abundance was higher in upper (0–10 cm than lower (10–20 and 20–30 cm soil depth. Soil macroinvertebrate abundance was positively and strongly correlated with soil moisture (R2 = 0.85 and soil organic carbon stock (R2 = 0.95. However, it was negatively (R2 = −0.71 correlated with bulk density. Generally, the abundance and diversity of SMI increased as exclosures and communal grazing lands are supported with terraces.

  14. Automated general temperature correction method for dielectric soil moisture sensors

    Science.gov (United States)

    Kapilaratne, R. G. C. Jeewantinie; Lu, Minjiao

    2017-08-01

    An effective temperature correction method for dielectric sensors is important to ensure the accuracy of soil water content (SWC) measurements of local to regional-scale soil moisture monitoring networks. These networks are extensively using highly temperature sensitive dielectric sensors due to their low cost, ease of use and less power consumption. Yet there is no general temperature correction method for dielectric sensors, instead sensor or site dependent correction algorithms are employed. Such methods become ineffective at soil moisture monitoring networks with different sensor setups and those that cover diverse climatic conditions and soil types. This study attempted to develop a general temperature correction method for dielectric sensors which can be commonly used regardless of the differences in sensor type, climatic conditions and soil type without rainfall data. In this work an automated general temperature correction method was developed by adopting previously developed temperature correction algorithms using time domain reflectometry (TDR) measurements to ThetaProbe ML2X, Stevens Hydra probe II and Decagon Devices EC-TM sensor measurements. The rainy day effects removal procedure from SWC data was automated by incorporating a statistical inference technique with temperature correction algorithms. The temperature correction method was evaluated using 34 stations from the International Soil Moisture Monitoring Network and another nine stations from a local soil moisture monitoring network in Mongolia. Soil moisture monitoring networks used in this study cover four major climates and six major soil types. Results indicated that the automated temperature correction algorithms developed in this study can eliminate temperature effects from dielectric sensor measurements successfully even without on-site rainfall data. Furthermore, it has been found that actual daily average of SWC has been changed due to temperature effects of dielectric sensors with a

  15. Executing on Integration: The Key to Success in Mergers and Acquisitions.

    Science.gov (United States)

    Bradley, Carol

    2016-01-01

    Health care mergers and acquisitions require a clearly stated vision and exquisite planning of integration activities to provide the best possible conditions for a successful transaction. During the due diligence process, key steps can be taken to create a shared vision and a plan to inspire confidence and build enthusiasm for all stakeholders. Integration planning should include a defined structure, roles and responsibilities, as well as a method for evaluation.

  16. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  17. Same pattern, different mechanism: Locking onto the role of key species in seafloor ecosystem process.

    Science.gov (United States)

    Woodin, Sarah Ann; Volkenborn, Nils; Pilditch, Conrad A; Lohrer, Andrew M; Wethey, David S; Hewitt, Judi E; Thrush, Simon F

    2016-05-27

    Seafloor biodiversity is a key mediator of ecosystem functioning, but its role is often excluded from global budgets or simplified to black boxes in models. New techniques allow quantification of the behavior of animals living below the sediment surface and assessment of the ecosystem consequences of complex interactions, yielding a better understanding of the role of seafloor animals in affecting key processes like primary productivity. Combining predictions based on natural history, behavior of key benthic species and environmental context allow assessment of differences in functioning and process, even when the measured ecosystem property in different systems is similar. Data from three sedimentary systems in New Zealand illustrate this. Analysis of the behaviors of the infaunal ecosystem engineers in each system revealed three very different mechanisms driving ecosystem function: density and excretion, sediment turnover and surface rugosity, and hydraulic activities and porewater bioadvection. Integrative metrics of ecosystem function in some cases differentiate among the systems (gross primary production) and in others do not (photosynthetic efficiency). Analyses based on behaviors and activities revealed important ecosystem functional differences and can dramatically improve our ability to model the impact of stressors on ecosystem and global processes.

  18. APAF1 is a key transcriptional target for p53 in the regulation of neuronal cell death

    DEFF Research Database (Denmark)

    Fortin, A; Cregan, S P; MacLaurin, J G

    2001-01-01

    p53 is a transcriptional activator which has been implicated as a key regulator of neuronal cell death after acute injury. We have shown previously that p53-mediated neuronal cell death involves a Bax-dependent activation of caspase 3; however, the transcriptional targets involved in the regulati...

  19. Toluene removal from sandy soils via in situ technologies with an emphasis on factors influencing soil vapor extraction.

    Science.gov (United States)

    Amin, Mohammad Mehdi; Hatamipour, Mohammad Sadegh; Momenbeik, Fariborz; Nourmoradi, Heshmatollah; Farhadkhani, Marzieh; Mohammadi-Moghadam, Fazel

    2014-01-01

    The integration of bioventing (BV) and soil vapor extraction (SVE) appears to be an effective combination method for soil decontamination. This paper serves two main purposes: it evaluates the effects of soil water content (SWC) and air flow rate on SVE and it investigates the transition regime between BV and SVE for toluene removal from sandy soils. 96 hours after air injection, more than 97% removal efficiency was achieved in all five experiments (carried out for SVE) including 5, 10, and 15% for SWC and 250 and 500 mL/min for air flow rate on SVE. The highest removal efficiency (>99.5%) of toluene was obtained by the combination of BV and SVE (AIBV: Air Injection Bioventing) after 96 h of air injection at a constant flow rate of 250 mL/min. It was found that AIBV has the highest efficiency for toluene removal from sandy soils and can remediate the vadose zone effectively to meet the soil guideline values for protection of groundwater.

  20. Toluene Removal from Sandy Soils via In Situ Technologies with an Emphasis on Factors Influencing Soil Vapor Extraction

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdi Amin

    2014-01-01

    Full Text Available The integration of bioventing (BV and soil vapor extraction (SVE appears to be an effective combination method for soil decontamination. This paper serves two main purposes: it evaluates the effects of soil water content (SWC and air flow rate on SVE and it investigates the transition regime between BV and SVE for toluene removal from sandy soils. 96 hours after air injection, more than 97% removal efficiency was achieved in all five experiments (carried out for SVE including 5, 10, and 15% for SWC and 250 and 500 mL/min for air flow rate on SVE. The highest removal efficiency (>99.5% of toluene was obtained by the combination of BV and SVE (AIBV: Air Injection Bioventing after 96 h of air injection at a constant flow rate of 250 mL/min. It was found that AIBV has the highest efficiency for toluene removal from sandy soils and can remediate the vadose zone effectively to meet the soil guideline values for protection of groundwater.

  1. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  2. HPLC-DAD fingerprinting analysis, antioxidant activities of Tithonia diversifolia (Hemsl.) A. Gray leaves and its inhibition of key enzymes linked to Alzheimer's disease.

    Science.gov (United States)

    Ojo, Oluwafemi Adeleke; Ojo, Adebola Busola; Ajiboye, Basiru Olaitan; Olaiya, Oluranti; Okesola, Mary Abiola; Boligon, Aline Augusti; de Campos, Marli Matiko Anraku; Oyinloye, Babatunji Emmanuel; Kappo, Abidemi Paul

    2018-01-01

    Tithonia diversifolia (Hemsl.) A. Gray leaves have long been used to manage neurodegenerative diseases without scientific basis. This study characterized the phenolic constituents, evaluated the antioxidant properties of phenolic extracts from T. diversifolia leaves used as traditional medicine in Africa and its inhibition of key enzymes linked to Alzheimer's disease. The extract was rich in phenolic acids (gallic acid, chlorogenic acid, caffeic acid and p -coumaric acid) and flavonoids (apigenin) and had 1,1-diphenyl-2-picryl-hydrazil radical scavenging abilities (IC 50  = 41.05 μg. mL -1 ), 2,2-Azino-bis3-ethylbenthiazoline-6sulphonic acid radical scavenging ability (IC 50  = 33.51 μg. mL -1 ), iron chelation (IC 50  = 38.50 μg. mL -1 ), reducing power (Fe 3+ - Fe 2+ ) (7.34 AAEmg/100 g), inhibited acetylcholinesterase (IC 50  = 39.27 μg mL -1 ) and butyrylcholinesterase (IC 50  = 35.01 μg mL -1 ) activities. These results reveal the leaf as a rich source of phenolic compounds with antioxidant and cholinesterase inhibitory activity.

  3. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  4. Progress on the Studies of the Key Enzymes of Ginsenoside Biosynthesis

    Directory of Open Access Journals (Sweden)

    Jin-Ling Yang

    2018-03-01

    Full Text Available As the main bioactive constituents of Panax species, ginsenosides possess a wide range of notable medicinal effects such as anti-cancer, anti-oxidative, antiaging, anti-inflammatory, anti-apoptotic and neuroprotective activities. However, the increasing medical demand for ginsenosides cannot be met due to the limited resource of Panax species and the low contents of ginsenosides. In recent years, biotechnological approaches have been utilized to increase the production of ginsenosides by regulating the key enzymes of ginsenoside biosynthesis, while synthetic biology strategies have been adopted to produce ginsenosides by introducing these genes into yeast. This review summarizes the latest research progress on cloning and functional characterization of key genes dedicated to the production of ginsenosides, which not only lays the foundation for their application in plant engineering, but also provides the building blocks for the production of ginsenosides by synthetic biology.

  5. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  6. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  7. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  8. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    Science.gov (United States)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  9. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  10. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  11. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  12. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  13. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  14. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  15. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  16. Comparing the Sensitivity Performance of the Sallen-Key and the Delyiannis-Friend Biquad

    DEFF Research Database (Denmark)

    Gaunholt, Hans; Guldbrandsen, Birthe; Gaunholt, Hans

    1997-01-01

    In this paper it is shown, that even in the high-Q and medium-Q case it is possible to design the Sallen-Key bandpass biquad with just as small active as well as passive sensitivities as those for the Delyiannis-Friend biquad, which generally is considered to be the most versatile single amplifie...

  17. Actual evapotranspiration in drylands from in-situ and satellite data

    DEFF Research Database (Denmark)

    Garcia Garcia, Monica; Sandholt, Inge; Ceccato, Pietro

    2013-01-01

    satisfactory results for ¿¿ at the Sahelian savanna, comparable to parameterizations using field-measured Soil Water Content (SWC) with r2 greater than 0.80. In the Mediterranean grasslands however, with much lower daily ¿E values, model results were not as good as in the Sahel (r2 = 0.57–0.31) but still...

  18. Executive Headteachers: What's in a Name? Executive Summary

    Science.gov (United States)

    Theobald, Katy; Lord, Pippa

    2016-01-01

    Executive headteachers (EHTs) are becoming increasingly prevalent as the self-improving school system matures; there are over 620 EHTs in the school workforce today; and the number recorded in the School Workforce Census (SWC) has increased by 240 per cent between 2010 and 2014. The role is still evolving locally and nationally and, as EHTs take…

  19. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  20. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    Science.gov (United States)

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  1. Understanding price elasticities to inform public health research and intervention studies: key issues.

    Science.gov (United States)

    Nghiem, Nhung; Wilson, Nick; Genç, Murat; Blakely, Tony

    2013-11-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies.

  2. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  3. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  4. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  5. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  6. Addressing key concepts in physical geography through interactive learning activities in an online geo-ICT environment

    Science.gov (United States)

    Verstraeten, Gert; Steegen, An; Martens, Lotte

    2016-04-01

    The increasing number of geospatial datasets and free online geo-ICT tools offers new opportunities for education in Earth Sciences. Geospatial technology indeed provides an environment through which interactive learning can be introduced in Earth Sciences curricula. However, the effectiveness of such e-learning approaches in terms of learning outcomes has rarely been addressed. Here, we present our experience with the implementation of digital interactive learning activities within an introductory Physical Geography course attended by 90 undergraduate students in Geography, Geology, Biology and Archaeology. Two traditional lectures were replaced by interactive sessions (each 2 h) in a flexible classroom where students had to work both in team and individually in order to explore some key concepts through the integrated use of geospatial data within Google EarthTM. A first interactive lesson dealt with the classification of river systems and aimed to examine the conditions under which rivers tend to meander or to develop a braided pattern. Students were required to collect properties of rivers (river channel pattern, channel slope, climate, discharge, lithology, vegetation, etc). All these data are available on a global scale and have been added as separate map layers in Google EarthTM. Each student collected data for at least two rivers and added this information to a Google Drive Spreadsheet accessible to the entire group. This resulted in a database of more than one hundred rivers spread over various environments worldwide. In a second phase small groups of students discussed the potential relationships between river channel pattern and its controlling factors. Afterwards, the findings of each discussion group were presented to the entire audience. The same set-up was followed in a second interactive session to explore spatial variations in ecosystem properties such as net primary production and soil carbon content. The qualitative evaluation of both interactive

  7. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  8. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  9. Recognition of key regions for restoration of phytoplankton communities in the Huai River basin, China

    Science.gov (United States)

    Zhao, Changsen; Liu, Changming; Xia, Jun; Zhang, Yongyong; Yu, Qiang; Eamus, Derek

    2012-02-01

    SummaryHealthy phytoplankton communities are the basis of healthy water ecosystems, and form the foundation of many freshwater food webs. Globally many freshwater ecosystems are degraded because of intensive human activities, so water ecosystem restoration is a burning issue worldwide. Selection of key regions for phytoplankton-related restoration is crucial for an effective aquatic eco-restoration. This paper presents a practical method for identification of key regions for phytoplankton-related restoration, using random forests (RFs) method to cluster sites based on dominance, biodiversity, water chemistry and ecological niche. We sampled phytoplankton for species richness and relative abundance and water quality in the Huai River basin (HRB), China to determine the phytoplankton communities' composition and structure and characterize of their ecological niches. A wider mean niche breadth of a species usually leads to a greater overlap with the niche of other species. Using these data and water quality indices, we identified the key regions for phytoplankton-related river restoration activities. Results indicate that our method for recognition of key regions is effective and practical and its application to the HRB identified the Northern Plain area as the key region for restoration. This area is severely polluted and contributes significantly to the HRB phytoplankton communities. Phytoplankton in this region is highly adaptable to environmental change and therefore will be relatively unharmed by environmental instability induced by restoration measures. During restoration, indices of water temperature, total phosphorus and chemical oxygen demand can be altered with little negative influence on phytoplankton communities, but measures that increase ammonia-nitrogen concentration would be highly detrimental. These results will provide valuable information for policy makers and stakeholders in water ecosystem restoration and sustainable basin management in the HRB.

  10. Key factors regulating the mass delivery of macromolecules to model cell membranes

    DEFF Research Database (Denmark)

    Campbell, Richard A.; Watkins, Erik B.; Jagalski, Vivien

    2014-01-01

    We show that both gravity and electrostatics are key factors regulating interactions between model cell membranes and self-assembled liquid crystalline aggregates of dendrimers and phospholipids. The system is a proxy for the trafficking of reservoirs of therapeutic drugs to cell membranes for slow...... of the aggregates to activate endocytosis pathways on specific cell types is discussed in the context of targeted drug delivery applications....

  11. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  12. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  13. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  14. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  15. Law on the peaceful uses of nuclear energy: key concepts

    International Nuclear Information System (INIS)

    Pompignan, D. de

    2005-01-01

    The key concepts which ought to be included in legislation governing the peaceful uses of nuclear energy can be divided into two categories depending on whether they derive from the fundamental principles of nuclear law or reflect categories of general law. Their inclusion results in compliance with a shared obligation when they derive from a binding international instrument. It also permits the transposition into law of broader nuclear concepts and principles, and the more specific characteristics of a general nuclear law, which is to lay down priorities. When the resulting classification is tested in reality, we can see that it is difficult to measure the effectiveness of the two concept categories inasmuch as this depends not only on quantifiable and controllable legal elements but also on non-legal behavioural factors, an obvious example of which is safety culture. Once the difficulties of defining a legal framework for nuclear activities and selecting the key concepts to guide them are known, the inclusion of a concept in a general nuclear law is determined by national legal and ethical considerations. Thus, a general nuclear law should indicate the way in which the legal principles which reflect various prevailing ethical imperatives with regard to the environment, participation, and public interest, are applicable to the development of the peaceful uses of nuclear energy, having regard to the national specificities of each country and the particular nature of these activities. This means that there is a need to find original legal solutions reconciling the constraints of a specific law with the requirements of the ordinary law, i.e. the key concepts deriving from the principles of nuclear law. Given the possible reluctance of lawmakers to commit themselves for the future by formulating detailed provisions valid over the long term, it has been suggested that a code of good practice for the nuclear industry should be introduced which would go beyond the

  16. Achieving organizational alignment - key to survival

    International Nuclear Information System (INIS)

    Allison, J.T.

    1997-01-01

    The restructuring of the gas and electric industry and the impact of the restructuring on organizational survival was discussed. The forces driving the trend to restructuring are commoditization of energy, demanding, fragmented customer needs, diverse, transforming technologies, and intense competition. Realigning a company to the changing marketplace is the key to survival with customers, financial markets, and with competition. This paper presented a reality-based, results oriented approach to strategy consulting. Four case studies - Telco, Natural gas holding company, Combined utility, and Duke/Louis Dreyfus - were used for illustrating different problems and different approaches to restructuring. In each case a comparison was made between the company's old organization in the early 1990's, the driving forces responsible for the change and the company's new organization in the mid 1990's. In all cases the predominance of the customer focus is quite apparent, as is the clear lines of demarcation between regulated and unregulated activities. The underlying theme in all restructuring is agility and striving for flexibility

  17. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  18. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  19. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  20. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  1. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  2. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    Science.gov (United States)

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  3. Characterization of Available Light for Seagrass and Patch Reef Productivity in Sugarloaf Key, Lower Florida Keys

    Directory of Open Access Journals (Sweden)

    Gerardo Toro-Farmer

    2016-01-01

    Full Text Available Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively. Higher photosynthetic active radiation (PAR levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  4. Benefits of biochar, compost and biochar–compost for soil quality, maize yield and greenhouse gas emissions in a tropical agricultural soil

    International Nuclear Information System (INIS)

    Agegnehu, Getachew; Bass, Adrian M.; Nelson, Paul N.; Bird, Michael I.

    2016-01-01

    Soil quality decline represents a significant constraint on the productivity and sustainability of agriculture in the tropics. In this study, the influence of biochar, compost and mixtures of the two on soil fertility, maize yield and greenhouse gas (GHG) emissions was investigated in a tropical Ferralsol. The treatments were: 1) control with business as usual fertilizer (F); 2) 10 t ha"−"1 biochar (B) + F; 3) 25 t ha"−"1 compost (Com) + F; 4) 2.5 t ha"−"1 B + 25 t ha"−"1 Com mixed on site + F; and 5) 25 t ha"−"1 co-composted biochar–compost (COMBI) + F. Total aboveground biomass and maize yield were significantly improved relative to the control for all organic amendments, with increases in grain yield between 10 and 29%. Some plant parameters such as leaf chlorophyll were significantly increased by the organic treatments. Significant differences were observed among treatments for the δ"1"5N and δ"1"3C contents of kernels. Soil physicochemical properties including soil water content (SWC), total soil organic carbon (SOC), total nitrogen (N), available phosphorus (P), nitrate-nitrogen (NO_3"− N), ammonium-nitrogen (NH_4"+-N), exchangeable cations and cation exchange capacity (CEC) were significantly increased by the organic amendments. Maize grain yield was correlated positively with total biomass, leaf chlorophyll, foliar N and P content, SOC and SWC. Emissions of CO_2 and N_2O were higher from the organic-amended soils than from the fertilizer-only control. However, N_2O emissions generally decreased over time for all treatments and emission from the biochar was lower compared to other treatments. Our study concludes that the biochar and biochar–compost-based soil management approaches can improve SOC, soil nutrient status and SWC, and maize yield and may help mitigate greenhouse gas emissions in certain systems. - Graphical abstract: Grain yield, cation exchange capacity (CEC), soil organic carbon (SOC), soil water content (SWC) and N_2O

  5. Benefits of biochar, compost and biochar–compost for soil quality, maize yield and greenhouse gas emissions in a tropical agricultural soil

    Energy Technology Data Exchange (ETDEWEB)

    Agegnehu, Getachew [College of Science, Technology and Engineering, Centre for Tropical Environmental and Sustainability Science, James Cook University, PO Box 6811, Cairns, Queensland 4870 (Australia); Bass, Adrian M. [Hawkesbury Institute for the Environment, University of Western Sydney, Science Road, Richmond, New South Wales 2753 (Australia); Nelson, Paul N.; Bird, Michael I. [College of Science, Technology and Engineering, Centre for Tropical Environmental and Sustainability Science, James Cook University, PO Box 6811, Cairns, Queensland 4870 (Australia)

    2016-02-01

    Soil quality decline represents a significant constraint on the productivity and sustainability of agriculture in the tropics. In this study, the influence of biochar, compost and mixtures of the two on soil fertility, maize yield and greenhouse gas (GHG) emissions was investigated in a tropical Ferralsol. The treatments were: 1) control with business as usual fertilizer (F); 2) 10 t ha{sup −1} biochar (B) + F; 3) 25 t ha{sup −1} compost (Com) + F; 4) 2.5 t ha{sup −1} B + 25 t ha{sup −1} Com mixed on site + F; and 5) 25 t ha{sup −1} co-composted biochar–compost (COMBI) + F. Total aboveground biomass and maize yield were significantly improved relative to the control for all organic amendments, with increases in grain yield between 10 and 29%. Some plant parameters such as leaf chlorophyll were significantly increased by the organic treatments. Significant differences were observed among treatments for the δ{sup 15}N and δ{sup 13}C contents of kernels. Soil physicochemical properties including soil water content (SWC), total soil organic carbon (SOC), total nitrogen (N), available phosphorus (P), nitrate-nitrogen (NO{sub 3}{sup −} N), ammonium-nitrogen (NH{sub 4}{sup +}-N), exchangeable cations and cation exchange capacity (CEC) were significantly increased by the organic amendments. Maize grain yield was correlated positively with total biomass, leaf chlorophyll, foliar N and P content, SOC and SWC. Emissions of CO{sub 2} and N{sub 2}O were higher from the organic-amended soils than from the fertilizer-only control. However, N{sub 2}O emissions generally decreased over time for all treatments and emission from the biochar was lower compared to other treatments. Our study concludes that the biochar and biochar–compost-based soil management approaches can improve SOC, soil nutrient status and SWC, and maize yield and may help mitigate greenhouse gas emissions in certain systems. - Graphical abstract: Grain yield, cation exchange capacity (CEC), soil

  6. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  7. Astrocytes play a key role in activation of microglia by persistent Borna disease virus infection

    Directory of Open Access Journals (Sweden)

    Sauder Christian

    2008-11-01

    Full Text Available Abstract Neonatal Borna disease virus (BDV infection of the rat brain is associated with microglial activation and damage to certain neuronal populations. Since persistent BDV infection of neurons is nonlytic in vitro, activated microglia have been suggested to be responsible for neuronal cell death in vivo. However, the mechanisms of activation of microglia in neonatally BDV-infected rat brains remain unclear. Our previous studies have shown that activation of microglia by BDV in culture requires the presence of astrocytes as neither the virus nor BDV-infected neurons alone activate microglia. Here, we evaluated the mechanisms whereby astrocytes can contribute to activation of microglia in neuron-glia-microglia mixed cultures. We found that persistent infection of neuronal cells leads to activation of uninfected astrocytes as measured by elevated expression of RANTES. Activation of astrocytes then produces activation of microglia as evidenced by increased formation of round-shaped, MHCI-, MHCII- and IL-6-positive microglia cells. Our analysis of possible molecular mechanisms of activation of astrocytes and/or microglia in culture indicates that the mediators of activation may be soluble heat-resistant, low molecular weight factors. The findings indicate that astrocytes may mediate activation of microglia by BDV-infected neurons. The data are consistent with the hypothesis that microglia activation in the absence of neuronal damage may represent initial steps in the gradual neurodegeneration observed in brains of neonatally BDV-infected rats.

  8. Key ecological responses to nitrogen are altered by climate change

    Science.gov (United States)

    Greaver, T.L.; Clark, C.M.; Compton, J.E.; Vallano, D.; Talhelm, A. F.; Weaver, C.P.; Band, L.E.; Baron, Jill S.; Davidson, E.A.; Tague, C.L.; Felker-Quinn, E.; Lynch, J.A.; Herrick, J.D.; Liu, L.; Goodale, C.L.; Novak, K. J.; Haeuber, R. A.

    2016-01-01

    Climate change and anthropogenic nitrogen deposition are both important ecological threats. Evaluating their cumulative effects provides a more holistic view of ecosystem vulnerability to human activities, which would better inform policy decisions aimed to protect the sustainability of ecosystems. Our knowledge of the cumulative effects of these stressors is growing, but we lack an integrated understanding. In this Review, we describe how climate change alters key processes in terrestrial and freshwater ecosystems related to nitrogen cycling and availability, and the response of ecosystems to nitrogen addition in terms of carbon cycling, acidification and biodiversity.

  9. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  10. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  11. Probing the active site of MIO-dependent 2,3-aminomutases, key catalysts in the biosynthesis of beta-amino acids incorporated in secondary metabolites

    Science.gov (United States)

    Bruner, Steven D.; Cooke, Heather

    2012-01-01

    The tyrosine aminomutase SgTAM produces (S)-β-tyrosine from l-tyrosine in the biosynthesis of the enediyne antitumor antibiotic C-1027. This conversion is promoted by the methylideneimidazole-5-one (MIO) prosthetic group. MIO was first identified in the homologous family of ammonia lyases, which deaminate aromatic amino acids to form α,β-unsaturated carboxylates. Studies of substrate specificity have been described for lyases but there have been no reports in altering the substrate specificity of aminomutases. Furthermore, it remains unclear as to what structural properties are responsible for catalyzing the presumed readdition of the amino group into the α,β-unsaturated intermediates to form β-amino acids. Attempts to elucidate specificity and mechanistic determinants of SgTAM have also proved to be difficult as it is recalcitrant to perturbations to the active site via mutagenesis. An X-ray co-crystal structure of the SgTAM mutant of the catalytic base with l-tyrosine verified important substrate binding residues as well as the enzymatic base. Further mutagenesis revealed that removal of these crucial interactions renders the enzyme inactive. Proposed structural determinants for mutase activity probed via mutagenesis, time-point assays and X-ray crystallography revealed a complicated role for these residues in maintaining key quaternary structure properties that aid in catalysis. PMID:20577998

  12. Human activity recognition and prediction

    CERN Document Server

    2016-01-01

    This book provides a unique view of human activity recognition, especially fine-grained human activity structure learning, human-interaction recognition, RGB-D data based action recognition, temporal decomposition, and causality learning in unconstrained human activity videos. The techniques discussed give readers tools that provide a significant improvement over existing methodologies of video content understanding by taking advantage of activity recognition. It links multiple popular research fields in computer vision, machine learning, human-centered computing, human-computer interaction, image classification, and pattern recognition. In addition, the book includes several key chapters covering multiple emerging topics in the field. Contributed by top experts and practitioners, the chapters present key topics from different angles and blend both methodology and application, composing a solid overview of the human activity recognition techniques. .

  13. O PARAÍSO KEY WEST – UMA VISÃO DE SEGMENTAÇÃO DE MERCADO

    Directory of Open Access Journals (Sweden)

    Myriam de Andrade Caminha Costa

    2007-12-01

    Full Text Available Society each time more, needs mechanisms to surpass problems and limitations. One understands that the world-wide tourism if characterizes for possessing great capacity of adaptation and segmentation of markets, on the basis of the dynamic of estruturação of new products and also in new consuming markets. The Tourism constitutes a economic activity that promotes one of the biggest factors of development. Key West it is the last Florida island Keys - joint of islands to the south of the Flowery one - Been Joined. The natural beauty of these islands forms a great tourist polar region. Key West had its economy shaken for the weakness of the commerce of the cigar, the sponges and the withdrawal of the Armed Forces; the tourism redirected its economy. Tourism Single it is a segmentation of market of the tourism that encloses some interfaces, such as: ecological tourism, of adventure, GLBT, cultural, among others. Key West for its ample gamma of performance, can be seen as a lesson of integration between cultures, social tolerance, ambient conscience and sustentabilidade.

  14. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  15. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  16. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  17. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  18. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  19. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  20. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  1. Ukraine and the Council of Europe common activity in implementation of key principles of participatory democracy

    Directory of Open Access Journals (Sweden)

    Mykhaliuk Nazar Yuriyovych

    2015-12-01

    Full Text Available The article analyses the main forms of mutual cooperation of Ukraine and the Council of Europe in order to implement basic principles of participatory democracy, to conform the legislation of Ukraine to standards of the European Union. The article examines the main legal documents, phases, and the main areas of cooperation between Ukraine and the Council of Europe. The author also assesses the processes of implementation of key principles of participatory democracy in Ukraine.

  2. Printed Identification Key or Web-Based Identification Guide: An Effective Tool for Species Identification?

    Directory of Open Access Journals (Sweden)

    Thomas Edison E. dela Cruz

    2012-09-01

    Full Text Available Species identification is often done with the aid of traditional dichotomous keys. This printed material is based on one’s decision between two alternatives, which is followed by another pair of alternatives until the final species name is reached. With the advent of internet technology, the use of an online database offers an updatable and accumulative approach to species identification. It can also be accessed anytime, and this is very useful for fast-changing groups of organisms. In this paper, we report the preference of sophomore Bachelor of Science (B.Sc. in Microbiology students to two identification guides as a tool in taxonomy. We wish to test our hypothesis that today’s students will prefer to use web-based ID guides over printed dichotomous keys. We also describe how these printed dichotomous key and web-based ID guides were used by the students as one of their laboratory activities in the course Biology of Algae and Fungi.  

  3. BOOK REVIEW: Key Science Physics: New Edition and Key Science Physics for International Schools: Extension File

    Science.gov (United States)

    Maybank, Maureen

    1999-09-01

    When handling , I recalled how one set of sixth-form students that I taught affectionately referred to Jim Breithaupt's large format book Understanding Physics for Advanced Level as `Big Jim'. This package, for GCSE students and teachers, is its younger brother. Key Science Physics was reviewed in this journal over four years ago. Now it is in a new edition with an expanded ring file of teacher resources (a Teacher's Guide and Extension File). It has been expanded for a wider range of students to meet the requirements of all GCSE syllabuses with additional topics for IGCSE and IB. The international bit seems to be among materials in the file of resources and does not appear in the title of the students' textbook. This is not one of those purchases that will only get occasional use and be left in a department library but it is one that contains sufficient excellent material to become central to any GCSE Physics course. For the students there is a single-volume 396-page textbook in full colour (not a heavyweight book). Marginal comments point out places where an Activity or Assignment from the Extension File fits in. All the materials in the teacher's Extension File are cross referenced to the numbering of this textbook, i.e. its Themes, Topics, Checkpoints, Tests etc, not to page numbers. The margin is used in other attractive ways to highlight a summary, propose a first thought or provide a topic summary. The text is fruitful mix of pure physics, applications and personalities. To support the students' practical work the Extension File contains photocopiable sheets. For the activities and assignments a few contain a harder version to give access to the higher levels of attainment. Four alternatives to practical questions are given; there are also exam questions and multiple choice questions for each topic. These all have helpful mark schemes on the teacher's answers pages. What else do you get? A Glossary collection of sheets to photocopy with space to enter a

  4. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  5. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  6. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  7. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  8. Report on the Status of Project AMOS (Acoustic, Meteorological, and Oceanographic Survey) (1 January 1953 - 31 December 1954)

    Science.gov (United States)

    1955-03-21

    The orsodn ale fpoaa tbi ~tlowt arines hrose the time variability ist~okuced tion loss were then computed froci the formulats of by the ocean. These...e thee swc and rag an itd hrivtie whise rpfreedtwie.T spect ~~~,esie tom~ by haebencaclae S he0g L gme ~ ~ ~ ~ ~ ~ ~ ~~~~~~kv ray. the peelse ist fn

  9. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  10. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  11. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  12. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  13. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  14. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. Managing key capabilities: A challenge for nuclear plant building companies

    International Nuclear Information System (INIS)

    Pascal Corbel

    2003-01-01

    The nuclear plant building industry faces a paradoxical situation. The use of nuclear reactors to produce energy for civil purposes is both a promising technology, with potentially huge outlets, and a technology facing declining demand. One of the key problems is then: how to maintain the capabilities necessary to benefit from the potential recovery? The resource-based view of strategic management has shown the importance of different types of resources and capabilities in gaining a sustainable competitive advantage. Successful incumbents in the market of nuclear station building have built those kinds of distinctive capabilities that give them a competitive advantage over potential new entrants. But we show that, without a permanent activity in plant building, preserving those capabilities necessitates specific strategic action. We firstly develop the argument that the nuclear plant building industry is in a paradoxical situation in terms of demand and technical performance trends. Secondly, we try to identify the key capabilities of the incumbents. We show that companies in that field use mainly three types of distinctive capabilities: pure technical and scientific knowledge in direct relation to the use of nuclear as an energy generator, competences in risk management and competences in large project management, including financing. Thirdly, we show that although some of those capabilities are used through other nuclear-related activities such as plant maintenance or fuel supply, some of them necessitate taking strategic actions in order to be preserved. We argue that this should be a priority of nuclear equipment company managers in the next few years. (author)

  16. Identification of key genes involved in polysaccharide bioflocculant synthesis in Bacillus licheniformis.

    Science.gov (United States)

    Chen, Zhen; Liu, Peize; Li, Zhipeng; Yu, Wencheng; Wang, Zhi; Yao, Haosheng; Wang, Yuanpeng; Li, Qingbiao; Deng, Xu; He, Ning

    2017-03-01

    The present study reports the sequenced genome of Bacillus licheniformis CGMCC 2876, which is composed of a 4,284,461 bp chromosome that contains 4,188 protein-coding genes, 72 tRNA genes, and 21 rRNA genes. Additional analysis revealed an eps gene cluster with 16 open reading frames. Conserved Domains Database analysis combined with qPCR experiments indicated that all genes in this cluster were involved in polysaccharide bioflocculant synthesis. Phosphoglucomutase and UDP-glucose pyrophosphorylase were supposed to be key enzymes in polysaccharide secretion in B. licheniformis. A biosynthesis pathway for the production of polysaccharide bioflocculant involving the integration of individual genes was proposed based on functional analysis. Overexpression of epsDEF from the eps gene cluster in B. licheniformis CGMCC 2876 increased the flocculating activity of the recombinant strain by 90% compared to the original strain. Similarly, the crude yield of polysaccharide bioflocculant was enhanced by 27.8%. Overexpression of the UDP-glucose pyrophosphorylase gene not only increased the flocculating activity by 71% but also increased bioflocculant yield by 13.3%. Independent of UDP-N-acetyl-D-mannosamine dehydrogenase gene, flocculating activity, and polysaccharide yield were negatively impacted by overexpression of the UDP-N-acetylglucosamine 2-epimerase gene. Overall, epsDEF and gtaB2 were identified as key genes for polysaccharide bioflocculant synthesis in B. licheniformis. These results will be useful for further engineering of B. licheniformis for industrial bioflocculant production. Biotechnol. Bioeng. 2017;114: 645-655. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  17. Photosynthetically active and ultraviolet radiation at SEAKEYS station Molasses Reef (MLRF) in the Florida Keys, 2011 (NODC Accession 0098080)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Florida Institute of Oceanography's (FIO) SEAKEYS (Sustained Ecological Research Related to Management of the Florida Keys Seascape) program began in 1989 and...

  18. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  19. Expression of peroxisome proliferator-activated receptor-gamma in key neuronal subsets regulating glucose metabolism and energy homeostasis.

    Science.gov (United States)

    Sarruf, David A; Yu, Fang; Nguyen, Hong T; Williams, Diana L; Printz, Richard L; Niswender, Kevin D; Schwartz, Michael W

    2009-02-01

    In addition to increasing insulin sensitivity and adipogenesis, peroxisome proliferator-activated receptor (PPAR)-gamma agonists cause weight gain and hyperphagia. Given the central role of the brain in the control of energy homeostasis, we sought to determine whether PPARgamma is expressed in key brain areas involved in metabolic regulation. Using immunohistochemistry, PPARgamma distribution and its colocalization with neuron-specific protein markers were investigated in rat and mouse brain sections spanning the hypothalamus, the ventral tegmental area, and the nucleus tractus solitarius. In several brain areas, nuclear PPARgamma immunoreactivity was detected in cells that costained for neuronal nuclei, a neuronal marker. In the hypothalamus, PPARgamma immunoreactivity was observed in a majority of neurons in the arcuate (including both agouti related protein and alpha-MSH containing cells) and ventromedial hypothalamic nuclei and was also present in the hypothalamic paraventricular nucleus, the lateral hypothalamic area, and tyrosine hydroxylase-containing neurons in the ventral tegmental area but was not expressed in the nucleus tractus solitarius. To validate and extend these histochemical findings, we generated mice with neuron-specific PPARgamma deletion using nestin cre-LoxP technology. Compared with littermate controls, neuron-specific PPARgamma knockout mice exhibited dramatic reductions of both hypothalamic PPARgamma mRNA levels and PPARgamma immunoreactivity but showed no differences in food intake or body weight over a 4-wk study period. We conclude that: 1) PPARgamma mRNA and protein are expressed in the hypothalamus, 2) neurons are the predominant source of PPARgamma in the central nervous system, although it is likely expressed by nonneuronal cell types as well, and 3) arcuate nucleus neurons that control energy homeostasis and glucose metabolism are among those in which PPARgamma is expressed.

  20. Key structural features of nonsteroidal ligands for binding and activation of the androgen receptor.

    Science.gov (United States)

    Yin, Donghua; He, Yali; Perera, Minoli A; Hong, Seoung Soo; Marhefka, Craig; Stourman, Nina; Kirkovsky, Leonid; Miller, Duane D; Dalton, James T

    2003-01-01

    The purposes of the present studies were to examine the androgen receptor (AR) binding ability and in vitro functional activity of multiple series of nonsteroidal compounds derived from known antiandrogen pharmacophores and to investigate the structure-activity relationships (SARs) of these nonsteroidal compounds. The AR binding properties of sixty-five nonsteroidal compounds were assessed by a radioligand competitive binding assay with the use of cytosolic AR prepared from rat prostates. The AR agonist and antagonist activities of high-affinity ligands were determined by the ability of the ligand to regulate AR-mediated transcriptional activation in cultured CV-1 cells, using a cotransfection assay. Nonsteroidal compounds with diverse structural features demonstrated a wide range of binding affinity for the AR. Ten compounds, mainly from the bicalutamide-related series, showed a binding affinity superior to the structural pharmacophore from which they were derived. Several SARs regarding nonsteroidal AR binding were revealed from the binding data, including stereoisomeric conformation, steric effect, and electronic effect. The functional activity of high-affinity ligands ranged from antagonist to full agonist for the AR. Several structural features were found to be determinative of agonist and antagonist activities. The nonsteroidal AR agonists identified from the present studies provided a pool of candidates for further development of selective androgen receptor modulators (SARMs) for androgen therapy. Also, these studies uncovered or confirmed numerous important SARs governing AR binding and functional properties by nonsteroidal molecules, which would be valuable in the future structural optimization of SARMs.

  1. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  2. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  3. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  4. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  5. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  6. Sustainability of the Tourism Industry, Based on Financial Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Adriana Dutescu

    2014-11-01

    Full Text Available Even if there is a real need of a set of key performance indicators for small and medium sized enterprises, this is not yet considered to be satisfied. Our research is focused on two main aspects, each of them individually important for the users of accounting information: the basic indicators specific for analysing operational performance and for decision making and the trend of the key performance indicators in the context of the economic crisis. The starting point of the study is a questionnaire addressed to small and medium sized enterprises activating in the tourism area, especially in the hotel industry. The respondents answered the questions in perfect anonymity by choosing one of the multiple choices for some of them and offering open answers to the others. Our analysis reveals a fair view of the dynamic of the most used key performance indicators in Romanian hotel industry, the limits of their interpretation and usage and the evolution of the financial and economic performance. The declared purpose of the research is to set the bases of a starting point in order to provide solutions for improving the relevance and the usage of these indicators in this domain, in the context of a sustainable business, taking into account the nowadays status of the economy in general and in particular the hotel industry.

  7. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  8. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  9. Temperature, salinity, photosynthetically active radiation and weather parameters at SEAKEYS stations in the Florida Keys, 2007 (NODC Accession 0058101)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected at several Coastal-Marine Automated Network (C-MAN) stations in the Florida Keys National Marine Sanctuary and Florida Bay....

  10. Temperature, salinity, photosynthetically active radiation and weather parameters at SEAKEYS stations in the Florida Keys, 2006 (NODC Accession 0058100)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected at several Coastal-Marine Automated Network (C-MAN) stations in the Florida Keys National Marine Sanctuary and Florida Bay....

  11. Temperature, salinity, photosynthetically active radiation and weather parameters at SEAKEYS stations in the Florida Keys, 2004 (NODC Accession 0058098)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected at several Coastal-Marine Automated Network (C-MAN) stations in the Florida Keys National Marine Sanctuary and Florida Bay....

  12. Temperature, salinity, photosynthetically active radiation and weather parameters at SEAKEYS stations in the Florida Keys, 2003 (NODC Accession 0058097)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected at several Coastal-Marine Automated Network (C-MAN) stations in the Florida Keys National Marine Sanctuary and Florida Bay....

  13. Temperature, salinity, photosynthetically active radiation and weather parameters at SEAKEYS stations in the Florida Keys, 2005 (NODC Accession 0058099)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected at several Coastal-Marine Automated Network (C-MAN) stations in the Florida Keys National Marine Sanctuary and Florida Bay....

  14. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  15. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  16. Key Techniques for the Development of Web-Based PDM System

    Institute of Scientific and Technical Information of China (English)

    WANG Li-juan; ZHANG Xu; NING Ru-xin

    2006-01-01

    Some key techniques for the development of web-based product data management (PDM) system are introduced. The four-tiered B/S architecture of a PDM system-BITPDM is introduced first, followed by its design and implementation, including virtual data vault, flexible coding system, document management,product structure and configuration management, workflow/process and product maturity management. BITPDM can facilitate the activities from new product introduction phase to manufacturing, and manage the product data and their dynamic changing history. Based on Microsoft. NET, XML, web service and SOAP techniques, BITPDM realizes the integration and efficient management of product information.

  17. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  18. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  19. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  20. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  1. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  2. Physical activity in the prevention and treatment of diseases of affluence – the key role of AMP-activated protein kinase (AMPK

    Directory of Open Access Journals (Sweden)

    Ewa Grochowska

    2014-09-01

    Full Text Available In developed countries, we can observe an increasing number of people with obesity, type 2 diabetes, dyslipidemia, hypertension and arteriosclerosis. The main reason for this phenomenon is the abnormal energy balance due to sedentary lifestyles. Cardiovascular diseases are the leading cause of death in many countries around the world, nowadays. In this paper, the impact of physical activity on the effectiveness of treatment and prevention of metabolic diseases and cancer is considered. Exercise is one of the factors activating 5’AMP-activated protein kinase (AMPK. This enzyme is crucial in maintaining the energy balance of the cell and the entire organism, and its activation results in excluding the anabolic and switching on the catabolic processes. It is believed that the activation of AMPK is responsible for most of the positive effects resulting from physical exercise. Although there are pharmacological methods of activation of this enzyme, they seem to be not as effective as physical exercise. Therefore, physical activity should be the most important form of prevention and treatment of metabolic diseases.

  3. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  4. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  5. Joint switched transmit diversity and adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Khalid A.

    2011-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using switched transmit diversity and adaptive modulation in order to minimize the average number of switched branches at the secondary transmitter while increasing the capacity of the secondary link. The proposed switching efficient scheme (SES) uses the scan and wait (SWC) combining technique where a transmission occurs only when a branch with an acceptable performance is found, otherwise data is buffered. In our scheme, the modulation constellation size and the used transmit branch are determined to achieve the highest spectral efficiency with a minimum processing power, given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. Selected numerical examples show that the SES scheme minimizes the average number of switched branches for the average and the high secondary signal-to-noise ratio range. This improvement comes at the expense of a small delay introduced by the SWC technique. For reference, we also compare the performance of the SES scheme to the selection diversity scheme (SDS) where the best branch verifying the modulation mode and the interference constraint is always selected. © 2011 ICST.

  6. Key volatile aroma compounds of lactic acid fermented malt based beverages - impact of lactic acid bacteria strains.

    Science.gov (United States)

    Nsogning Dongmo, Sorelle; Sacher, Bertram; Kollmannsberger, Hubert; Becker, Thomas

    2017-08-15

    This study aims to define the aroma composition and key aroma compounds of barley malt wort beverages produced from fermentation using six lactic acid bacteria (LAB) strains. Gas chromatography mass spectrometry-olfactometry and flame ionization detection was employed; key aroma compounds were determined by means of aroma extract dilution analysis. Fifty-six detected volatile compounds were similar among beverages. However, significant differences were observed in the concentration of individual compounds. Key aroma compounds (flavor dilution (FD) factors ≥16) were β-damascenone, furaneol, phenylacetic acid, 2-phenylethanol, 4-vinylguaiacol, sotolon, methional, vanillin, acetic acid, nor-furaneol, guaiacol and ethyl 2-methylbutanoate. Furthermore, acetaldehyde had the greatest odor activity value of up to 4266. Sensory analyses revealed large differences in the flavor profile. Beverage from L. plantarum Lp. 758 showed the highest FD factors in key aroma compounds and was correlated to fruity flavors. Therefore, we suggest that suitable LAB strain selection may improve the flavor of malt based beverages. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  8. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  9. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  10. Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects

    Energy Technology Data Exchange (ETDEWEB)

    Wood, A.; Wiehagen, J.

    2012-09-01

    This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key Innovations for Adding Energy Efficiency to Maintenance Projects, was intended to provide direction to more focused efforts to increase the efficiency of existing homes; in this meeting, the focus was specifically for re-roofing and the opportunities for adding energy efficiency upgrades during this major home repair activity.

  11. Antennae hold a key to Varroa-sensitive hygiene behaviour in honey bees

    OpenAIRE

    Mondet, Fanny; Alaux, C?dric; Severac, Dany; Rohmer, Marine; Mercer, Alison R.; Le Conte, Yves

    2015-01-01

    In honey bees, Varroa sensitive hygiene (VSH) behaviour, which involves the detection and removal of brood parasitised by the mite Varroa destructor, can actively participate in the survival of colonies facing Varroa outbreaks. This study investigated the mechanisms of VSH behaviour, by comparing the antennal transcriptomes of bees that do and do not perform VSH behaviour. Results indicate that antennae likely play a key role in the expression of VSH behaviour. Comparisons with the antennal t...

  12. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  13. Autoshaping of key pecking in pigeons with negative reinforcement.

    Science.gov (United States)

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  14. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  15. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  16. Key-lock colloids in a nematic liquid crystal.

    Science.gov (United States)

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  17. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  18. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  19. OCWM Transportation Institutional Program Update on Collaborative Efforts with Key Stakeholders

    International Nuclear Information System (INIS)

    Saris, E.; Austin, P.; Offner, J.J.

    2004-01-01

    The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) created the Office of National Transportation in 2003 recognizing the need to revitalize and accelerate development of the transportation system. The Department has made a commitment to work through a collaborative planning process before developing specific policies and procedures and making transportation decisions. OCRWM has begun to build the institutional framework to support development of this transportation system. Interactions with stakeholders have been initiated. The authors describe the key stakeholders, identified issues, regional and national planning activities, and mechanisms for interaction

  20. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  1. The key determinants of consumer ethnocentrism in Bosnia and Herzegovina

    Directory of Open Access Journals (Sweden)

    Bešlagić Amela

    2015-01-01

    Full Text Available The area of this research relates to consumer behavior and the effects that the influence of consumer ethnocentrism has on the national economy. Therefore is consumer ethnocentrism, as an attitude of spending and consumption of local products, the subject of this research. The aim is to identify the key determinants of the consumer ethnocentrism phenomenon, in order to explain the habits of consumers in the purchase and consumption of local products. The empirical research found the key determinants that influence the level of consumer ethnocentrism among the citizens of Bosnia and Herzegovina. A questionnaire as a data collection form, was used, so as the Cronbach alpha coefficient to measure the reliability of the CET scale, as well as the analysis of variance. The collected data were analyzed by using SPSS statistical software. The results confirmed recent findings conducted in Bosnia and Herzegovina in this field. It was found that the Bosnian - Herzegovinian ethnocentric consumers and their propensity to purchase local products are defined by promotional activities, frequency of purchases of consumer goods, status in the household, number of household members, the average monthly household income, education level and employment status of the household head.

  2. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.

  3. EEG alpha desynchronization in musicians and nonmusicians in response to changes in melody, tempo, and key in classical music.

    Science.gov (United States)

    Overman, Amy A; Hoge, Jessica; Dale, J Alexander; Cross, Jeffrey D; Chien, Alec

    2003-10-01

    Two experiments were performed to examine musicians' and nonmusicians' electroencephalographic (EEG) responses to changes in major dimensions (tempo, melody, and key) of classical music. In Exp. 1, 12 nonmusicians' and 12 musicians' EEGs during melody and tempo changes in classical music showed more alpha desynchronization in the left hemisphere (F3) for changes in tempo than in the right. For melody, the nonmusicians were more right-sided (F4) than left in activation, and musicians showed no left-right differences. In Exp. 2, 18 musicians' and 18 nonmusicians' EEG after a key change in classical music showed that distant key changes elicited more right frontal (F4) alpha desynchronization than left. Musicians showed more reaction to key changes than nonmusicians and instructions to attend to key changes had no significant effect. Classical music, given its well-defined structure, offers a unique set of stimuli to study the brain. Results support the concept of hierarchical modularity in music processing that may be automatic.

  4. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  5. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  6. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  7. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  8. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  9. Secured Session-key Distribution using control Vector Encryption / Decryption Process

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim; Khaleqdad Khan, ANM; Lutfar Rahman, M.

    2006-01-01

    Frequent key changes are very much desirable for the secret communications and are thus in high demand. A session-key distribution technique has been designed and implemented using the programming language C on which the communication between the end-users is encrypted is used for the duration of a logical connection. Each session-key is obtained from the key distribution center (KDC) over the same networking facilities used for end-user communication. The control vector is cryptographically coupled with the session-key at the time of key generation in the KDC. For this, the generated hash function, master key and the session-key are used for producing the encrypted session-key, which has to be transferred. All the operations have been performed using the C programming language. This process can be widely applicable to all sorts of electronic transactions online or offline; commercially and academically.(authors)

  10. Economic Evaluation and Assessment. Physical Evaluation and Assessment, South Cheyenne Area, Cheyenne, Wyoming

    Science.gov (United States)

    1985-10-01

    0.2 ’ /AK/VKKrK CHET SCHY CASP RYAN LAND LARL RAILROCK GiRT DENY FT.C GUE~ SWOT SWC CITIES OR ARRAS [~~WATER COSTS =X SEMR COSTS CHEY =Cheyenne ROCK...those on vast Fox Farm Road, Reiner Court and Avenue B-6. Phase ITl calls fo.-. a -ater main along Apple Street in the Oy-chard Valley area and to loop

  11. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  12. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  13. Physical Activity in Child-Care Centers: Do Teachers Hold the Key to the Playground?

    Science.gov (United States)

    Copeland, Kristen A.; Kendeigh, Cassandra A.; Saelens, Brian E.; Kalkwarf, Heidi J.; Sherman, Susan N.

    2012-01-01

    Many (56%) US children aged 3-5 years are in center-based childcare and are not obtaining recommended levels of physical activity. In order to determine what child-care teachers/providers perceived as benefits and barriers to children's physical activity in child-care centers, we conducted nine focus groups and 13 one-on-one interviews with 49…

  14. IMPROVEMENT OF KEY PROCESSES THROUGH THE ANALYSIS OF VALUE ADDED IN TECHNOLOGY- BASED COMPANIES A SINGLE PROJECT PRODUCTIONS OF THE WATER SECTOR IN CUBA

    Directory of Open Access Journals (Sweden)

    Reina Maylín, Hernández Oro

    2012-01-01

    Full Text Available In this paper, we present the main results of research designed to improve key business processes, using a procedure designed for this purpose, and which includes among its main stages, the analysis of value added by activity, adapting to technology based companies’ productions by one of the water sector project in Cuba. The procedure consistently combines different techniques such as multi-criteria decision analysis for selection of the key processes and analysis of value added by activity to identify key processes to improve and identify opportunities for improvement. The main results are able to identify, classify and relate the processes taking place in the organization, and represent them in a process map, and then determine the key processes for improvement, based on the analysis of value added at each process of each of the activities in it. Derived from the results obtained are proposed and implemented a set of organizational improvements had a positive economic impact for the company under study, allowing a positive conclusion on the feasibility of implementation, flexibility and robustness of the procedure developed in technology-based companies single project productions of the water sector in Cuba to support their business management.

  15. Risk communication. The key of the policy success

    International Nuclear Information System (INIS)

    Covalschi, Valentina

    2005-01-01

    Today, in a democratic society, nuclear power development is subject to public acceptance. The acceptance of the nuclear activities development implies both the approval by the government's proper authorities and also the standpoints of the civil society, expressed in forms more or less institutionalized. The public has an important role to play in addressing issues of health, safety and environment. Therefore, all activities of a nuclear organization need to be both transparent and should provide for the public's appropriate involvement, with input not only from the nuclear community, but also from members of the public, interested groups, media, as well as public representatives in local and national councils and groups. How to communicate clearly with the public is a very challenging job that requires special attention. Risk communication is the art or practice of talking about scientific information and principles to a non - expert audience. Its goal is to convey accurate and trustworthy information about safety to decision - makers, the public, or anyone else with an interest in the safety of the public or themselves. The science of communication, public education for a proper perception of risks are the key for attaining social acceptance of any technology that is about to become part of the sustainable development process and hence, of nuclear energy. The paper describes the way our nuclear organization is acting and the results in risk communication activity it achieves. (author)

  16. GTPase activity plays a key role in the pathobiology of LRRK2.

    Directory of Open Access Journals (Sweden)

    Yulan Xiong

    2010-04-01

    Full Text Available Mutations in the leucine-rich repeat kinase 2 (LRRK2 gene are associated with late-onset, autosomal-dominant, familial Parkinson's disease (PD and also contribute to sporadic disease. The LRRK2 gene encodes a large protein with multiple domains, including functional Roc GTPase and protein kinase domains. Mutations in LRRK2 most likely cause disease through a toxic gain-of-function mechanism. The expression of human LRRK2 variants in cultured primary neurons induces toxicity that is dependent on intact GTP binding or kinase activities. However, the mechanism(s underlying LRRK2-induced neuronal toxicity is poorly understood, and the contribution of GTPase and/or kinase activity to LRRK2 pathobiology is not well defined. To explore the pathobiology of LRRK2, we have developed a model of LRRK2 cytotoxicity in the baker's yeast Saccharomyces cerevisiae. Protein domain analysis in this model reveals that expression of GTPase domain-containing fragments of human LRRK2 are toxic. LRRK2 toxicity in yeast can be modulated by altering GTPase activity and is closely associated with defects in endocytic vesicular trafficking and autophagy. These truncated LRRK2 variants induce similar toxicity in both yeast and primary neuronal models and cause similar vesicular defects in yeast as full-length LRRK2 causes in primary neurons. The toxicity induced by truncated LRRK2 variants in yeast acts through a mechanism distinct from toxicity induced by human alpha-synuclein. A genome-wide genetic screen identified modifiers of LRRK2-induced toxicity in yeast including components of vesicular trafficking pathways, which can also modulate the trafficking defects caused by expression of truncated LRRK2 variants. Our results provide insight into the basic pathobiology of LRRK2 and suggest that the GTPase domain may contribute to the toxicity of LRRK2. These findings may guide future therapeutic strategies aimed at attenuating LRRK2-mediated neurodegeneration.

  17. Adoption of SWC measures in South Limburg (The Netherlands): Experiences of a water manager

    NARCIS (Netherlands)

    Spaan, W.P.; Winteraeken, H.J.; Geelen, P.

    2010-01-01

    In the loess area of the southern part of Limburg soil erosion is responsible for damage in the agricultural area and the associated runoff leads to flooding of urban areas and deposition of mud on the infrastructure. Since the second half of last century erosion hazards and damage have increased,

  18. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  19. LS1 to LHC Report: LHC key handed back to Operations

    CERN Multimedia

    CERN Bulletin

    2015-01-01

    This week, after 23 months of hard work involving about 1000 people every day, the key to the LHC was symbolically handed back to the Operations team. The first long shutdown is over and the machine is getting ready for a restart that will bring its beam to full energy in early spring.   Katy Foraz, LS1 activities coordinator, symbolically hands the LHC key to the operations team, represented, left to right, by Jorg Wenninger, Mike Lamont and Mirko Pojer. All the departments, all the machines and all the experimental areas were involved in the first long shutdown of the LHC that began in February 2013. Over the last two years, the Bulletin has closely followed  all the work and achievements that had been carefully included in the complex general schedule drawn up and managed by the team led by Katy Foraz from the Engineering Department. “The work on the schedule began two years before the start of LS1 and one of the first things we realised was that there was no commercial...

  20. Key technological issues in LMFBR high-temperature structural design - the US perspective

    International Nuclear Information System (INIS)

    Corum, J.M.

    1984-01-01

    The purpose of this paper is: (1) to review the key technological issues in LMFBR high-temperature structural design, particularly as they relate to cost reduction; and (2) to provide an overview of activities sponsored by the US Department of Energy to resolve the issues and to establish stable, standardized, and defensible structural design methods and criteria. Specific areas of discussion include: weldments, structural validation tests, simplified design analysis procedures, design procedures for piping, validation of the methodology for notch-like geometries, improved life assessment procedures, thermal striping, extension of the methodology to new materials, and ASME high-temperature Code reform needs. The perceived problems and needs in each area are discussed, and the current status of related US activities is given