WorldWideScience

Sample records for unknown function shares

  1. Function analysis of unknown genes

    DEFF Research Database (Denmark)

    Rogowska-Wrzesinska, A.

    2002-01-01

      This thesis entitled "Function analysis of unknown genes" presents the use of proteome analysis for the characterisation of yeast (Saccharomyces cerevisiae) genes and their products (proteins especially those of unknown function). This study illustrates that proteome analysis can be used...... to describe different aspects of molecular biology of the cell, to study changes that occur in the cell due to overexpression or deletion of a gene and to identify various protein modifications. The biological questions and the results of the described studies show the diversity of the information that can...... genes and proteins. It reports the first global proteome database collecting 36 yeast single gene deletion mutants and selecting over 650 differences between analysed mutants and the wild type strain. The obtained results show that two-dimensional gel electrophoresis and mass spectrometry based proteome...

  2. Structure-based inference of molecular functions of proteins of unknown function from Berkeley Structural Genomics Center

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sung-Hou; Shin, Dong Hae; Hou, Jingtong; Chandonia, John-Marc; Das, Debanu; Choi, In-Geol; Kim, Rosalind; Kim, Sung-Hou

    2007-09-02

    Advances in sequence genomics have resulted in an accumulation of a huge number of protein sequences derived from genome sequences. However, the functions of a large portion of them cannot be inferred based on the current methods of sequence homology detection to proteins of known functions. Three-dimensional structure can have an important impact in providing inference of molecular function (physical and chemical function) of a protein of unknown function. Structural genomics centers worldwide have been determining many 3-D structures of the proteins of unknown functions, and possible molecular functions of them have been inferred based on their structures. Combined with bioinformatics and enzymatic assay tools, the successful acceleration of the process of protein structure determination through high throughput pipelines enables the rapid functional annotation of a large fraction of hypothetical proteins. We present a brief summary of the process we used at the Berkeley Structural Genomics Center to infer molecular functions of proteins of unknown function.

  3. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  4. Functional connectivity change as shared signal dynamics

    Science.gov (United States)

    Cole, Michael W.; Yang, Genevieve J.; Murray, John D.; Repovš, Grega; Anticevic, Alan

    2015-01-01

    Background An increasing number of neuroscientific studies gain insights by focusing on differences in functional connectivity – between groups, individuals, temporal windows, or task conditions. We found using simulations that additional insights into such differences can be gained by forgoing variance normalization, a procedure used by most functional connectivity measures. Simulations indicated that these functional connectivity measures are sensitive to increases in independent fluctuations (unshared signal) in time series, consistently reducing functional connectivity estimates (e.g., correlations) even though such changes are unrelated to corresponding fluctuations (shared signal) between those time series. This is inconsistent with the common notion of functional connectivity as the amount of inter-region interaction. New Method Simulations revealed that a version of correlation without variance normalization – covariance – was able to isolate differences in shared signal, increasing interpretability of observed functional connectivity change. Simulations also revealed cases problematic for non-normalized methods, leading to a “covariance conjunction” method combining the benefits of both normalized and non-normalized approaches. Results We found that covariance and covariance conjunction methods can detect functional connectivity changes across a variety of tasks and rest in both clinical and non-clinical functional MRI datasets. Comparison with Existing Method(s) We verified using a variety of tasks and rest in both clinical and non-clinical functional MRI datasets that it matters in practice whether correlation, covariance, or covariance conjunction methods are used. Conclusions These results demonstrate the practical and theoretical utility of isolating changes in shared signal, improving the ability to interpret observed functional connectivity change. PMID:26642966

  5. Describing functional requirements for knowledge sharing communities

    Science.gov (United States)

    Garrett, Sandra; Caldwell, Barrett

    2002-01-01

    Human collaboration in distributed knowledge sharing groups depends on the functionality of information and communication technologies (ICT) to support performance. Since many of these dynamic environments are constrained by time limits, knowledge must be shared efficiently by adapting the level of information detail to the specific situation. This paper focuses on the process of knowledge and context sharing with and without mediation by ICT, as well as issues to be resolved when determining appropriate ICT channels. Both technology-rich and non-technology examples are discussed.

  6. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  7. Shared genetic origins of allergy and autoimmune diseases

    DEFF Research Database (Denmark)

    Waage, J. E.; Kreiner-Møller, E.; Standl, M.

    2015-01-01

    Parallel increases in allergy and autoimmune disease prevalence in recent time suggest shared, but yet unknown, etiologies. Here, we investigated shared genetic loci and molecular pathways to identify possible shared disease mechanisms between allergy and autoimmune diseases.......Parallel increases in allergy and autoimmune disease prevalence in recent time suggest shared, but yet unknown, etiologies. Here, we investigated shared genetic loci and molecular pathways to identify possible shared disease mechanisms between allergy and autoimmune diseases....

  8. Heuristic method for searching global maximum of multimodal unknown function

    Energy Technology Data Exchange (ETDEWEB)

    Kamei, K; Araki, Y; Inoue, K

    1983-06-01

    The method is composed of three kinds of searches. They are called g (grasping)-mode search, f (finding)-mode search and c (confirming)-mode search. In the g-mode search and the c-mode search, a heuristic method is used which was extracted from search behaviors of human subjects. In f-mode search, the simplex method is used which is well known as a search method for unimodal unknown function. Each mode search and its transitions are shown in the form of flowchart. The numerical results for one-dimensional through six-dimensional multimodal functions prove the proposed search method to be an effective one. 11 references.

  9. Three-Party Quantum State Sharing of an Arbitrary Unknown Two-Qubit State Based on Entanglement Swapping and Bell-State Measurements

    International Nuclear Information System (INIS)

    Yuan Hao; Song Jun; Hou Kui; Hu Xiaoyuan; Shi Shouhua; Han Lianfang

    2009-01-01

    We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitary operation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique.

  10. Testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form

    DEFF Research Database (Denmark)

    Péguin-Feissolle, Anne; Strikholm, Birgit; Teräsvirta, Timo

    In this paper we propose a general method for testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form. These tests are based on a Taylor expansion of the nonlinear model around a given point in the sample space. We study the performance of our tests b...

  11. Distributed Sharing of Functionalities and Resources in Survivable GMPLS-controlled WSONs

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Cerutti, I.; Muñoz, R.

    2012-01-01

    Sharing of functionalities and sharing of network resources are effective solutions for improving the cost-effectiveness of wavelength-switched optical networks (WSONs). Such cost-effectiveness should be pursued together with the objective of ensuring the requested level of performance at the phy...

  12. Entire functions sharing one polynomial with their derivatives

    Indian Academy of Sciences (India)

    restriction of the hyper order less than 1/2, and obtain some uniqueness theorems of a nonconstant entire function and its derivative sharing a finite nonzero complex number. CM. The results in this paper also improve some known results. Some examples are provided to show that the results in this paper are best possible.

  13. Share capital in stock corporations under Polish law. Nature – functions – perspectives

    Directory of Open Access Journals (Sweden)

    Zdzisław Gordon

    2010-12-01

    Full Text Available Share capital of stock corporations is a monetary value whose equivalent shareholders are obliged to contribute to a company, and which cannot be paid back by a company to shareholders throughout its duration. Share capital exercises three functions: legal, economic and security-enforcing. From a traditional perspective the security (guarantee function is the most important and it entails that share capital constitutes a guarantee of protecting a company’s creditors. In the literature, however, the ability of share capital to perform this function has been more and more often undermined and consequently proposals are put forward to resign from the construction of share capital. The decision to reform share capital of a limited liability company in Polish law, too, seems already to have been decided upon. It is, however, unacceptable to completely resign from the protection of creditors’ interests since the law must provide protection for weaker participants of trading such as small entrepreneurs in relation to stock companies. A serious alternative to share capital, however, seems to be the protection of creditors through the so-called solvency test, which subjects the payments for the benefit of shareholders to the condition that a company’s assets at least balance its liabilities after such a payment. The protection of creditors based on the solvency test is not, however, free from faults. If the construction of share capital was to be resigned from and the solvency test was to be adopted to serve the function of a means of protecting creditors, it seems necessary to develop a characteristic buffer which would prevent using the construction of a limited liability company in high risk ventures and shifting a considerable amount of this risk on to the company’s business partners, not to mention defending against making use of it for common fraud. The role of such a buffer might be played by an obligatory reserve capital based on the

  14. Framework for Shared Drinking Water Risk Assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Thomas Stephen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tidwell, Vincent C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Roger [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Binning, David [AEM Corp., Herndon, VA (United States); Meszaros, Jenny [AEM Corp., Herndon, VA (United States)

    2017-01-01

    Central to protecting our nation's critical infrastructure is the development of methodologies for prioritizing action and supporting resource allocation decisions associated with risk-reduction initiatives. Toward this need a web-based risk assessment framework that promotes the anonymous sharing of results among water utilities is demonstrated. Anonymous sharing of results offers a number of potential advantages such as assistance in recognizing and correcting bias, identification of 'unknown, unknowns', self-assessment and benchmarking for the local utility, treatment of shared assets and/or threats across multiple utilities, and prioritization of actions beyond the scale of a single utility. The constructed framework was demonstrated for three water utilities. Demonstration results were then compared to risk assessment results developed using a different risk assessment application by a different set of analysts.

  15. Shared function knowledge: infants' attention to function information in communicative contexts.

    Science.gov (United States)

    Träuble, Birgit; Bätz, Johannes

    2014-08-01

    Humans are specifically adapted to knowledge acquisition and transfer by social communication. According to natural pedagogy theory, infants are highly sensitive to signals that indicate a teacher's communicative intention and are biased to interpret communicative contexts as conveying relevant and generalizable knowledge that is also shared by other conspecifics. We investigated whether infants as young as 12 months interpret ostensively communicated object-directed emotion expressions as generalizable and shareable with others. Given that young infants pay particular attention to information about objects' functions, we were interested in whether the shareability assumption also holds for emotional attitudes toward functional features of unfamiliar objects. The results suggest that 12-month-olds (N=80) flexibly interpret another person's emotion displays toward unfamiliar artifacts either as object-centered and generalizable attitudes or as person-centered subjective attitudes, depending on the communicative characteristics of the learning context. Furthermore, the transfer of ostensively communicated information about the artifacts depended on their functional usability, which is consistent with infants' early sensitivity to function information in various areas of cognitive development. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Proteins of unknown function in the Protein Data Bank (PDB): an inventory of true uncharacterized proteins and computational tools for their analysis.

    Science.gov (United States)

    Nadzirin, Nurul; Firdaus-Raih, Mohd

    2012-10-08

    Proteins of uncharacterized functions form a large part of many of the currently available biological databases and this situation exists even in the Protein Data Bank (PDB). Our analysis of recent PDB data revealed that only 42.53% of PDB entries (1084 coordinate files) that were categorized under "unknown function" are true examples of proteins of unknown function at this point in time. The remainder 1465 entries also annotated as such appear to be able to have their annotations re-assessed, based on the availability of direct functional characterization experiments for the protein itself, or for homologous sequences or structures thus enabling computational function inference.

  17. Adaptive Incentive Controls for Stackelberg Games with Unknown Cost Functionals.

    Science.gov (United States)

    1984-01-01

    APR EZT:: F I AN 73S e OsL:-: UNCLASSI?:-- Q4~.’~- .A.., 6, *~*i i~~*~~*.- U ADAPTIVE INCENTIVE CONTROLS FOR STACKELBERG GAMES WITH UNKNOWN COST...AD-A161 885 ADAPTIVE INCENTIVE CONTROLS FOR STACKELBERG GAMES WITH i/1 UNKNOWN COST FUNCTIONALSCU) ILLINOIS UNIV AT URBANA DECISION AND CONTROL LAB T...ORGANIZATION 6b. OFFICE SYMBOL 7.. NAME OF MONITORING ORGANIZATION CoriaeLcenef~pda~ Joint Services Electronics Program Laboratory, Univ. of Illinois N/A

  18. Proteins of Unknown Function in the Protein Data Bank (PDB: An Inventory of True Uncharacterized Proteins and Computational Tools for Their Analysis

    Directory of Open Access Journals (Sweden)

    Nurul Nadzirin

    2012-10-01

    Full Text Available Proteins of uncharacterized functions form a large part of many of the currently available biological databases and this situation exists even in the Protein Data Bank (PDB. Our analysis of recent PDB data revealed that only 42.53% of PDB entries (1084 coordinate files that were categorized under “unknown function” are true examples of proteins of unknown function at this point in time. The remainder 1465 entries also annotated as such appear to be able to have their annotations re-assessed, based on the availability of direct functional characterization experiments for the protein itself, or for homologous sequences or structures thus enabling computational function inference.

  19. An Approach to Function Annotation for Proteins of Unknown Function (PUFs in the Transcriptome of Indian Mulberry.

    Directory of Open Access Journals (Sweden)

    K H Dhanyalakshmi

    Full Text Available The modern sequencing technologies are generating large volumes of information at the transcriptome and genome level. Translation of this information into a biological meaning is far behind the race due to which a significant portion of proteins discovered remain as proteins of unknown function (PUFs. Attempts to uncover the functional significance of PUFs are limited due to lack of easy and high throughput functional annotation tools. Here, we report an approach to assign putative functions to PUFs, identified in the transcriptome of mulberry, a perennial tree commonly cultivated as host of silkworm. We utilized the mulberry PUFs generated from leaf tissues exposed to drought stress at whole plant level. A sequence and structure based computational analysis predicted the probable function of the PUFs. For rapid and easy annotation of PUFs, we developed an automated pipeline by integrating diverse bioinformatics tools, designated as PUFs Annotation Server (PUFAS, which also provides a web service API (Application Programming Interface for a large-scale analysis up to a genome. The expression analysis of three selected PUFs annotated by the pipeline revealed abiotic stress responsiveness of the genes, and hence their potential role in stress acclimation pathways. The automated pipeline developed here could be extended to assign functions to PUFs from any organism in general. PUFAS web server is available at http://caps.ncbs.res.in/pufas/ and the web service is accessible at http://capservices.ncbs.res.in/help/pufas.

  20. An Empirical Study of Financial Shared Services: Understanding of an organization moves towards establishing financial shared service as a strategic finance function

    OpenAIRE

    Nik Mustaffa, Nik Azah Karimah

    2009-01-01

    This paper is prepared to understand an organization moves towards establishing financial shared service as a strategic finance function. The research is conducted by selected few multinational organizations from oil and gas industry to analyze the purpose of the move, how organizations are restructure and values generated from the financial shared services. The research also will extend towards identifying various challenges faced by the organizations during the restructuring process. The is...

  1. Software bots -The next frontier for shared services and functional excellence

    NARCIS (Netherlands)

    Suri, Vipin K.; Elia, Marianne; van Hillegersberg, Jos

    2017-01-01

    A Software Bot is a fundamental element of Robotics Process Automation (RPA). RPA can be deployed to automate repeatable, mundane, rules-based work-flowed process tasks across multiple functions in an organization, including Shared Services. While RPA holds high promise, using Software Bots for

  2. Functions of Memory Sharing and Mother-Child Reminiscing Behaviors: Individual and Cultural Variations

    Science.gov (United States)

    Kulkofsky, Sarah; Wang, Qi; Koh, Jessie Bee Kim

    2009-01-01

    This study examined maternal beliefs about the functions of memory sharing and the relations between these beliefs and mother-child reminiscing behaviors in a cross-cultural context. Sixty-three European American and 47 Chinese mothers completed an open-ended questionnaire concerning their beliefs about the functions of parent-child memory…

  3. Determining firms׳ utility functions and competitive roles from data on market shares using Lotka–Volterra models

    Directory of Open Access Journals (Sweden)

    A. Marasco

    2016-06-01

    Full Text Available In this article, we include data on historical and estimated market shares of two markets. In particular, we include annual data on the market shares of the Japanese beer market (1963–2000 and biannual data on the market shares of the mobile phones market in Greece (1998–2007. In addition, we estimate monthly data on market shares for both markets. We show how this data can be used to derive firms’ utility functions and their competitive roles.

  4. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  5. HydroShare: A Platform for Collaborative Data and Model Sharing in Hydrology

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.

    2017-12-01

    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting its use as a virtual environment supporting education and research. HydroShare has components that support: (1) resource storage, (2) resource exploration, and (3) web apps for actions on resources. The HydroShare data discovery, sharing and publishing functions as well as HydroShare web apps provide the capability to analyze data and execute models completely in the cloud (servers remote from the user) overcoming desktop platform limitations. The HydroShare GIS app provides a basic capability to visualize spatial data. The HydroShare JupyterHub Notebook app provides flexible and documentable execution of Python code snippets for analysis and modeling in a way that results can be shared among HydroShare users and groups to support research collaboration and education. We will discuss how these developments can be used to support different types of educational efforts in Hydrology where being completely web based is of value in an educational setting as students can all have access to the same functionality regardless of their computer.

  6. A chromatographic objective function to characterise chromatograms with unknown compounds or without standards available.

    Science.gov (United States)

    Alvarez-Segura, T; Gómez-Díaz, A; Ortiz-Bolsico, C; Torres-Lapasió, J R; García-Alvarez-Coque, M C

    2015-08-28

    Getting useful chemical information from samples containing many compounds is still a challenge to analysts in liquid chromatography. The highest complexity corresponds to samples for which there is no prior knowledge about their chemical composition. Computer-based methodologies are currently considered as the most efficient tools to optimise the chromatographic resolution, and further finding the optimal separation conditions. However, most chromatographic objective functions (COFs) described in the literature to measure the resolution are based on mathematical models fitted with the information obtained from standards, and cannot be applied to samples with unknown compounds. In this work, a new COF based on the automatic measurement of the protruding part of the chromatographic peaks (or peak prominences) that indicates the number of perceptible peaks and global resolution, without the need of standards, is developed. The proposed COF was found satisfactory with regard to the peak purity criterion when applied to artificial peaks and simulated chromatograms of mixtures built using the information of standards. The approach was applied to mixtures of drugs containing unknown impurities and degradation products and to extracts of medicinal herbs, eluted with acetonitrile-water mixtures using isocratic and gradient elution. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. Structure of a Trypanosoma brucei α/β-hydrolase fold protein with unknown function

    International Nuclear Information System (INIS)

    Merritt, Ethan A.; Holmes, Margaret; Buckner, Frederick S.; Van Voorhis, Wesley C.; Quartly, Erin; Phizicky, Eric M.; Lauricella, Angela; Luft, Joseph; DeTitta, George; Neely, Helen; Zucker, Frank; Hol, Wim G. J.

    2008-01-01

    T. brucei gene Tb10.6k15.0140 codes for an α/β-hydrolase fold protein of unknown function. The 2.2 Å crystal structure shows that members of this sequence family retain a conserved Ser residue at the expected site of a catalytic nucleophile, but that trypanosomatid sequences lack structural homologs for the other expected residues of the catalytic triad. The structure of a structural genomics target protein, Tbru020260AAA from Trypanosoma brucei, has been determined to a resolution of 2.2 Å using multiple-wavelength anomalous diffraction at the Se K edge. This protein belongs to Pfam sequence family PF08538 and is only distantly related to previously studied members of the α/β-hydrolase fold family. Structural superposition onto representative α/β-hydrolase fold proteins of known function indicates that a possible catalytic nucleophile, Ser116 in the T. brucei protein, lies at the expected location. However, the present structure and by extension the other trypanosomatid members of this sequence family have neither sequence nor structural similarity at the location of other active-site residues typical for proteins with this fold. Together with the presence of an additional domain between strands β6 and β7 that is conserved in trypanosomatid genomes, this suggests that the function of these homologs has diverged from other members of the fold family

  8. Elitism, Sharing and Ranking Choices in Evolutionary Multi-Criterion Optimisation

    OpenAIRE

    Pursehouse, R.C.; Fleming, P.J.

    2002-01-01

    Elitism and sharing are two mechanisms that are believed to improve the performance of an evolutionary multi-criterion optimiser. The relative performance of of the two most popular ranking strategies is largely unknown. Using a new empirical inquiry framework, this report studies the effect of elitism, sharing and ranking design choices using a benchmark suite of two-criterion problems.........

  9. Locally optimal control under unknown dynamics with learnt cost function: application to industrial robot positioning

    Science.gov (United States)

    Guérin, Joris; Gibaru, Olivier; Thiery, Stéphane; Nyiri, Eric

    2017-01-01

    Recent methods of Reinforcement Learning have enabled to solve difficult, high dimensional, robotic tasks under unknown dynamics using iterative Linear Quadratic Gaussian control theory. These algorithms are based on building a local time-varying linear model of the dynamics from data gathered through interaction with the environment. In such tasks, the cost function is often expressed directly in terms of the state and control variables so that it can be locally quadratized to run the algorithm. If the cost is expressed in terms of other variables, a model is required to compute the cost function from the variables manipulated. We propose a method to learn the cost function directly from the data, in the same way as for the dynamics. This way, the cost function can be defined in terms of any measurable quantity and thus can be chosen more appropriately for the task to be carried out. With our method, any sensor information can be used to design the cost function. We demonstrate the efficiency of this method through simulating, with the V-REP software, the learning of a Cartesian positioning task on several industrial robots with different characteristics. The robots are controlled in joint space and no model is provided a priori. Our results are compared with another model free technique, consisting in writing the cost function as a state variable.

  10. Unknown quantum states: The quantum de Finetti representation

    International Nuclear Information System (INIS)

    Caves, Carlton M.; Fuchs, Christopher A.; Schack, Ruediger

    2002-01-01

    We present an elementary proof of the quantum de Finetti representation theorem, a quantum analog of de Finetti's classical theorem on exchangeable probability assignments. This contrasts with the original proof of Hudson and Moody [Z. Wahrschein. verw. Geb. 33, 343 (1976)], which relies on advanced mathematics and does not share the same potential for generalization. The classical de Finetti theorem provides an operational definition of the concept of an unknown probability in Bayesian probability theory, where probabilities are taken to be degrees of belief instead of objective states of nature. The quantum de Finetti theorem, in a closely analogous fashion, deals with exchangeable density-operator assignments and provides an operational definition of the concept of an ''unknown quantum state'' in quantum-state tomography. This result is especially important for information-based interpretations of quantum mechanics, where quantum states, like probabilities, are taken to be states of knowledge rather than states of nature. We further demonstrate that the theorem fails for real Hilbert spaces and discuss the significance of this point

  11. Shared atypical default mode and salience network functional connectivity between autism and schizophrenia.

    Science.gov (United States)

    Chen, Heng; Uddin, Lucina Q; Duan, Xujun; Zheng, Junjie; Long, Zhiliang; Zhang, Youxue; Guo, Xiaonan; Zhang, Yan; Zhao, Jingping; Chen, Huafu

    2017-11-01

    Schizophrenia and autism spectrum disorder (ASD) are two prevalent neurodevelopmental disorders sharing some similar genetic basis and clinical features. The extent to which they share common neural substrates remains unclear. Resting-state fMRI data were collected from 35 drug-naïve adolescent participants with first-episode schizophrenia (15.6 ± 1.8 years old) and 31 healthy controls (15.4 ± 1.6 years old). Data from 22 participants with ASD (13.1 ± 3.1 years old) and 21 healthy controls (12.9 ± 2.9 years old) were downloaded from the Autism Brain Imaging Data Exchange. Resting-state functional networks were constructed using predefined regions of interest. Multivariate pattern analysis combined with multi-task regression feature selection methods were conducted in two datasets separately. Classification between individuals with disorders and controls was achieved with high accuracy (schizophrenia dataset: accuracy = 83%; ASD dataset: accuracy = 80%). Shared atypical brain connections contributing to classification were mostly present in the default mode network (DMN) and salience network (SN). These functional connections were further related to severity of social deficits in ASD (p = 0.002). Distinct atypical connections were also more related to the DMN and SN, but showed different atypical connectivity patterns between the two disorders. These results suggest some common neural mechanisms contributing to schizophrenia and ASD, and may aid in understanding the pathology of these two neurodevelopmental disorders. Autism Res 2017, 10: 1776-1786. © 2017 International Society for Autism Research, Wiley Periodicals, Inc. Autism spectrum disorder (ASD) and schizophrenia are two common neurodevelopmental disorders which share several genetic and behavioral features. The present study identified common neural mechanisms contributing to ASD and schizophrenia using resting-state functional MRI data. The results may help to understand

  12. Vestibular Function in Adults With Epilepsy of Unknown Etiology.

    Science.gov (United States)

    Hamed, Sherifa A; Tohamy, Amal M; Oseilly, Amira M

    2017-09-01

    This study aimed to evaluate vestibular function in adults with chronic epilepsy of unknown etiology in the inter-ictal period. Epilepsy is a chronic medical disorder. Life-long therapy may be required in one-third of patients. Epilepsy is associated with comorbid somatic conditions which impairs patients' quality of life. This cross-sectional study included 28 with generalized tonic clonic (GTC) convulsions and 14 and 3 with temporal (TLE) and frontal lobe (FLE) epilepsies with secondary generalization (all were on regular carbamazepine therapy) and 40 healthy control subjects. The patients' mean age was 34.97 ± 7.35 years and the duration of illness was 18.75 ± 7.99 years. All underwent videonystagmography (VNG). Compared with controls, patients had frequent vestibular symptoms including dizziness (62.22%) (p = 0.0001) and sense of imbalance (44.44%) (p = 0.0001). Eleven patients (24.44%) had central vestibular dysfunction (p = 0.0001); 9 (20%) had mixed vestibular dysfunction and one (2.22%) had peripheral vestibular dysfunction (p = 0.0001). Abnormalities were observed in saccadic (44.4%) and pursuit (42.2%) eye movements, optokinetic nystagmus (42.2%) and positioning/positional (11.11%) and caloric (13.33%) testing. TLE and FLE were associated with more VNG abnormalities than GTC. No significant differences were observed in the demographic and clinical characteristics between patients with and without VNG abnormalities. Vestibular manifestations are frequent in patients with epilepsy. This may be a result of the permanent damaging effect of chronic epilepsy on the vestibular cortical areas and/or a toxic effect from prolonged carbamazepine therapy on the peripheral and central vestibular systems.

  13. The fungus Ustilago maydis and humans share disease-related proteins that are not found in Saccharomyces cerevisiae

    Directory of Open Access Journals (Sweden)

    Steinberg Gero

    2007-12-01

    Full Text Available Abstract Background The corn smut fungus Ustilago maydis is a well-established model system for molecular phytopathology. In addition, it recently became evident that U. maydis and humans share proteins and cellular processes that are not found in the standard fungal model Saccharomyces cerevisiae. This prompted us to do a comparative analysis of the predicted proteome of U. maydis, S. cerevisiae and humans. Results At a cut off at 20% identity over protein length, all three organisms share 1738 proteins, whereas both fungi share only 541 conserved proteins. Despite the evolutionary distance between U. maydis and humans, 777 proteins were shared. When applying a more stringent criterion (≥ 20% identity with a homologue in one organism over at least 50 amino acids and ≥ 10% less in the other organism, we found 681 proteins for the comparison of U. maydis and humans, whereas the both fungi share only 622 fungal specific proteins. Finally, we found that S. cerevisiae and humans shared 312 proteins. In the U. maydis to H. sapiens homology set 454 proteins are functionally classified and 42 proteins are related to serious human diseases. However, a large portion of 222 proteins are of unknown function. Conclusion The fungus U. maydis has a long history of being a model system for understanding DNA recombination and repair, as well as molecular plant pathology. The identification of functionally un-characterized genes that are conserved in humans and U. maydis opens the door for experimental work, which promises new insight in the cell biology of the mammalian cell.

  14. Identifying an unknown function in a parabolic equation with overspecified data via He's variational iteration method

    International Nuclear Information System (INIS)

    Dehghan, Mehdi; Tatari, Mehdi

    2008-01-01

    In this research, the He's variational iteration technique is used for computing an unknown time-dependent parameter in an inverse quasilinear parabolic partial differential equation. Parabolic partial differential equations with overspecified data play a crucial role in applied mathematics and physics, as they appear in various engineering models. The He's variational iteration method is an analytical procedure for finding solutions of differential equations, is based on the use of Lagrange multipliers for identification of an optimal value of a parameter in a functional. To show the efficiency of the new approach, several test problems are presented for one-, two- and three-dimensional cases

  15. High-functioning autism patients share similar but more severe impairments in verbal theory of mind than schizophrenia patients.

    Science.gov (United States)

    Tin, L N W; Lui, S S Y; Ho, K K Y; Hung, K S Y; Wang, Y; Yeung, H K H; Wong, T Y; Lam, S M; Chan, R C K; Cheung, E F C

    2018-06-01

    Evidence suggests that autism and schizophrenia share similarities in genetic, neuropsychological and behavioural aspects. Although both disorders are associated with theory of mind (ToM) impairments, a few studies have directly compared ToM between autism patients and schizophrenia patients. This study aimed to investigate to what extent high-functioning autism patients and schizophrenia patients share and differ in ToM performance. Thirty high-functioning autism patients, 30 schizophrenia patients and 30 healthy individuals were recruited. Participants were matched in age, gender and estimated intelligence quotient. The verbal-based Faux Pas Task and the visual-based Yoni Task were utilised to examine first- and higher-order, affective and cognitive ToM. The task/item difficulty of two paradigms was examined using mixed model analyses of variance (ANOVAs). Multiple ANOVAs and mixed model ANOVAs were used to examine group differences in ToM. The Faux Pas Task was more difficult than the Yoni Task. High-functioning autism patients showed more severely impaired verbal-based ToM in the Faux Pas Task, but shared similar visual-based ToM impairments in the Yoni Task with schizophrenia patients. The findings that individuals with high-functioning autism shared similar but more severe impairments in verbal ToM than individuals with schizophrenia support the autism-schizophrenia continuum. The finding that verbal-based but not visual-based ToM was more impaired in high-functioning autism patients than schizophrenia patients could be attributable to the varied task/item difficulty between the two paradigms.

  16. Longitudinal links between childhood peer acceptance and the neural correlates of sharing.

    Science.gov (United States)

    Will, Geert-Jan; Crone, Eveline A; van Lier, Pol A C; Güroğlu, Berna

    2018-01-01

    Childhood peer acceptance is associated with high levels of prosocial behavior and advanced perspective taking skills. Yet, the neurobiological mechanisms underlying these associations have not been studied. This functional magnetic resonance imaging study examined the neural correlates of sharing decisions in a group of adolescents who had a stable accepted status (n = 27) and a group who had a chronic rejected status (n = 19) across six elementary school grades. Both groups of adolescents played three allocation games in which they could share money with strangers with varying costs and profits to them and the other person. Stably accepted adolescents were more likely to share their money with unknown others than chronically rejected adolescents when sharing was not costly. Neuroimaging analyses showed that stably accepted adolescents, compared to chronically rejected adolescents, exhibited higher levels of activation in the temporo-parietal junction, posterior superior temporal sulcus, temporal pole, pre-supplementary motor area, and anterior insula during costly sharing decisions. These findings demonstrate that stable peer acceptance across childhood is associated with heightened activity in brain regions previously linked to perspective taking and the detection of social norm violations during adolescence, and thereby provide insight into processes underlying the widely established links between peer acceptance and prosocial behavior. © 2016 The Authors. Developmental Science Published by John Wiley & Sons Ltd.

  17. Meniscofibular Ligament: Morphology and Functional Significance of a Relatively Unknown Anatomical Structure

    Directory of Open Access Journals (Sweden)

    K. Natsis

    2012-01-01

    Full Text Available Purpose. A relatively unknown ligamentous structure of the posterolateral corner of the knee joint, the so-called meniscofibular ligament (MFL, was investigated as regards its macroscopic morphology, its histological features, and its reaction to knee movements. Material and Methods. MFL was exposed on 21 fresh-frozen unpaired knee joints. Its microscopic morphology was examined utilizing for comparison the fibular collateral and the popliteofibular ligament. Results. MFL was encountered in 100% of the specimens as a thin striplike fibrous band extending between the lower border of the lateral meniscus and the head of the fibula. MFL was tense during knee extension and external rotation of the tibia, whereas its histological features were similar to those of fibular collateral and popliteofibular ligament. Discussion. Its precise histological nature is studied as well as its tension alterations during knee movements. The potential functional significance of the MFL with respect to its role in avoidance of lateral meniscus and lateral coronary ligament tears is discussed. Conclusions. MFL presumably provides an additional protection to the lateral meniscus during the last stages of knee extension, as well as to the lateral coronary ligament reducing the possibility of a potential rupture.

  18. The use of copula functions for modeling the risk of investment in shares traded on the Warsaw Stock Exchange

    Science.gov (United States)

    Domino, Krzysztof; Błachowicz, Tomasz

    2014-11-01

    In our work copula functions and the Hurst exponent calculated using the local Detrended Fluctuation Analysis (DFA) were used to investigate the risk of investment made in shares traded on the Warsaw Stock Exchange. The combination of copula functions and the Hurst exponent calculated using local DFA is a new approach. For copula function analysis bivariate variables composed of shares prices of the PEKAO bank (a big bank with high capitalization) and other banks (PKOBP, BZ WBK, MBANK and HANDLOWY in decreasing capitalization order) and companies from other branches (KGHM-mining industry, PKNORLEN-petrol industry as well as ASSECO-software industry) were used. Hurst exponents were calculated for daily shares prices and used to predict high drops of those prices. It appeared to be a valuable indicator in the copula selection procedure, since Hurst exponent’s low values were pointing on heavily tailed copulas e.g. the Clayton one.

  19. Elimination of some unknown parameters and its effect on outlier detection

    Directory of Open Access Journals (Sweden)

    Serif Hekimoglu

    Full Text Available Outliers in observation set badly affect all the estimated unknown parameters and residuals, that is because outlier detection has a great importance for reliable estimation results. Tests for outliers (e.g. Baarda's and Pope's tests are frequently used to detect outliers in geodetic applications. In order to reduce the computational time, sometimes elimination of some unknown parameters, which are not of interest, is performed. In this case, although the estimated unknown parameters and residuals do not change, the cofactor matrix of the residuals and the redundancies of the observations change. In this study, the effects of the elimination of the unknown parameters on tests for outliers have been investigated. We have proved that the redundancies in initial functional model (IFM are smaller than the ones in reduced functional model (RFM where elimination is performed. To show this situation, a horizontal control network was simulated and then many experiences were performed. According to simulation results, tests for outlier in IFM are more reliable than the ones in RFM.

  20. Robust Adaptive Sliding Mode Control for Generalized Function Projective Synchronization of Different Chaotic Systems with Unknown Parameters

    Directory of Open Access Journals (Sweden)

    Xiuchun Li

    2013-01-01

    Full Text Available When the parameters of both drive and response systems are all unknown, an adaptive sliding mode controller, strongly robust to exotic perturbations, is designed for realizing generalized function projective synchronization. Sliding mode surface is given and the controlled system is asymptotically stable on this surface with the passage of time. Based on the adaptation laws and Lyapunov stability theory, an adaptive sliding controller is designed to ensure the occurrence of the sliding motion. Finally, numerical simulations are presented to verify the effectiveness and robustness of the proposed method even when both drive and response systems are perturbed with external disturbances.

  1. Unknown facets of Well-Known Scientists Series - Part II

    Directory of Open Access Journals (Sweden)

    V S Dixit

    2016-01-01

    Full Text Available 1st in the series of articles on “Unknown Facets of well-known Scientists” was about Sir Frederick Grant Banting, co-discoverer of Insulin, who also researched in Aviation and Diving Medicines, results of which brought extraordinary benefits for Flight crew during the World War II. The article was published in the previous issue of the Journal Unknown facets could be celebrated attributes, talents or otherwise, but it is necessary that we get to know fully about the “great mind". THIS ARTICLE IS ABOUT DR WERNER THEODOR OTTO FORSSMANN, A CARDIOLOGIST, WHO BECAME A UROLOGIST! Does the name Dr Forssmann ring a bell? He shared the 1956 Nobel Prize in Physiology or Medicine with “Andre Cournand and Dickinson Richards". The trio was awarded for their “discoveries concerning heart catheterization and pathological changes in the circulatory system". Dr Forssmann was nominated for performing an experiment in which he introduced a catheter into a vein of his arm, further passing it onward into his heart It was risky. This was in the year 1929. Subject of this article is the self-experimentation he carried out and what happened later.

  2. Employee share ownership in Germany

    DEFF Research Database (Denmark)

    Ortlieb, Renate; Matiaske, Wenzel; Fietze, Simon

    2016-01-01

    Politicians and scholars alike praise the significant benefits associated with employee share ownership (ESO). However, little is known about the concrete motives of firms to provide ESO to their employees. In particular, it is unknown how these motives correlate with firms’ contexts. Drawing...... on an institutional theoretical framework, this article examines what aims firms pursue through the provision of ESO. The data originate from a survey of firms in Germany. The cluster analytic findings indicate distinctive patterns of relationships between aims and firm characteristics. Aims related to employee...... performance are most important to foreign-owned firms, financial aims are most important to non-public small and medium-sized firms and aims related to corporate image are most important to big firms and to firms that do not provide profit sharing. Aims related to employee attraction and retention are almost...

  3. A Genealogical Look at Shared Ancestry on the X Chromosome.

    Science.gov (United States)

    Buffalo, Vince; Mount, Stephen M; Coop, Graham

    2016-09-01

    Close relatives can share large segments of their genome identical by descent (IBD) that can be identified in genome-wide polymorphism data sets. There are a range of methods to use these IBD segments to identify relatives and estimate their relationship. These methods have focused on sharing on the autosomes, as they provide a rich source of information about genealogical relationships. We hope to learn additional information about recent ancestry through shared IBD segments on the X chromosome, but currently lack the theoretical framework to use this information fully. Here, we fill this gap by developing probability distributions for the number and length of X chromosome segments shared IBD between an individual and an ancestor k generations back, as well as between half- and full-cousin relationships. Due to the inheritance pattern of the X and the fact that X homologous recombination occurs only in females (outside of the pseudoautosomal regions), the number of females along a genealogical lineage is a key quantity for understanding the number and length of the IBD segments shared among relatives. When inferring relationships among individuals, the number of female ancestors along a genealogical lineage will often be unknown. Therefore, our IBD segment length and number distributions marginalize over this unknown number of recombinational meioses through a distribution of recombinational meioses we derive. By using Bayes' theorem to invert these distributions, we can estimate the number of female ancestors between two relatives, giving us details about the genealogical relations between individuals not possible with autosomal data alone. Copyright © 2016 by the Genetics Society of America.

  4. MUSIC-type imaging of small perfectly conducting cracks with an unknown frequency

    International Nuclear Information System (INIS)

    Park, Won-Kwang

    2015-01-01

    MUltiple SIgnal Classification (MUSIC) is a famous non-iterative detection algorithm in inverse scattering problems. However, when the applied frequency is unknown, inaccurate locations are identified via MUSIC. This fact has been confirmed through numerical simulations. However, the reason behind this phenomenon has not been investigated theoretically. Motivated by this fact, we identify the structure of MUSIC-type imaging functionals with unknown frequency, by establishing a relationship with Bessel functions of order zero of the first kind. Through this, we can explain why inaccurate results appear. (paper)

  5. MUSIC-type imaging of small perfectly conducting cracks with an unknown frequency

    Science.gov (United States)

    Park, Won-Kwang

    2015-09-01

    MUltiple SIgnal Classification (MUSIC) is a famous non-iterative detection algorithm in inverse scattering problems. However, when the applied frequency is unknown, inaccurate locations are identified via MUSIC. This fact has been confirmed through numerical simulations. However, the reason behind this phenomenon has not been investigated theoretically. Motivated by this fact, we identify the structure of MUSIC-type imaging functionals with unknown frequency, by establishing a relationship with Bessel functions of order zero of the first kind. Through this, we can explain why inaccurate results appear.

  6. Off-Policy Actor-Critic Structure for Optimal Control of Unknown Systems With Disturbances.

    Science.gov (United States)

    Song, Ruizhuo; Lewis, Frank L; Wei, Qinglai; Zhang, Huaguang

    2016-05-01

    An optimal control method is developed for unknown continuous-time systems with unknown disturbances in this paper. The integral reinforcement learning (IRL) algorithm is presented to obtain the iterative control. Off-policy learning is used to allow the dynamics to be completely unknown. Neural networks are used to construct critic and action networks. It is shown that if there are unknown disturbances, off-policy IRL may not converge or may be biased. For reducing the influence of unknown disturbances, a disturbances compensation controller is added. It is proven that the weight errors are uniformly ultimately bounded based on Lyapunov techniques. Convergence of the Hamiltonian function is also proven. The simulation study demonstrates the effectiveness of the proposed optimal control method for unknown systems with disturbances.

  7. Iterative Selection of Unknown Weights in Direct Weight Optimization Identification

    Directory of Open Access Journals (Sweden)

    Xiao Xuan

    2014-01-01

    Full Text Available To the direct weight optimization identification of the nonlinear system, we add some linear terms about input sequences in the former linear affine function so as to approximate the nonlinear property. To choose the two classes of unknown weights in the more linear terms, this paper derives the detailed process on how to choose these unknown weights from theoretical analysis and engineering practice, respectively, and makes sure of their key roles between the unknown weights. From the theoretical analysis, the added unknown weights’ auxiliary role can be known in the whole process of approximating the nonlinear system. From the practical analysis, we learn how to transform one complex optimization problem to its corresponding common quadratic program problem. Then, the common quadratic program problem can be solved by the basic interior point method. Finally, the efficiency and possibility of the proposed strategies can be confirmed by the simulation results.

  8. Advancing Collaboration through Hydrologic Data and Model Sharing

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.

    2015-12-01

    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  9. SharePoint 2010 Field Guide

    CERN Document Server

    Mann, Steven; Gazmuri, Pablo; Caravajal, Steve; Wheeler, Christina

    2012-01-01

    Hands-on solutions for common SharePoint 2010 challenges Aimed at the more than 100 million licensed SharePoint 2010 users, this indispensable field guide addresses an abundance of common SharePoint 2010 problems and offers proven solutions. A team of authors encourages you to customize SharePoint beyond the out-of-the-box functionality so that you can build more complex solutions to these challenges. You?ll discover intricate details and specific full-scale solutions that you can then implement to your own SharePoint 2010 solutions.Tackles a variety of SharePoint 2010 problems ranging from si

  10. Professional SharePoint 2010 Administration

    CERN Document Server

    Klindt, Todd; Caravajal, Steve

    2010-01-01

    Thorough coverage of the improvements and changes to SharePoint 2010. SharePoint 2010 boasts a variety of incredible new features that will challenge even the most experienced administrator who is upgrading from SharePoint 2007. Written by a team of SharePoint experts, this book places a takes aim at showing you how to make these new features work right for you. Offering an in-depth look at SharePoint 2010, the authors focus on how SharePoint functionality has changed from its earliest version to its newest, and they provide you with detailed coverage of all the new features and capabilities.:

  11. Switch/router architectures shared-bus and shared-memory based systems

    CERN Document Server

    Aweya, James

    2018-01-01

    A practicing engineer's inclusive review of communication systems based on shared-bus and shared-memory switch/router architectures. This book delves into the inner workings of router and switch design in a comprehensive manner that is accessible to a broad audience. It begins by describing the role of switch/routers in a network, then moves on to the functional composition of a switch/router. A comparison of centralized versus distributed design of the architecture is also presented. The author discusses use of bus versus shared-memory for communication within a design, and also covers Quality of Service (QoS) mechanisms and configuration tools. Written in a simple style and language to allow readers to easily understand and appreciate the material presented, Switch/Router Architectures: Shared-Bus and Shared-Memory Based Systems discusses the design of multilayer switches—starting with the basic concepts and on to the basic architectures. It describes the evolution of multilayer switch designs and highli...

  12. Practical Intersubjectivity and Normative Guidance: Bratman on Shared Agency

    Directory of Open Access Journals (Sweden)

    Roth Abraham Sesshu

    2015-01-01

    Full Text Available In an important new book on shared agency, Michael Bratman develops an account of the normative demand for the coordination of intentions amongst participants in shared agency. Bratman seeks to understand this form of normative guidance in terms of that associated with individual planning intentions. I give reasons to resist his form of reductionism. In addition, I note how Bratman’s discussion raises the interesting issue of the function or purpose of shared intention and of shared agency more generally. According to Bratman, the function of shared intention is to promote interpersonal coordination of intention and action. I suggest that power sharing amongst participants must also be included as a function of shared intention.

  13. Solving differential equations with unknown constitutive relations as recurrent neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Hagge, Tobias J.; Stinis, Panagiotis; Yeung, Enoch H.; Tartakovsky, Alexandre M.

    2017-12-08

    We solve a system of ordinary differential equations with an unknown functional form of a sink (reaction rate) term. We assume that the measurements (time series) of state variables are partially available, and use a recurrent neural network to “learn” the reaction rate from this data. This is achieved by including discretized ordinary differential equations as part of a recurrent neural network training problem. We extend TensorFlow’s recurrent neural network architecture to create a simple but scalable and effective solver for the unknown functions, and apply it to a fedbatch bioreactor simulation problem. Use of techniques from recent deep learning literature enables training of functions with behavior manifesting over thousands of time steps. Our networks are structurally similar to recurrent neural networks, but differ in purpose, and require modified training strategies.

  14. What to Share and Why to Share? A Case Study of CrossBoundary Information Sharing in Taiwan e-Government

    Directory of Open Access Journals (Sweden)

    Tung-Mou Yang

    2013-06-01

    Full Text Available In the public sector, cross-boundary information sharing has been an important theme among governmental collaboration and is critical to organizational efficiency and performance. This research explores the types and characteristics of shared information and the intended purposes of information sharing. In the case study, the cross-boundary shared information can be abstracted into five fundamental types: the collected raw data, the value-added information, the administration oriented information, the administration-oriented knowledge, and the domain-oriented knowledge. Another framework is proposed to conceptualize the purposes of interagency information sharing. The identified seven purposes are administrative work, information search and verification, information aggregation, business process chain, innovative service, experience-based knowledge sharing, and crisis and emergency. The seven purposes do not mean to be an exhaustive list but to provide an initial conceptualization to perceive the functionalities and roles that cross-boundary information sharing plays among government agencies. The two proposed frameworks can help both researchers and practitioners perceive and clarify the fundamental part of cross-boundary information sharing in the public sector. The finding of this research is also expected to enrich the current information-sharing theories and to contribute to the current e-Government literature from an international perspective.

  15. Sharing analysis in the Pawns compiler

    Directory of Open Access Journals (Sweden)

    Lee Naish

    2015-09-01

    Full Text Available Pawns is a programming language under development that supports algebraic data types, polymorphism, higher order functions and “pure” declarative programming. It also supports impure imperative features including destructive update of shared data structures via pointers, allowing significantly increased efficiency for some operations. A novelty of Pawns is that all impure “effects” must be made obvious in the source code and they can be safely encapsulated in pure functions in a way that is checked by the compiler. Execution of a pure function can perform destructive updates on data structures that are local to or eventually returned from the function without risking modification of the data structures passed to the function. This paper describes the sharing analysis which allows impurity to be encapsulated. Aspects of the analysis are similar to other published work, but in addition it handles explicit pointers and destructive update, higher order functions including closures and pre- and post-conditions concerning sharing for functions.

  16. Pro SharePoint 2010 Search

    CERN Document Server

    Noble, J; Bakman-Mikalski, Dan

    2011-01-01

    Pro SharePoint 2010 Search gives you expert advice on planning, deploying and customizing searches in SharePoint 2010. Drawing on the authors' extensive experience of working with real-world SharePoint deployments, this book teaches everything you'll need to know to create well-designed SharePoint solutions that always keep the end-user's experience in mind. Increase your search efficiency with SharePoint 2010's search functionality: extend the search user interface using third-party tools, and utilize analytics to improve relevancy. This practical hands-on book is a must-have resource for any

  17. A Practical Framework for Sharing and Rendering Real-World Bidirectional Scattering Distribution Functions

    Energy Technology Data Exchange (ETDEWEB)

    Ward, Greg [Anywhere Software, Albany, CA (United States); Kurt, Murat [International Computer Institute, Ege University (Turkey); Bonneel, Nicolas [Harvard Univ., Cambridge, MA (United States)

    2012-09-30

    The utilization of real-world materials has been hindered by a lack of standards for sharing and interpreting measured data. This paper presents an XML representation and an Open Source C library to support bidirectional scattering distribution functions (BSDFs) in data-driven lighting simulation and rendering applications.The library provides for the efficient representation, query, and Monte Carlo sampling of arbitrary BSDFs in amodel-free framework. Currently, we support two BSDF data representations: one using a fixed subdivision of thehemisphere, and one with adaptive density. The fixed type has advantages for certain matrix operations, while theadaptive type can more accurately represent highly peaked data. We discuss advanced methods for data-drivenBSDF rendering for both types, including the proxy of detailed geometry to enhance appearance and accuracy.We also present an advanced interpolation method to reduce measured data into these standard representations.We end with our plan for future extensions and sharing of BSDF data.

  18. Renal disease masquerading as pyrexia of unknown origin

    Directory of Open Access Journals (Sweden)

    D Korivi

    2013-01-01

    Full Text Available Pyrexia of unknown origin is a challenging clinical problem. Infections, malignancies, and connective tissue diseases form the major etiologies for this condition. We report a case of a 57-year-old diabetic male who presented with fever of unknown origin for several months. The course of investigations led to a kidney biopsy which clinched the cause of his fever as well as the underlying diagnosis. The light microscopy findings of expansile storiform fibrosis with a dense inflammatory infiltrate suggested the diagnosis which was confirmed by positive staining of Immunoglobulin G4, the dense lympho-plasmacytic infiltrate and elevated serum IgG4 concentrations. A course of steroids followed by mycophenolate mofetil as maintenance immunosuppression rendered the patient afebrile with improvement of renal function.

  19. Unique and shared roles of the posterior parietal and dorsolateral prefrontal cortex in cognitive functions

    Directory of Open Access Journals (Sweden)

    Fumi eKatsuki

    2012-05-01

    Full Text Available The dorsolateral prefrontal and posterior parietal cortex are two parts of a broader brain network involved in the control of cognitive functions such as working memory, spatial attention, and decision making. The two areas share many functional properties and exhibit similar patterns of activation during the execution of mental operations. However, neurophysiological experiments in non-human primates have also documented subtle differences, revealing functional specialization within the fronto-parietal network. These differences include the ability of the dorsolateral prefrontal cortex to influence memory performance, attention allocation and motor responses to a greater extent, and to resist interference by distracting stimuli. In recent years, distinct cellular and anatomical differences have been identified, offering insights into how functional specialization is achieved. This article reviews the common functions and functional differences between the dorsolateral prefrontal and posterior parietal cortex, and their underlying mechanisms.

  20. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  1. Numerical method of identification of an unknown source term in a heat equation

    Directory of Open Access Journals (Sweden)

    Fatullayev Afet Golayo?lu

    2002-01-01

    Full Text Available A numerical procedure for an inverse problem of identification of an unknown source in a heat equation is presented. Approach of proposed method is to approximate unknown function by polygons linear pieces which are determined consecutively from the solution of minimization problem based on the overspecified data. Numerical examples are presented.

  2. Allocating monitoring effort in the face of unknown unknowns

    Science.gov (United States)

    Wintle, B.A.; Runge, M.C.; Bekessy, S.A.

    2010-01-01

    There is a growing view that to make efficient use of resources, ecological monitoring should be hypothesis-driven and targeted to address specific management questions. 'Targeted' monitoring has been contrasted with other approaches in which a range of quantities are monitored in case they exhibit an alarming trend or provide ad hoc ecological insights. The second form of monitoring, described as surveillance, has been criticized because it does not usually aim to discern between competing hypotheses, and its benefits are harder to identify a priori. The alternative view is that the existence of surveillance data may enable rapid corroboration of emerging hypotheses or help to detect important 'unknown unknowns' that, if undetected, could lead to catastrophic outcomes or missed opportunities. We derive a model to evaluate and compare the efficiency of investments in surveillance and targeted monitoring. We find that a decision to invest in surveillance monitoring may be defensible if: (1) the surveillance design is more likely to discover or corroborate previously unknown phenomena than a targeted design and (2) the expected benefits (or avoided costs) arising from discovery are substantially higher than those arising from a well-planned targeted design. Our examination highlights the importance of being explicit about the objectives, costs and expected benefits of monitoring in a decision analytic framework. ?? 2010 Blackwell Publishing Ltd/CNRS.

  3. Teleportation of an unknown bipartite state via non-maximally entangled two-particle state

    Institute of Scientific and Technical Information of China (English)

    Cao Hai-Jing; Guo Yan-Qing; Song He-Shan

    2006-01-01

    In this paper a new scheme for teleporting an unknown entangled state of two particles is proposed. To weaken the requirement for the quantum channel, without loss of generality, two communicators only share a non-maximally entangled two-particle state. Teleportation can be probabilistically realized if sender performs Bell-state measurements and Hadamard transformation and receiver introduces two auxiliary particles, operates G-not operation, single-qubit measurements and appropriate unitary transformations. The probability of successful teleportation is determined by the smaller one among the coefficients' absolute values of the quantum channel.

  4. Towards high-speed autonomous navigation of unknown environments

    Science.gov (United States)

    Richter, Charles; Roy, Nicholas

    2015-05-01

    In this paper, we summarize recent research enabling high-speed navigation in unknown environments for dynamic robots that perceive the world through onboard sensors. Many existing solutions to this problem guarantee safety by making the conservative assumption that any unknown portion of the map may contain an obstacle, and therefore constrain planned motions to lie entirely within known free space. In this work, we observe that safety constraints may significantly limit performance and that faster navigation is possible if the planner reasons about collision with unobserved obstacles probabilistically. Our overall approach is to use machine learning to approximate the expected costs of collision using the current state of the map and the planned trajectory. Our contribution is to demonstrate fast but safe planning using a learned function to predict future collision probabilities.

  5. Financial Development and Economic Growth: Known Knowns, Known Unknowns, and Unknown Unknowns

    OpenAIRE

    Ugo Panizza

    2014-01-01

    This paper summarizes the main findings of the literature on the relationship between financial and economic development (the known knowns), points to directions for future research (the known unknowns), and then speculates on the third Rumsfeldian category. The known knowns section organizes the empirical literature on finance and growth into three strands: (i) the traditional literature which established the link between finance and growth; (ii) the new literature which qualified some of th...

  6. Universal failure model for multi-unit systems with shared functionality

    International Nuclear Information System (INIS)

    Volovoi, Vitali

    2013-01-01

    A Universal Failure Model (UFM) is proposed for complex systems that rely on a large number of entities for performing a common function. Economy of scale or other considerations may dictate the need to pool resources for common purpose, but the resulting strong coupling precludes the grouping of those components into modules. Existing system-level failure models rely on modularity for reducing modeling complexity, so the UFM will fill an important gap in constructing efficient system-level models. Conceptually, the UFM resembles cellular automata (CA) infused with realistic failure mechanisms. Components’ behavior is determined based on the balance between their strength (capacity) and their load (demand) share. If the load exceeds the components’ capacity, the component fails and its load share is distributed among its neighbors (possibly with a time delay and load losses). The strength of components can degrade with time if the load exceeds an elastic threshold. The global load (demand) carried by the system can vary over time, with the peak values providing shocks to the system (e.g., wind loads in civil structures, electricity demand, stressful activities to human bodies, or drought in an ecosystem). Unlike the models traditionally studied by CA, the focus of the presented model is on the system reliability, and specifically on the study of time-to-failure distributions, rather than steady-state patterns and average time-to-failure characteristics. In this context, the relationships between the types of failure distributions and the parameters of the failure model are discussed

  7. Haplotype analysis and a novel allele-sharing method refines a chromosome 4p locus linked to bipolar affective disorder.

    Science.gov (United States)

    Le Hellard, Stephanie; Lee, Andrew J; Underwood, Sarah; Thomson, Pippa A; Morris, Stewart W; Torrance, Helen S; Anderson, Susan M; Adams, Richard R; Navarro, Pau; Christoforou, Andrea; Houlihan, Lorna M; Detera-Wadleigh, Sevilla; Owen, Michael J; Asherson, Philip; Muir, Walter J; Blackwood, Douglas H R; Wray, Naomi R; Porteous, David J; Evans, Kathryn L

    2007-03-15

    Bipolar affective disorder (BPAD) and schizophrenia (SCZ) are common conditions. Their causes are unknown, but they include a substantial genetic component. Previously, we described significant linkage of BPAD to a chromosome 4p locus within a large pedigree (F22). Others subsequently have found evidence for linkage of BPAD and SCZ to this region. We constructed high-resolution haplotypes for four linked families, calculated logarithm of the odds (LOD) scores, and developed a novel method to assess the extent of allele sharing within genes between the families. We describe an increase in the F22 LOD score for this region. Definition and comparison of the linked haplotypes allowed us to prioritize two subregions of 3.8 and 4.4 Mb. Analysis of the extent of allele sharing within these subregions identified 200 kb that shows increased allele sharing between families. Linkage of BPAD to chromosome 4p has been strengthened. Haplotype analysis in the additional linked families refined the 20-Mb linkage region. Development of a novel allele-sharing method allowed us to bridge the gap between conventional linkage and association studies. Description of a 200-kb region of increased allele sharing prioritizes this region, which contains two functional candidate genes for BPAD, SLC2A9, and WDR1, for subsequent studies.

  8. Rendezvous with connectivity preservation for multi-robot systems with an unknown leader

    Science.gov (United States)

    Dong, Yi

    2018-02-01

    This paper studies the leader-following rendezvous problem with connectivity preservation for multi-agent systems composed of uncertain multi-robot systems subject to external disturbances and an unknown leader, both of which are generated by a so-called exosystem with parametric uncertainty. By combining internal model design, potential function technique and adaptive control, two distributed control strategies are proposed to maintain the connectivity of the communication network, to achieve the asymptotic tracking of all the followers to the output of the unknown leader system, as well as to reject unknown external disturbances. It is also worth to mention that the uncertain parameters in the multi-robot systems and exosystem are further allowed to belong to unknown and unbounded sets when applying the second fully distributed control law containing a dynamic gain inspired by high-gain adaptive control or self-tuning regulator.

  9. Designing towards the unknown

    DEFF Research Database (Denmark)

    Wilde, Danielle; Underwood, Jenny

    2018-01-01

    the research potential to far-ranging possibilities. In this article we unpack the motivations driving the PKI project. We present our mixed-methodology, which entangles textile crafts, design interactions and materiality to shape an embodied enquiry. Our research outcomes are procedural and methodological......New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation—where outcomes remain unknown long enough that new discoveries become possible—is not easy in technology design where complex......, to design towards unknown outcomes, using unknown materials. The impossibility of this task is proving as useful as it is disruptive. At its most potent, it is destabilising expectations, aesthetics and processes. Keeping the researchers, collaborators and participants in a state of unknowing, is opening...

  10. Recension: Mao - The Unknown Story

    DEFF Research Database (Denmark)

    Clausen, Søren

    2005-01-01

    Anmeldelse - kritisk! - til Sveriges førende Kinatidsskrift af Jung Chang & Jon Halliday's sensationelle "Mao - the Unknown Story".......Anmeldelse - kritisk! - til Sveriges førende Kinatidsskrift af Jung Chang & Jon Halliday's sensationelle "Mao - the Unknown Story"....

  11. Exploiting fine-scale genetic and physiological variation of closely related microbes to reveal unknown enzyme functions.

    Science.gov (United States)

    Badur, Ahmet H; Plutz, Matthew J; Yalamanchili, Geethika; Jagtap, Sujit Sadashiv; Schweder, Thomas; Unfried, Frank; Markert, Stephanie; Polz, Martin F; Hehemann, Jan-Hendrik; Rao, Christopher V

    2017-08-04

    Polysaccharide degradation by marine microbes represents one of the largest and most rapid heterotrophic transformations of organic matter in the environment. Microbes employ systems of complementary carbohydrate-specific enzymes to deconstruct algal or plant polysaccharides (glycans) into monosaccharides. Because of the high diversity of glycan substrates, the functions of these enzymes are often difficult to establish. One solution to this problem may lie within naturally occurring microdiversity; varying numbers of enzymes, due to gene loss, duplication, or transfer, among closely related environmental microbes create metabolic differences akin to those generated by knock-out strains engineered in the laboratory used to establish the functions of unknown genes. Inspired by this natural fine-scale microbial diversity, we show here that it can be used to develop hypotheses guiding biochemical experiments for establishing the role of these enzymes in nature. In this work, we investigated alginate degradation among closely related strains of the marine bacterium Vibrio splendidus One strain, V. splendidus 13B01, exhibited high extracellular alginate lyase activity compared with other V. splendidus strains. To identify the enzymes responsible for this high extracellular activity, we compared V. splendidus 13B01 with the previously characterized V. splendidus 12B01, which has low extracellular activity and lacks two alginate lyase genes present in V. splendidus 13B01. Using a combination of genomics, proteomics, biochemical, and functional screening, we identified a polysaccharide lyase family 7 enzyme that is unique to V. splendidus 13B01, secreted, and responsible for the rapid digestion of extracellular alginate. These results demonstrate the value of querying the enzymatic repertoires of closely related microbes to rapidly pinpoint key proteins with beneficial functions. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  12. Phylogenetic molecular function annotation

    International Nuclear Information System (INIS)

    Engelhardt, Barbara E; Jordan, Michael I; Repo, Susanna T; Brenner, Steven E

    2009-01-01

    It is now easier to discover thousands of protein sequences in a new microbial genome than it is to biochemically characterize the specific activity of a single protein of unknown function. The molecular functions of protein sequences have typically been predicted using homology-based computational methods, which rely on the principle that homologous proteins share a similar function. However, some protein families include groups of proteins with different molecular functions. A phylogenetic approach for predicting molecular function (sometimes called 'phylogenomics') is an effective means to predict protein molecular function. These methods incorporate functional evidence from all members of a family that have functional characterizations using the evolutionary history of the protein family to make robust predictions for the uncharacterized proteins. However, they are often difficult to apply on a genome-wide scale because of the time-consuming step of reconstructing the phylogenies of each protein to be annotated. Our automated approach for function annotation using phylogeny, the SIFTER (Statistical Inference of Function Through Evolutionary Relationships) methodology, uses a statistical graphical model to compute the probabilities of molecular functions for unannotated proteins. Our benchmark tests showed that SIFTER provides accurate functional predictions on various protein families, outperforming other available methods.

  13. Payoff Shares in Two-Player Contests

    Directory of Open Access Journals (Sweden)

    Samuel Häfner

    2016-09-01

    Full Text Available In imperfectly discriminating contests with symmetric valuations, equilibrium payoffs are positive shares of the value of the prize. In contrast to a bargaining situation, players’ shares sum to less than one because a residual share of the value is lost due to rent dissipation. In this paper, we consider contests with two players and investigate the relationship between these equilibrium shares and the parameters of a class of asymmetric Tullock contest success functions. Our main finding is that any players’ shares that sum up to less than one can arise as the unique outcome of a pure-strategy Nash equilibrium for appropriate parameters.

  14. SharePoint 2010 Development For Dummies

    CERN Document Server

    Withee, Ken

    2011-01-01

    A much-needed guide that shows you how to leverage SharePoint tools without writing a line of code!. The great news about SharePoint is…you don't need to be a seasoned .NET developer to develop custom functions for it. This book shows you how to use SharePoint Designer, Report Builder, Dashboard Designer, InfoPath, Excel, Word, Visio, and the SharePoint web-based UI to design and develop—without ever writing a line of code! Learn how to customize your site, build SharePoint apps, start social networking, or add Web parts.  This straightforward guide makes everything easier.: Introduces you to

  15. Stability of Nonlinear Systems with Unknown Time-varying Feedback Delay

    Science.gov (United States)

    Chunodkar, Apurva A.; Akella, Maruthi R.

    2013-12-01

    This paper considers the problem of stabilizing a class of nonlinear systems with unknown bounded delayed feedback wherein the time-varying delay is 1) piecewise constant 2) continuous with a bounded rate. We also consider application of these results to the stabilization of rigid-body attitude dynamics. In the first case, the time-delay in feedback is modeled specifically as a switch among an arbitrarily large set of unknown constant values with a known strict upper bound. The feedback is a linear function of the delayed states. In the case of linear systems with switched delay feedback, a new sufficiency condition for average dwell time result is presented using a complete type Lyapunov-Krasovskii (L-K) functional approach. Further, the corresponding switched system with nonlinear perturbations is proven to be exponentially stable inside a well characterized region of attraction for an appropriately chosen average dwell time. In the second case, the concept of the complete type L-K functional is extended to a class of nonlinear time-delay systems with unknown time-varying time-delay. This extension ensures stability robustness to time-delay in the control design for all values of time-delay less than the known upper bound. Model-transformation is used in order to partition the nonlinear system into a nominal linear part that is exponentially stable with a bounded perturbation. We obtain sufficient conditions which ensure exponential stability inside a region of attraction estimate. A constructive method to evaluate the sufficient conditions is presented together with comparison with the corresponding constant and piecewise constant delay. Numerical simulations are performed to illustrate the theoretical results of this paper.

  16. Gratitude depends on the relational model of communal sharing.

    Science.gov (United States)

    Simão, Cláudia; Seibt, Beate

    2014-01-01

    We studied the relation between benefits, perception of social relationships and gratitude. Across three studies, we provide evidence that benefits increase gratitude to the extent to which one applies a mental model of a communal relationship. In Study 1, the communal sharing relational model, and no other relational models, predicted the amount of gratitude participants felt after imagining receiving a benefit from a new acquaintance. In Study 2, participants recalled a large benefit they had received. Applying a communal sharing relational model increased feelings of gratitude for the benefit. In Study 3, we manipulated whether the participant or another person received a benefit from an unknown other. Again, we found that the extent of communal sharing perceived in the relationship with the stranger predicted gratitude. An additional finding of Study 2 was that communal sharing predicted future gratitude regarding the relational partner in a longitudinal design. To conclude, applying a communal sharing model predicts gratitude regarding concrete benefits and regarding the relational partner, presumably because one perceives the communal partner as motivated to meet one's needs. Finally, in Study 3, we found in addition that being the recipient of a benefit without opportunity to repay directly increased communal sharing, and indirectly increased gratitude. These circumstances thus seem to favor the attribution of communal norms, leading to a communal sharing representation and in turn to gratitude. We discuss the importance of relational models as mental representations of relationships for feelings of gratitude.

  17. Shared genetic aetiology between cognitive functions and physical and mental health in UK Biobank (N=112 151) and 24 GWAS consortia

    Science.gov (United States)

    Hagenaars, S P; Harris, S E; Davies, G; Hill, W D; Liewald, D C M; Ritchie, S J; Marioni, R E; Fawns-Ritchie, C; Cullen, B; Malik, R; Worrall, B B; Sudlow, C L M; Wardlaw, J M; Gallacher, J; Pell, J; McIntosh, A M; Smith, D J; Gale, C R; Deary, I J

    2016-01-01

    Causes of the well-documented association between low levels of cognitive functioning and many adverse neuropsychiatric outcomes, poorer physical health and earlier death remain unknown. We used linkage disequilibrium regression and polygenic profile scoring to test for shared genetic aetiology between cognitive functions and neuropsychiatric disorders and physical health. Using information provided by many published genome-wide association study consortia, we created polygenic profile scores for 24 vascular–metabolic, neuropsychiatric, physiological–anthropometric and cognitive traits in the participants of UK Biobank, a very large population-based sample (N=112 151). Pleiotropy between cognitive and health traits was quantified by deriving genetic correlations using summary genome-wide association study statistics and to the method of linkage disequilibrium score regression. Substantial and significant genetic correlations were observed between cognitive test scores in the UK Biobank sample and many of the mental and physical health-related traits and disorders assessed here. In addition, highly significant associations were observed between the cognitive test scores in the UK Biobank sample and many polygenic profile scores, including coronary artery disease, stroke, Alzheimer's disease, schizophrenia, autism, major depressive disorder, body mass index, intracranial volume, infant head circumference and childhood cognitive ability. Where disease diagnosis was available for UK Biobank participants, we were able to show that these results were not confounded by those who had the relevant disease. These findings indicate that a substantial level of pleiotropy exists between cognitive abilities and many human mental and physical health disorders and traits and that it can be used to predict phenotypic variance across samples. PMID:26809841

  18. A learning-based semi-autonomous controller for robotic exploration of unknown disaster scenes while searching for victims.

    Science.gov (United States)

    Doroodgar, Barzin; Liu, Yugang; Nejat, Goldie

    2014-12-01

    Semi-autonomous control schemes can address the limitations of both teleoperation and fully autonomous robotic control of rescue robots in disaster environments by allowing a human operator to cooperate and share such tasks with a rescue robot as navigation, exploration, and victim identification. In this paper, we present a unique hierarchical reinforcement learning-based semi-autonomous control architecture for rescue robots operating in cluttered and unknown urban search and rescue (USAR) environments. The aim of the controller is to enable a rescue robot to continuously learn from its own experiences in an environment in order to improve its overall performance in exploration of unknown disaster scenes. A direction-based exploration technique is integrated in the controller to expand the search area of the robot via the classification of regions and the rubble piles within these regions. Both simulations and physical experiments in USAR-like environments verify the robustness of the proposed HRL-based semi-autonomous controller to unknown cluttered scenes with different sizes and varying types of configurations.

  19. A Karaoke System with Real-Time Media Merging and Sharing Functions for a Cloud-Computing-Integrated Mobile Device

    Directory of Open Access Journals (Sweden)

    Her-Tyan Yeh

    2013-01-01

    Full Text Available Mobile devices such as personal digital assistants (PDAs, smartphones, and tablets have increased in popularity and are extremely efficient for work-related, social, and entertainment uses. Popular entertainment services have also attracted substantial attention. Thus, relevant industries have exerted considerable efforts in establishing a method by which mobile devices can be used to develop excellent and convenient entertainment services. Because cloud-computing technology is mature and possesses a strong computing processing capacity, integrating this technology into the entertainment service function in mobile devices can reduce the data load on a system and maintain mobile device performances. This study combines cloud computing with a mobile device to design a karaoke system that contains real-time media merging and sharing functions. This system enables users to download music videos (MVs from their mobile device and sing and record their singing by using the device. They can upload the recorded song to the cloud server where it is merged with real-time media. Subsequently, by employing a media streaming technology, users can store their personal MVs in their mobile device or computer and instantaneously share these videos with others on the Internet. Through this process, people can instantly watch shared videos, enjoy the leisure and entertainment effects of mobile devices, and satisfy their desire for singing.

  20. Exploring Shared SRAM Tables in FPGAs for Larger LUTs and Higher Degree of Sharing

    Directory of Open Access Journals (Sweden)

    Ali Asghar

    2017-01-01

    Full Text Available In modern SRAM based Field Programmable Gate Arrays, a Look-Up Table (LUT is the principal constituent logic element which can realize every possible Boolean function. However, this flexibility of LUTs comes with a heavy area penalty. A part of this area overhead comes from the increased amount of configuration memory which rises exponentially as the LUT size increases. In this paper, we first present a detailed analysis of a previously proposed FPGA architecture which allows sharing of LUTs memory (SRAM tables among NPN-equivalent functions, to reduce the area as well as the number of configuration bits. We then propose several methods to improve the existing architecture. A new clustering technique has been proposed which packs NPN-equivalent functions together inside a Configurable Logic Block (CLB. We also make use of a recently proposed high performance Boolean matching algorithm to perform NPN classification. To enhance area savings further, we evaluate the feasibility of more than two LUTs sharing the same SRAM table. Consequently, this work explores the SRAM table sharing approach for a range of LUT sizes (4–7, while varying the cluster sizes (4–16. Experimental results on MCNC benchmark circuits set show an overall area reduction of ~7% while maintaining the same critical path delay.

  1. Large-Scale Unsupervised Hashing with Shared Structure Learning.

    Science.gov (United States)

    Liu, Xianglong; Mu, Yadong; Zhang, Danchen; Lang, Bo; Li, Xuelong

    2015-09-01

    Hashing methods are effective in generating compact binary signatures for images and videos. This paper addresses an important open issue in the literature, i.e., how to learn compact hash codes by enhancing the complementarity among different hash functions. Most of prior studies solve this problem either by adopting time-consuming sequential learning algorithms or by generating the hash functions which are subject to some deliberately-designed constraints (e.g., enforcing hash functions orthogonal to one another). We analyze the drawbacks of past works and propose a new solution to this problem. Our idea is to decompose the feature space into a subspace shared by all hash functions and its complementary subspace. On one hand, the shared subspace, corresponding to the common structure across different hash functions, conveys most relevant information for the hashing task. Similar to data de-noising, irrelevant information is explicitly suppressed during hash function generation. On the other hand, in case that the complementary subspace also contains useful information for specific hash functions, the final form of our proposed hashing scheme is a compromise between these two kinds of subspaces. To make hash functions not only preserve the local neighborhood structure but also capture the global cluster distribution of the whole data, an objective function incorporating spectral embedding loss, binary quantization loss, and shared subspace contribution is introduced to guide the hash function learning. We propose an efficient alternating optimization method to simultaneously learn both the shared structure and the hash functions. Experimental results on three well-known benchmarks CIFAR-10, NUS-WIDE, and a-TRECVID demonstrate that our approach significantly outperforms state-of-the-art hashing methods.

  2. Certain non-linear differential polynomials sharing a non zero polynomial

    Directory of Open Access Journals (Sweden)

    Majumder Sujoy

    2015-10-01

    functions sharing a nonzero polynomial and obtain two results which improves and generalizes the results due to L. Liu [Uniqueness of meromorphic functions and differential polynomials, Comput. Math. Appl., 56 (2008, 3236-3245.] and P. Sahoo [Uniqueness and weighted value sharing of meromorphic functions, Applied. Math. E-Notes., 11 (2011, 23-32.].

  3. The Structure-Function Linkage Database.

    Science.gov (United States)

    Akiva, Eyal; Brown, Shoshana; Almonacid, Daniel E; Barber, Alan E; Custer, Ashley F; Hicks, Michael A; Huang, Conrad C; Lauck, Florian; Mashiyama, Susan T; Meng, Elaine C; Mischel, David; Morris, John H; Ojha, Sunil; Schnoes, Alexandra M; Stryke, Doug; Yunes, Jeffrey M; Ferrin, Thomas E; Holliday, Gemma L; Babbitt, Patricia C

    2014-01-01

    The Structure-Function Linkage Database (SFLD, http://sfld.rbvi.ucsf.edu/) is a manually curated classification resource describing structure-function relationships for functionally diverse enzyme superfamilies. Members of such superfamilies are diverse in their overall reactions yet share a common ancestor and some conserved active site features associated with conserved functional attributes such as a partial reaction. Thus, despite their different functions, members of these superfamilies 'look alike', making them easy to misannotate. To address this complexity and enable rational transfer of functional features to unknowns only for those members for which we have sufficient functional information, we subdivide superfamily members into subgroups using sequence information, and lastly into families, sets of enzymes known to catalyze the same reaction using the same mechanistic strategy. Browsing and searching options in the SFLD provide access to all of these levels. The SFLD offers manually curated as well as automatically classified superfamily sets, both accompanied by search and download options for all hierarchical levels. Additional information includes multiple sequence alignments, tab-separated files of functional and other attributes, and sequence similarity networks. The latter provide a new and intuitively powerful way to visualize functional trends mapped to the context of sequence similarity.

  4. Vernalization and the Chilling Requirement to Exit Bud Dormancy: Shared or Separate Regulation?

    Directory of Open Access Journals (Sweden)

    Amy M Brunner

    2014-12-01

    Full Text Available Similarities have long been recognized between vernalization, the prolonged exposure to cold temperatures that promotes the floral transition in many plants, and the chilling requirement to release bud dormancy in woody plants of temperate climates. In both cases the extended chilling period occurring during winter is used to coordinate developmental events to the appropriate seasonal time. However, whether or not these processes share common regulatory components and molecular mechanisms remain largely unknown. Both gene function and association genetics studies in Populus are beginning to answer this question. In Populus, studies have revealed that orthologs of the antagonistic flowering time genes FT and CEN/TFL1 might have central roles in both processes. We review Populus seasonal shoot development related to dormancy release and the floral transition and evidence for FT/TFL1-mediated regulation of these processes to consider the question of regulatory overlap. In addition, we discuss the potential for and challenges to integrating functional and population genomics studies to uncover the regulatory mechanisms underpinning these processes in woody plant systems.

  5. Share Contract Choices and Economic Performance

    DEFF Research Database (Denmark)

    Salazar Espinoza, César Antonio

    2015-01-01

    framework, we estimate a dose-response function to study the formation of contracts and identify the marginal effects of changes in crew profit shares on fishing returns in Chilean artisanal fisheries. The results support share contract choices based on bargaining power, monitoring costs, technology, state...... of fishing resources, and outside options. We find significant effects of increasing crew profit shares on vessel owner returns in the interval (0.25, 0.65). The results vary across fisheries, however. While the effects are not significant in the fish group, they are larger and robust for molluscs...

  6. Functional MRI examination of empathy for pain in people with schizophrenia reveals abnormal activation related to cognitive perspective-taking but typical activation linked to affective sharing

    Science.gov (United States)

    Vistoli, Damien; Lavoie, Marie-Audrey; Sutliff, Stephanie; Jackson, Philip L.; Achim, Amélie M.

    2017-01-01

    Background Schizophrenia is associated with important disturbances in empathy that are related to everyday functioning. Empathy is classically defined as including affective (sharing others’ emotions) and cognitive (taking others’ cognitive perspectives) processes. In healthy individuals, studies on empathy for pain revealed specific brain systems associated with these sets of processes, notably the anterior middle cingulate (aMCC) and anterior insula (AI) for affective sharing and the bilateral temporoparietal junction (TPJ) for the cognitive processes, but the integrity of these systems in patients with schizophrenia remains uncertain. Methods Patients with schizophrenia and healthy controls performed a pain empathy task while undergoing fMRI scanning. Participants observed pictures of hands in either painful or nonpainful situations and rated the level of pain while imagining either themselves (self) or an unknown person (other) in these situations. Results We included 27 patients with schizophrenia and 21 healthy controls in our analyses. For the pain versus no pain contrast, patients showed overall typical activation patterns in the aMCC and AI, with only a small part of the aMCC showing reduced activation compared with controls. For the other versus self contrast, patients showed an abnormal modulation of activation in the TPJ bilaterally (extending to the posterior superior temporal sulcus, referred to as the TPJ/pSTS). Limitations The design included an unnecessary manipulation of the visual perspective that reduced the number of trials for analysis. The sample size may not account for the heterogeneity of schizophrenia. Conclusion People with schizophrenia showed relatively intact brain activation when observing others’ pain, but showed abnormalities when asked to take the cognitive perspectives of others. PMID:28556774

  7. Efficient implementations of block sparse matrix operations on shared memory vector machines

    International Nuclear Information System (INIS)

    Washio, T.; Maruyama, K.; Osoda, T.; Doi, S.; Shimizu, F.

    2000-01-01

    In this paper, we propose vectorization and shared memory-parallelization techniques for block-type random sparse matrix operations in finite element (FEM) applications. Here, a block corresponds to unknowns on one node in the FEM mesh and we assume that the block size is constant over the mesh. First, we discuss some basic vectorization ideas (the jagged diagonal (JAD) format and the segmented scan algorithm) for the sparse matrix-vector product. Then, we extend these ideas to the shared memory parallelization. After that, we show that the techniques can be applied not only to the sparse matrix-vector product but also to the sparse matrix-matrix product, the incomplete or complete sparse LU factorization and preconditioning. Finally, we report the performance evaluation results obtained on an NEC SX-4 shared memory vector machine for linear systems in some FEM applications. (author)

  8. Known knowns, known unknowns and unknown unknowns in prokaryotic transposition.

    Science.gov (United States)

    Siguier, Patricia; Gourbeyre, Edith; Chandler, Michael

    2017-08-01

    Although the phenomenon of transposition has been known for over 60 years, its overarching importance in modifying and streamlining genomes took some time to recognize. In spite of a robust understanding of transposition of some TE, there remain a number of important TE groups with potential high genome impact and unknown transposition mechanisms and yet others, only recently identified by bioinformatics, yet to be formally confirmed as mobile. Here, we point to some areas of limited understanding concerning well established important TE groups with DDE Tpases, to address central gaps in our knowledge of characterised Tn with other types of Tpases and finally, to highlight new potentially mobile DNA species. It is not exhaustive. Examples have been chosen to provide encouragement in the continued exploration of the considerable prokaryotic mobilome especially in light of the current threat to public health posed by the spread of multiple Ab R . Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Matrix- and tensor-based recommender systems for the discovery of currently unknown inorganic compounds

    Science.gov (United States)

    Seko, Atsuto; Hayashi, Hiroyuki; Kashima, Hisashi; Tanaka, Isao

    2018-01-01

    Chemically relevant compositions (CRCs) and atomic arrangements of inorganic compounds have been collected as inorganic crystal structure databases. Machine learning is a unique approach to search for currently unknown CRCs from vast candidates. Herein we propose matrix- and tensor-based recommender system approaches to predict currently unknown CRCs from database entries of CRCs. Firstly, the performance of the recommender system approaches to discover currently unknown CRCs is examined. A Tucker decomposition recommender system shows the best discovery rate of CRCs as the majority of the top 100 recommended ternary and quaternary compositions correspond to CRCs. Secondly, systematic density functional theory (DFT) calculations are performed to investigate the phase stability of the recommended compositions. The phase stability of the 27 compositions reveals that 23 currently unknown compounds are newly found to be stable. These results indicate that the recommender system has great potential to accelerate the discovery of new compounds.

  10. Quantum circuits cannot control unknown operations

    International Nuclear Information System (INIS)

    Araújo, Mateus; Feix, Adrien; Costa, Fabio; Brukner, Časlav

    2014-01-01

    One of the essential building blocks of classical computer programs is the ‘if’ clause, which executes a subroutine depending on the value of a control variable. Similarly, several quantum algorithms rely on applying a unitary operation conditioned on the state of a control system. Here we show that this control cannot be performed by a quantum circuit if the unitary is completely unknown. The task remains impossible even if we allow the control to be done modulo a global phase. However, this no-go theorem does not prevent implementing quantum control of unknown unitaries in practice, as any physical implementation of an unknown unitary provides additional information that makes the control possible. We then argue that one should extend the quantum circuit formalism to capture this possibility in a straightforward way. This is done by allowing unknown unitaries to be applied to subspaces and not only to subsystems. (paper)

  11. Evaluation of shared genetic susceptibility loci between autoimmune diseases and schizophrenia based on genome-wide association studies

    DEFF Research Database (Denmark)

    Hoeffding, Louise K E; Rosengren, Anders; Thygesen, Johan H

    2017-01-01

    Background: Epidemiological studies have documented higher than expected comorbidity (or, in some cases, inverse comorbidity) between schizophrenia and several autoimmune disorders. It remains unknown whether this comorbidity reflects shared genetic susceptibility loci.  Aims: The present study a...

  12. Ancient Origin of the CARD–Coiled Coil/Bcl10/MALT1-Like Paracaspase Signaling Complex Indicates Unknown Critical Functions

    Directory of Open Access Journals (Sweden)

    Jens Staal

    2018-05-01

    Full Text Available The CARD–coiled coil (CC/Bcl10/MALT1-like paracaspase (CBM signaling complexes composed of a CARD–CC family member (CARD-9, -10, -11, or -14, Bcl10, and the type 1 paracaspase MALT1 (PCASP1 play a pivotal role in immunity, inflammation, and cancer. Targeting MALT1 proteolytic activity is of potential therapeutic interest. However, little is known about the evolutionary origin and the original functions of the CBM complex. Type 1 paracaspases originated before the last common ancestor of planulozoa (bilaterians and cnidarians. Notably in bilaterians, Ecdysozoa (e.g., nematodes and insects lacks Bcl10, whereas other lineages have a Bcl10 homolog. A survey of invertebrate CARD–CC homologs revealed such homologs only in species with Bcl10, indicating an ancient common origin of the entire CBM complex. Furthermore, vertebrate-like Syk/Zap70 tyrosine kinase homologs with the ITAM-binding SH2 domain were only found in invertebrate organisms with CARD–CC/Bcl10, indicating that this pathway might be related to the original function of the CBM complex. Moreover, the type 1 paracaspase sequences from invertebrate organisms that have CARD–CC/Bcl10 are more similar to vertebrate paracaspases. Functional analysis of protein–protein interactions, NF-κB signaling, and CYLD cleavage for selected invertebrate type 1 paracaspase and Bcl10 homologs supports this scenario and indicates an ancient origin of the CARD–CC/Bcl10/paracaspase signaling complex. By contrast, many of the known MALT1-associated activities evolved fairly recently, indicating that unknown functions are at the basis of the protein conservation. As a proof-of-concept, we provide initial evidence for a CBM- and NF-κB-independent neuronal function of the Caenorhabditis elegans type 1 paracaspase malt-1. In conclusion, this study shows how evolutionary insights may point at alternative functions of MALT1.

  13. Shared orthographic neuronal representations for spelling and reading.

    Science.gov (United States)

    Purcell, Jeremy J; Jiang, Xiong; Eden, Guinevere F

    2017-02-15

    A central question in the study of the neural basis of written language is whether reading and spelling utilize shared orthographic representations. While recent studies employing fMRI to test this question report that the left inferior frontal gyrus (IFG) and ventral occipitotemporal cortex (vOTC) are active during both spelling and reading in the same subjects (Purcell et al., 2011a; Rapp and Lipka, 2011), the spatial resolution of fMRI limits the interpretation of these findings. Specifically, it is unknown if the neurons which encode orthography for reading are also involved in spelling of the same words. Here we address this question by employing an event-related functional magnetic resonance imaging-adaptation (fMRI-A) paradigm designed to examine shared orthographic representations across spelling and reading. First, we identified areas that independently showed adaptation to reading, and adaptation to spelling. Then we identified spatial convergence for these two separate maps via a conjunction analysis. Consistent with previous studies (Purcell et al., 2011a; Rapp and Lipka, 2011), this analysis revealed the left dorsal IFG, vOTC and supplementary motor area. To further validate these observations, we then interrogated these regions using an across-task adaptation technique, and found adaptation across reading and spelling in the left dorsal IFG (BA 44/9). Our final analysis focused specifically on the Visual Word Form Area (VWFA) in the vOTC, whose variability in location among subjects requires the use of subject-specific identification mechanisms (Glezer and Riesenhuber, 2013). Using a functional localizer for reading, we defined the VWFA in each subject, and found adaptation effects for both within the spelling and reading conditions, respectively, as well as across spelling and reading. Because none of these effects were observed during a phonological/semantic control condition, we conclude that the left dorsal IFG and VWFA are involved in accessing

  14. Identification of Novel Functional Inhibitors of Acid Sphingomyelinase

    DEFF Research Database (Denmark)

    Kornhuber, Johannes; Muehlbacher, Markus; Trapp, Stefan

    2011-01-01

    of ASM, such as Alzheimer's disease, major depression, radiation-and chemotherapy-induced apoptosis and endotoxic shock syndrome. Residual activity of ASM measured in the presence of 10 mu M drug concentration shows a bimodal distribution; thus the tested drugs can be classified into two groups......We describe a hitherto unknown feature for 27 small drug-like molecules, namely functional inhibition of acid sphingomyelinase (ASM). These entities named FIASMAs (Functional Inhibitors of Acid SphingoMyelinAse), therefore, can be potentially used to treat diseases associated with enhanced activity...... with lower and higher inhibitory activity. All FIASMAs share distinct physicochemical properties in showing lipophilic and weakly basic properties. Hierarchical clustering of Tanimoto coefficients revealed that FIASMAs occur among drugs of various chemical scaffolds. Moreover, FIASMAs more frequently violate...

  15. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  16. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  17. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  18. Explanation and inference: Mechanistic and functional explanations guide property generalization

    Directory of Open Access Journals (Sweden)

    Tania eLombrozo

    2014-09-01

    Full Text Available The ability to generalize from the known to the unknown is central to learning and inference. Two experiments explore the relationship between how a property is explained and how that property is generalized to novel species and artifacts. The experiments contrast the consequences of explaining a property mechanistically, by appeal to parts and processes, with the consequences of explaining the property functionally, by appeal to functions and goals. The findings suggest that properties that are explained functionally are more likely to be generalized on the basis of shared functions, with a weaker relationship between mechanistic explanations and generalization on the basis of shared parts and processes. The influence of explanation type on generalization holds even though all participants are provided with the same mechanistic and functional information, and whether an explanation type is freely generated (Experiment 1, experimentally provided (Experiment 2, or experimentally induced (Experiment 2. The experiments also demonstrate that explanations and generalizations of a particular type (mechanistic or functional can be experimentally induced by providing sample explanations of that type, with a comparable effect when the sample explanations come from the same domain or from a different domains. These results suggest that explanations serve as a guide to generalization, and contribute to a growing body of work supporting the value of distinguishing mechanistic and functional explanations.

  19. Explanation and inference: mechanistic and functional explanations guide property generalization.

    Science.gov (United States)

    Lombrozo, Tania; Gwynne, Nicholas Z

    2014-01-01

    The ability to generalize from the known to the unknown is central to learning and inference. Two experiments explore the relationship between how a property is explained and how that property is generalized to novel species and artifacts. The experiments contrast the consequences of explaining a property mechanistically, by appeal to parts and processes, with the consequences of explaining the property functionally, by appeal to functions and goals. The findings suggest that properties that are explained functionally are more likely to be generalized on the basis of shared functions, with a weaker relationship between mechanistic explanations and generalization on the basis of shared parts and processes. The influence of explanation type on generalization holds even though all participants are provided with the same mechanistic and functional information, and whether an explanation type is freely generated (Experiment 1), experimentally provided (Experiment 2), or experimentally induced (Experiment 2). The experiments also demonstrate that explanations and generalizations of a particular type (mechanistic or functional) can be experimentally induced by providing sample explanations of that type, with a comparable effect when the sample explanations come from the same domain or from a different domains. These results suggest that explanations serve as a guide to generalization, and contribute to a growing body of work supporting the value of distinguishing mechanistic and functional explanations.

  20. Assembly of Robust Bacterial Microcompartment Shells Using Building Blocks from an Organelle of Unknown Function

    Energy Technology Data Exchange (ETDEWEB)

    Lassila, JK; Bernstein, SL; Kinney, JN; Axen, SD; Kerfeld, CA

    2014-05-29

    Bacterial microconnpartnnents (BMCs) sequester enzymes from the cytoplasmic environment by encapsulation inside a selectively permeable protein shell. Bioinformatic analyses indicate that many bacteria encode BMC clusters of unknown function and with diverse combinations of shell proteins. The genome of the halophilic myxobacterium Haliangium ochraceum encodes one of the most atypical sets of shell proteins in terms of composition and primary structure. We found that microconnpartnnent shells could be purified in high yield when all seven H. ochraceum BMC shell genes were expressed from a synthetic operon in Escherichia coll. These shells differ substantially from previously isolated shell systems in that they are considerably smaller and more homogeneous, with measured diameters of 39 2 nm. The size and nearly uniform geometry allowed the development of a structural model for the shells composed of 260 hexagonal units and 13 hexagons per icosahedral face. We found that new proteins could be recruited to the shells by fusion to a predicted targeting peptide sequence, setting the stage for the use of these remarkably homogeneous shells for applications such as three-dimensional scaffolding and the construction of synthetic BMCs. Our results demonstrate the value of selecting from the diversity of BMC shell building blocks found in genomic sequence data for the construction of novel compartments. (C) 2014 Elsevier Ltd. All rights reserved.

  1. Functional outcome and survival after radiotherapy of metastatic spinal cord compression in patients with cancer of unknown primary

    International Nuclear Information System (INIS)

    Rades, Dirk; Fehlauer, Fabian; Veninga, Theo; Stalpers, Lukas J.A.; Basic, Hiba; Hoskin, Peter J.; Rudat, Volker; Karstens, Johann H.; Schild, Steven E.; Dunst, Juergen

    2007-01-01

    Purpose: Patients with cancer of unknown primary (CUP) account for about 10% of patients with metastatic spinal cord compression (MSCC). This study aims to define the appropriate radiation regimen for these patients. Methods and Materials: Data of 143 CUP patients irradiated for MSCC were retrospectively evaluated. Short-course radiotherapy (RT) (1x8 Gy, 5x4 Gy, n = 68) and long-course RT (10x3 Gy, 15x2.5 Gy, 20x2 Gy, n = 75) plus 8 further potential prognostic factors (age, gender, performance status, visceral metastases, other bone metastases, number of involved vertebrae, ambulatory status, time of developing motor deficits before RT) were compared for functional outcome and survival. Results: Improvement of motor function occurred in 10% of patients, no further progression of motor deficits in 57%, and deterioration in 33%. On multivariate analysis, functional outcome was positively associated with slower development of motor deficits (p < 0.001), absence of visceral metastases (p = 0.008) and other bone metastases (p = 0.027), and ambulatory status (p = 0.054), not with the radiation regimen (p = 0.74). Recurrence of MSCC in the irradiated region occurred in 7 patients after median 6 months. Median survival was 4 months. On multivariate analysis, better survival was significantly associated with absence of visceral metastases (p < 0.001), absence of other bone metastases (p = 0.005), ambulatory status (p = 0.001), and slower development of motor deficits (p = 0.030). Conclusions: For MSCC treatment in patients with CUP, no significant difference was observed between short-course and long-course RT regarding functional outcome and survival. Short-course RT appears preferable, at least for patients with a poor predicted survival, as it is more patient convenient and more cost-effective

  2. Shared services in accounting and finance

    NARCIS (Netherlands)

    Swagerman, D.M.; van Steenis, Jorn; Sieber, Pascal; Griese, Joachim

    1998-01-01

    The purpose of this paper is to present examples of the current state of the Shared Services Concept as applied to the finance function. The paper arises out of the ongoing research after current developments in the finance function enabled by information and communication technology, at the

  3. Data sharing system for lithography APC

    Science.gov (United States)

    Kawamura, Eiichi; Teranishi, Yoshiharu; Shimabara, Masanori

    2007-03-01

    We have developed a simple and cost-effective data sharing system between fabs for lithography advanced process control (APC). Lithography APC requires process flow, inter-layer information, history information, mask information and so on. So, inter-APC data sharing system has become necessary when lots are to be processed in multiple fabs (usually two fabs). The development cost and maintenance cost also have to be taken into account. The system handles minimum information necessary to make trend prediction for the lots. Three types of data have to be shared for precise trend prediction. First one is device information of the lots, e.g., process flow of the device and inter-layer information. Second one is mask information from mask suppliers, e.g., pattern characteristics and pattern widths. Last one is history data of the lots. Device information is electronic file and easy to handle. The electronic file is common between APCs and uploaded into the database. As for mask information sharing, mask information described in common format is obtained via Wide Area Network (WAN) from mask-vender will be stored in the mask-information data server. This information is periodically transferred to one specific lithography-APC server and compiled into the database. This lithography-APC server periodically delivers the mask-information to every other lithography-APC server. Process-history data sharing system mainly consists of function of delivering process-history data. In shipping production lots to another fab, the product-related process-history data is delivered by the lithography-APC server from the shipping site. We have confirmed the function and effectiveness of data sharing systems.

  4. Inverse estimation for the unknown frost geometry on the external wall of a forced-convection pipe

    International Nuclear Information System (INIS)

    Chen, W.-L.; Yang, Y.-C.

    2009-01-01

    In this study, a conjugate gradient method based inverse algorithm is applied to estimate the unknown frost-layer boundary profile on the external wall of a pipe system using temperature measurements. It is assumed that no prior information is available on the functional form of the unknown profile; hence the procedure is classified as the function estimation in inverse calculation. The temperature data obtained from the direct problem are used to simulate the temperature measurements. The accuracy of the inverse analysis is examined by using simulated exact and inexact temperature measurements. Results show that an excellent estimation on boundary profile can be obtained for the test case considered in this study.

  5. The application of the CAPM model on selected shares on the Croatian capital market

    Directory of Open Access Journals (Sweden)

    Zrinka Tolušić

    2014-12-01

    Full Text Available The Capital Asset Pricing Model is a model that describes the relationship between risk, expected return and valuation of securities. The theoretical and practical value of this model has proved unquestionable, but under ideal circumstances. The theory has been utilized by numerous researchers and it confirms the linear relationship between risk and return under the CAPM (Capital Asset Pricing Model model showing that greater exposure to risk provides higher returns. However, empirical research showed there were numerous factors that CAPM model did not take into account since it is based on assumptions which exist in reality, but are invisible. Therefore, it is very interesting to study the application of the CAPM model on selected shares on the Croatian capital market and analyze the possibilities of its application in discovering the misvalued shares. Share price changes on the Croatian capital market suggest there are some unknown factors that also influence share valuation. There is no doubt that the fundamental analysis of shares is not sufficient for evaluating the real share value in light of various invisible elements and all available information available which affect their value as well.

  6. The Structure–Function Linkage Database

    Science.gov (United States)

    Akiva, Eyal; Brown, Shoshana; Almonacid, Daniel E.; Barber, Alan E.; Custer, Ashley F.; Hicks, Michael A.; Huang, Conrad C.; Lauck, Florian; Mashiyama, Susan T.; Meng, Elaine C.; Mischel, David; Morris, John H.; Ojha, Sunil; Schnoes, Alexandra M.; Stryke, Doug; Yunes, Jeffrey M.; Ferrin, Thomas E.; Holliday, Gemma L.; Babbitt, Patricia C.

    2014-01-01

    The Structure–Function Linkage Database (SFLD, http://sfld.rbvi.ucsf.edu/) is a manually curated classification resource describing structure–function relationships for functionally diverse enzyme superfamilies. Members of such superfamilies are diverse in their overall reactions yet share a common ancestor and some conserved active site features associated with conserved functional attributes such as a partial reaction. Thus, despite their different functions, members of these superfamilies ‘look alike’, making them easy to misannotate. To address this complexity and enable rational transfer of functional features to unknowns only for those members for which we have sufficient functional information, we subdivide superfamily members into subgroups using sequence information, and lastly into families, sets of enzymes known to catalyze the same reaction using the same mechanistic strategy. Browsing and searching options in the SFLD provide access to all of these levels. The SFLD offers manually curated as well as automatically classified superfamily sets, both accompanied by search and download options for all hierarchical levels. Additional information includes multiple sequence alignments, tab-separated files of functional and other attributes, and sequence similarity networks. The latter provide a new and intuitively powerful way to visualize functional trends mapped to the context of sequence similarity. PMID:24271399

  7. Chinese Unknown Word Recognition for PCFG-LA Parsing

    Directory of Open Access Journals (Sweden)

    Qiuping Huang

    2014-01-01

    Full Text Available This paper investigates the recognition of unknown words in Chinese parsing. Two methods are proposed to handle this problem. One is the modification of a character-based model. We model the emission probability of an unknown word using the first and last characters in the word. It aims to reduce the POS tag ambiguities of unknown words to improve the parsing performance. In addition, a novel method, using graph-based semisupervised learning (SSL, is proposed to improve the syntax parsing of unknown words. Its goal is to discover additional lexical knowledge from a large amount of unlabeled data to help the syntax parsing. The method is mainly to propagate lexical emission probabilities to unknown words by building the similarity graphs over the words of labeled and unlabeled data. The derived distributions are incorporated into the parsing process. The proposed methods are effective in dealing with the unknown words to improve the parsing. Empirical results for Penn Chinese Treebank and TCT Treebank revealed its effectiveness.

  8. Music2Share - Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, Ton; Epema, Dick H.J.; Hartel, Pieter H.; Lagendijk, R. (Inald) L.; van Steen, Martinus Richardus; van Steen, Maarten

    Peer-to-Peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  9. Music2Share --- Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, T.; Epema, D.; Hartel, P.; Lagendijk, I.; van Steen, M.R.

    2004-01-01

    Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  10. Accessibility of shared space for visually impaired persons

    NARCIS (Netherlands)

    Havik, Else; Melis, Bart; Steyvers, Franciscus J.J.M.

    2011-01-01

    Shared Space is a new concept for the design of the public realm that is increasingly applied in Western countries. In Shared Space, the various functions of the public domain are combined, rather than separated. The behavior of road users is mainly determined by social relations and not exclusively

  11. Multiprocessor shared-memory information exchange

    International Nuclear Information System (INIS)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.; Roslund, C.J.; Ghrist, W.D. III

    1989-01-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, is designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange

  12. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  13. AN ADAPTIVE OPTIMAL KALMAN FILTER FOR STOCHASTIC VIBRATION CONTROL SYSTEM WITH UNKNOWN NOISE VARIANCES

    Institute of Scientific and Technical Information of China (English)

    Li Shu; Zhuo Jiashou; Ren Qingwen

    2000-01-01

    In this paper, an optimal criterion is presented for adaptive Kalman filter in a control sys tem with unknown variances of stochastic vibration by constructing a function of noise variances and minimizing the function. We solve the model and measure variances by using DFP optimal method to guarantee the results of Kalman filter to be optimized. Finally, the control of vibration can be implemented by LQG method.

  14. Energy Sharing Framework for Microgrid-Powered Cellular Base Stations

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-02-07

    Cellular base stations (BSs) are increasingly becoming equipped with renewable energy generators to reduce operational expenditures and carbon footprint of wireless communications. Moreover, advancements in the traditional electricity grid allow two-way power flow and metering that enable the integration of distributed renewable energy generators at BS sites into a microgrid. In this paper, we develop an optimized energy management framework for microgrid-connected cellular BSs that are equipped with renewable energy generators and finite battery storage to minimize energy cost. The BSs share excess renewable energy with others to reduce the dependency on the conventional electricity grid. Three cases are investigated where the renewable energy generation is unknown, perfectly known, and partially known ahead of time. For the partially known case where only the statistics of renewable energy generation are available, stochastic programming is used to achieve a conservative solution. Results show the time varying energy management behaviour of the BSs and the effect of energy sharing between them.

  15. Organochlorine pesticide level in patients with chronic kidney disease of unknown etiology and its association with renal function.

    Science.gov (United States)

    Ghosh, Rishila; Siddarth, Manushi; Singh, Neeru; Tyagi, Vipin; Kare, Pawan Kumar; Banerjee, Basu Dev; Kalra, Om Prakash; Tripathi, Ashok Kumar

    2017-05-26

    Involvement of agrochemicals have been suggested in the development of chronic kidney disease of unknown etiology (CKDu). The association between CKDu and blood level of organochlorine pesticides (OCPs) in CKDu patients has been examined in the present study. All the recruited study subjects (n = 300) were divided in three groups, namely, healthy control (n = 100), patients with chronic kidney disease of unknown etiology (n = 100), and patients with chronic kidney disease of known etiology (CKDk) (n = 100). Blood OCP levels of all three study groups were analyzed by gas chromatography. Increased level of OCPs, namely α-HCH, aldrin, and β-endosulfan, were observed in CKDu patients as compared to healthy control and CKD patients of known etiology. The levels of these pesticides significantly correlated negatively with the estimated glomerular filtration rate (eGFR) and positively with urinary albumin of CKD patients. Logistic regression analysis revealed association of γ-HCH, p, p'-DDE, and β-endosulfan with CKDu on adjustment of age, sex, BMI, and total lipid content. Increased blood level of certain organochlorine pesticides is associated with the development of chronic kidney disease of unknown etiology.

  16. Known Unknowns in Judgment and Choice

    OpenAIRE

    Walters, Daniel

    2017-01-01

    This dissertation investigates how people make inferences about missing information. Whereas most prior literature focuses on how people process known information, I show that the extent to which people make inferences about missing information impacts judgments and choices. Specifically, I investigate how (1) awareness of known unknowns affects overconfidence in judgment in Chapter 1, (2) beliefs about the knowability of unknowns impacts investment strategies in Chapter 2, and (3) inferences...

  17. Shared cultural knowledge: Effects of music on young children's social preferences.

    Science.gov (United States)

    Soley, Gaye; Spelke, Elizabeth S

    2016-03-01

    Adults use cultural markers to discern the structure of the social landscape. Such markers may also influence the social preferences of young children, who tend to conform to their own group and prefer others who do so. However, the forces that propel these preferences are unknown. Here, we use social preferences based on music to investigate these forces in four- and five-year-old children. First, we establish that children prefer other children whose favorite songs are familiar to them. Then we show that this effect depends on shared knowledge: children both prefer others who know songs they themselves know, and avoid others who know songs they do not know, irrespective of the target children's liking of the songs. These results suggest that young children have a remarkably selective sensitivity to shared cultural knowledge. Shared knowledge may be a powerful determinant of children's social preferences, both because it underpins effective communication and because it is conveyed by others through social interactions and therefore can serve as a marker of social group identity. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Shared Psychotic Disorder (Folie à Deux in Turkey

    Directory of Open Access Journals (Sweden)

    Buket Cinemre

    2009-09-01

    Full Text Available Shared psychotic disorder or folie à deux is a rare and relatively unknown syndrome. Large case series are needed to find out and clarify the etiological factors and the phenomenology of shared psychotic disorder by comparing the cases from different society and cultures. In this study, we reviewed all reported cases of shared psychotic disorder that had been published or presented in Turkey since 1962. To reach this aim, we have searched Pubmed/Medline, ScienceDirect, Google Scholar, Ulakbim Turkish Medical Index, Turkish Psychiatric Index databases for published records originating from Turkey. We have also manually searched poster abstract books of congresses held in Turkey between 1962 and 2009. All cases eligible for inclusion into this study have been evaluated one by one and grouped as primary or secondary cases. The features of these cases were investigated for a number of variables including age, sex, educational level, occupation, the presence of shared delusion and hallucinations, diagnosis, management, onset of illness, family history, IQ, social isolation, the nature of the relationship and classification system used for diagnosis. The results have showed that the syndrome is more frequently observed among women, within same family members and between sisters. Social isolation was the most common risk factor in these patients and most patients shared hallucinations with their partners along with their delusions. Several secondary cases required antipsychotic drugs for the treatment of their symptoms. Though these features were inline with literature findings, the present findings from Turkish population were different from previous studies with regards to the presence of olfactory hallucinations, absence of grandiose delusions and the number of affected family members. The results mostly supported the challenges and discussions in western countries. To understand this most pathological form of interpersonal relationships

  19. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  20. Control of thumb force using surface functional electrical stimulation and muscle load sharing

    Science.gov (United States)

    2013-01-01

    Background Stroke survivors often have difficulties in manipulating objects with their affected hand. Thumb control plays an important role in object manipulation. Surface functional electrical stimulation (FES) can assist movement. We aim to control the 2D thumb force by predicting the sum of individual muscle forces, described by a sigmoidal muscle recruitment curve and a single force direction. Methods Five able bodied subjects and five stroke subjects were strapped in a custom built setup. The forces perpendicular to the thumb in response to FES applied to three thumb muscles were measured. We evaluated the feasibility of using recruitment curve based force vector maps in predicting output forces. In addition, we developed a closed loop force controller. Load sharing between the three muscles was used to solve the redundancy problem having three actuators to control forces in two dimensions. The thumb force was controlled towards target forces of 0.5 N and 1.0 N in multiple directions within the individual’s thumb work space. Hereby, the possibilities to use these force vector maps and the load sharing approach in feed forward and feedback force control were explored. Results The force vector prediction of the obtained model had small RMS errors with respect to the actual measured force vectors (0.22±0.17 N for the healthy subjects; 0.17±0.13 N for the stroke subjects). The stroke subjects showed a limited work range due to limited force production of the individual muscles. Performance of feed forward control without feedback, was better in healthy subjects than in stroke subjects. However, when feedback control was added performances were similar between the two groups. Feedback force control lead, especially for the stroke subjects, to a reduction in stationary errors, which improved performance. Conclusions Thumb muscle responses to FES can be described by a single force direction and a sigmoidal recruitment curve. Force in desired direction can be

  1. A hybrid search algorithm for swarm robots searching in an unknown environment.

    Science.gov (United States)

    Li, Shoutao; Li, Lina; Lee, Gordon; Zhang, Hao

    2014-01-01

    This paper proposes a novel method to improve the efficiency of a swarm of robots searching in an unknown environment. The approach focuses on the process of feeding and individual coordination characteristics inspired by the foraging behavior in nature. A predatory strategy was used for searching; hence, this hybrid approach integrated a random search technique with a dynamic particle swarm optimization (DPSO) search algorithm. If a search robot could not find any target information, it used a random search algorithm for a global search. If the robot found any target information in a region, the DPSO search algorithm was used for a local search. This particle swarm optimization search algorithm is dynamic as all the parameters in the algorithm are refreshed synchronously through a communication mechanism until the robots find the target position, after which, the robots fall back to a random searching mode. Thus, in this searching strategy, the robots alternated between two searching algorithms until the whole area was covered. During the searching process, the robots used a local communication mechanism to share map information and DPSO parameters to reduce the communication burden and overcome hardware limitations. If the search area is very large, search efficiency may be greatly reduced if only one robot searches an entire region given the limited resources available and time constraints. In this research we divided the entire search area into several subregions, selected a target utility function to determine which subregion should be initially searched and thereby reduced the residence time of the target to improve search efficiency.

  2. Discrete-time online learning control for a class of unknown nonaffine nonlinear systems using reinforcement learning.

    Science.gov (United States)

    Yang, Xiong; Liu, Derong; Wang, Ding; Wei, Qinglai

    2014-07-01

    In this paper, a reinforcement-learning-based direct adaptive control is developed to deliver a desired tracking performance for a class of discrete-time (DT) nonlinear systems with unknown bounded disturbances. We investigate multi-input-multi-output unknown nonaffine nonlinear DT systems and employ two neural networks (NNs). By using Implicit Function Theorem, an action NN is used to generate the control signal and it is also designed to cancel the nonlinearity of unknown DT systems, for purpose of utilizing feedback linearization methods. On the other hand, a critic NN is applied to estimate the cost function, which satisfies the recursive equations derived from heuristic dynamic programming. The weights of both the action NN and the critic NN are directly updated online instead of offline training. By utilizing Lyapunov's direct method, the closed-loop tracking errors and the NN estimated weights are demonstrated to be uniformly ultimately bounded. Two numerical examples are provided to show the effectiveness of the present approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  4. Running over unknown rough terrain with a one-legged planar robot

    International Nuclear Information System (INIS)

    Andrews, Ben; Miller, Bruce; Clark, Jonathan E; Schmitt, John

    2011-01-01

    The ability to traverse unknown, rough terrain is an advantage that legged locomoters have over their wheeled counterparts. However, due to the complexity of multi-legged systems, research in legged robotics has not yet been able to reproduce the agility found in the animal kingdom. In an effort to reduce the complexity of the problem, researchers have developed single-legged models to gain insight into the fundamental dynamics of legged running. Inspired by studies of animal locomotion, researchers have proposed numerous control strategies to achieve stable, one-legged running over unknown, rough terrain. One such control strategy incorporates energy variations into the system during the stance phase by changing the force-free leg length as a sinusoidal function of time. In this research, a one-legged planar robot capable of implementing this and other state-of-the-art control strategies was designed and built. Both simulated and experimental results were used to determine and compare the stability of the proposed controllers as the robot was subjected to unknown drop and raised step perturbations equal to 25% of the nominal leg length. This study illustrates the relative advantages of utilizing a minimal-sensing, active energy removal control scheme to stabilize running over rough terrain.

  5. The HydroShare Collaborative Repository for the Hydrology Community

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.

    2017-12-01

    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of, and collaboration around, "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting our approach to making this system easy to use and serving the needs of the hydrology community represented by the Consortium of Universities for the Advancement of Hydrologic Sciences, Inc. (CUAHSI). Metadata for uploaded files is harvested automatically or captured using easy to use web user interfaces. Users are encouraged to add or create resources in HydroShare early in the data life cycle. To encourage this we allow users to share and collaborate on HydroShare resources privately among individual users or groups, entering metadata while doing the work. HydroShare also provides enhanced functionality for users through web apps that provide tools and computational capability for actions on resources. HydroShare's architecture broadly is comprised of: (1) resource storage, (2) resource exploration website, and (3) web apps for actions on resources. System components are loosely coupled and interact through APIs, which enhances robustness, as components can be upgraded and advanced relatively independently. The full power of this paradigm is the

  6. Mobile assistant for unknown caller identification

    OpenAIRE

    Hribernik, Andraž

    2012-01-01

    The main motivation of this diploma thesis is a development of Android application, which helps user of application to find out who is the owner of unknown phone number. Data source for finding unknown phone number are free available web sources. Through the development of prototype, data from different web sources were integrated. Result of this integration is shown in Android application. Data integration includes access to semi-structured data on web portal of Phone Directory of Slovenia, ...

  7. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  8. Impulse-response analysis of the market share attraction model

    NARCIS (Netherlands)

    D. Fok (Dennis); Ph.H.B.F. Franses (Philip Hans)

    1999-01-01

    textabstractWe propose a simulation-based technique to calculate impulse-response functions and their confidence intervals in a market share attraction model [MCI]. As an MCI model implies a reduced form model for the logs of relative market shares, simulation techniques have to be used to obtain

  9. Typing of unknown microorganisms based on quantitative analysis of fatty acids by mass spectrometry and hierarchical clustering

    Energy Technology Data Exchange (ETDEWEB)

    Li Tingting; Dai Ling; Li Lun; Hu Xuejiao; Dong Linjie; Li Jianjian; Salim, Sule Khalfan; Fu Jieying [Key Laboratory of Pesticides and Chemical Biology, Ministry of Education, College of Chemistry, Central China Normal University, Wuhan, Hubei 430079 (China); Zhong Hongying, E-mail: hyzhong@mail.ccnu.edu.cn [Key Laboratory of Pesticides and Chemical Biology, Ministry of Education, College of Chemistry, Central China Normal University, Wuhan, Hubei 430079 (China)

    2011-01-17

    Rapid identification of unknown microorganisms of clinical and agricultural importance is not only critical for accurate diagnosis of infections but also essential for appropriate and prompt treatment. We describe here a rapid method for microorganisms typing based on quantitative analysis of fatty acids by iFAT approach (Isotope-coded Fatty Acid Transmethylation). In this work, lyophilized cell lysates were directly mixed with 0.5 M NaOH solution in d3-methanol and n-hexane. After 1 min of ultrasonication, the top n-hexane layer was combined with a mixture of standard d0-methanol derived fatty acid methylesters with known concentration. Measurement of intensity ratios of d3/d0 labeled fragment ion and molecular ion pairs at the corresponding target fatty acids provides a quantitative basis for hierarchical clustering. In the resultant dendrogram, the Euclidean distance between unknown species and known species quantitatively reveals their differences or shared similarities in fatty acid related pathways. It is of particular interest to apply this method for typing fungal species because fungi has distinguished lipid biosynthetic pathways that have been targeted for lots of drugs or fungicides compared with bacteria and animals. The proposed method has no dependence on the availability of genome or proteome databases. Therefore, it is can be applicable for a broad range of unknown microorganisms or mutant species.

  10. Shared memories reveal shared structure in neural activity across individuals

    Science.gov (United States)

    Chen, J.; Leong, Y.C.; Honey, C.J.; Yong, C.H.; Norman, K.A.; Hasson, U.

    2016-01-01

    Our lives revolve around sharing experiences and memories with others. When different people recount the same events, how similar are their underlying neural representations? Participants viewed a fifty-minute movie, then verbally described the events during functional MRI, producing unguided detailed descriptions lasting up to forty minutes. As each person spoke, event-specific spatial patterns were reinstated in default-network, medial-temporal, and high-level visual areas. Individual event patterns were both highly discriminable from one another and similar between people, suggesting consistent spatial organization. In many high-order areas, patterns were more similar between people recalling the same event than between recall and perception, indicating systematic reshaping of percept into memory. These results reveal the existence of a common spatial organization for memories in high-level cortical areas, where encoded information is largely abstracted beyond sensory constraints; and that neural patterns during perception are altered systematically across people into shared memory representations for real-life events. PMID:27918531

  11. Interpersonal Similarity and Knowledge Sharing within Multinational Organizations

    DEFF Research Database (Denmark)

    Mäkelä, Kristiina; Andersson, Ulf; Seppälä, Tomi

    2012-01-01

    Previous research has established that interpersonal similarity can influence knowledge sharing in such a way that similar people are more likely to share knowledge than those who are dissimilar. We contribute to the literature by showing that in the MNC context, cultural and functional similarit....... These microfoundations of inter-unit knowledge exchange point to important theoretical and practical implications for international management....

  12. MoCha: Molecular Characterization of Unknown Pathways.

    Science.gov (United States)

    Lobo, Daniel; Hammelman, Jennifer; Levin, Michael

    2016-04-01

    Automated methods for the reverse-engineering of complex regulatory networks are paving the way for the inference of mechanistic comprehensive models directly from experimental data. These novel methods can infer not only the relations and parameters of the known molecules defined in their input datasets, but also unknown components and pathways identified as necessary by the automated algorithms. Identifying the molecular nature of these unknown components is a crucial step for making testable predictions and experimentally validating the models, yet no specific and efficient tools exist to aid in this process. To this end, we present here MoCha (Molecular Characterization), a tool optimized for the search of unknown proteins and their pathways from a given set of known interacting proteins. MoCha uses the comprehensive dataset of protein-protein interactions provided by the STRING database, which currently includes more than a billion interactions from over 2,000 organisms. MoCha is highly optimized, performing typical searches within seconds. We demonstrate the use of MoCha with the characterization of unknown components from reverse-engineered models from the literature. MoCha is useful for working on network models by hand or as a downstream step of a model inference engine workflow and represents a valuable and efficient tool for the characterization of unknown pathways using known data from thousands of organisms. MoCha and its source code are freely available online under the GPLv3 license.

  13. Wrox SharePoint 2010 SharePoint911 three-pack

    CERN Document Server

    Klindt, Todd; Mason, Jennifer; Rogers, Laura; Drisgill, Randy; Ross, John; Riemann, Larry; Perran, Amanda; Perran, Shane; Sanford, Jacob J; Stubbs, Paul; Caravajal, Steve

    2012-01-01

    The Wrox SharePoint 2010 SharePoint911 Three-Pack combines the contents of three full e-books written by the experts from SharePoint911.  That's over 1800 pages of hands-on advice from Todd Klindt, Shane Young, Laura Rogers, Randy Drisgill, Jennifer Mason, John Ross, and Larry Riemann, among others. In Beginning SharePoint 2010: Building Business Solutions with SharePoint (ISBN 978-0-470-61789-2) by Amanda Perran, Shane Perran, Jennifer Mason, and Laura Rogers, readers learn the core concepts, terminology, and features of SharePoint 2010. In Professiona

  14. Distinct and shared cognitive functions mediate event- and time-based prospective memory impairment in normal ageing

    Science.gov (United States)

    Gonneaud, Julie; Kalpouzos, Grégoria; Bon, Laetitia; Viader, Fausto; Eustache, Francis; Desgranges, Béatrice

    2011-01-01

    Prospective memory (PM) is the ability to remember to perform an action at a specific point in the future. Regarded as multidimensional, PM involves several cognitive functions that are known to be impaired in normal aging. In the present study, we set out to investigate the cognitive correlates of PM impairment in normal aging. Manipulating cognitive load, we assessed event- and time-based PM, as well as several cognitive functions, including executive functions, working memory and retrospective episodic memory, in healthy subjects covering the entire adulthood. We found that normal aging was characterized by PM decline in all conditions and that event-based PM was more sensitive to the effects of aging than time-based PM. Whatever the conditions, PM was linked to inhibition and processing speed. However, while event-based PM was mainly mediated by binding and retrospective memory processes, time-based PM was mainly related to inhibition. The only distinction between high- and low-load PM cognitive correlates lays in an additional, but marginal, correlation between updating and the high-load PM condition. The association of distinct cognitive functions, as well as shared mechanisms with event- and time-based PM confirms that each type of PM relies on a different set of processes. PMID:21678154

  15. Projective and hybrid projective synchronization for the Lorenz-Stenflo system with estimation of unknown parameters

    International Nuclear Information System (INIS)

    Mukherjee, Payel; Banerjee, Santo

    2010-01-01

    In this work, in the first phase, we study the phenomenon of projective synchronization in the Lorenz-Stenflo system. Synchronization is then investigated for the same system with unknown parameters. We show analytically that synchronization is possible for some proper choice of the nonlinear controller by using a suitable Lyapunov function. With the help of this result, it is also possible to estimate the values of the unknown system parameters. In the second phase as an extension of our analysis, we investigate the new hybrid projective synchronization for the same system. All our analyses are well supported with numerical evidence.

  16. Sharing a common resource with concave benefits

    OpenAIRE

    Ambec, S.

    2006-01-01

    A group of agents enjoy concave and single-peak benefit functions from consuming a shared resource. They also value money (transfers). The resource is scarce in the sense that not everybody can consume its peak. The paper characterizes the unique (resource and money) allocation that is efficient, incentive compatible and equal-sharing individual rational. It can be implemented (i) by selling the resource or taxing extraction and redistributing the money collected equally, or (ii) by assigning...

  17. UCLA's Molecular Screening Shared Resource: enhancing small molecule discovery with functional genomics and new technology.

    Science.gov (United States)

    Damoiseaux, Robert

    2014-05-01

    The Molecular Screening Shared Resource (MSSR) offers a comprehensive range of leading-edge high throughput screening (HTS) services including drug discovery, chemical and functional genomics, and novel methods for nano and environmental toxicology. The MSSR is an open access environment with investigators from UCLA as well as from the entire globe. Industrial clients are equally welcome as are non-profit entities. The MSSR is a fee-for-service entity and does not retain intellectual property. In conjunction with the Center for Environmental Implications of Nanotechnology, the MSSR is unique in its dedicated and ongoing efforts towards high throughput toxicity testing of nanomaterials. In addition, the MSSR engages in technology development eliminating bottlenecks from the HTS workflow and enabling novel assays and readouts currently not available.

  18. DEVELOPMENT OF A WEB-BASED PROXIMITY BASED MEDIA SHARING APPLICATION

    OpenAIRE

    Erol Ozan

    2016-01-01

    This article reports the development of Vissou, which is a location based web application that enables media recording and sharing among users who are in close proximity to each other. The application facilitates the automated hand-over of the recorded media files from one user to another. There are many social networking applications and web sites that provide digital media sharing and editing functionalities. What differentiates Vissou from other similar applications is the functions and us...

  19. Achievable capacity of a spectrum sharing system over hyper fading channels

    KAUST Repository

    Ekin, Sabit

    2009-11-01

    Cognitive radio with spectrum sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, achievable capacity gain of spectrum sharing systems over dynamic fading environments is studied. For the analysis, a theoretical fading model called hyper fading model that is suitable to the dynamic nature of cognitive radio channel is proposed. Closed-form expression of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users in spectrum sharing systems are derived. In addition, the capacity gains achievable with spectrum sharing systems in high and low power regions are obtained. Numerical simulations are performed to study the effects of different fading figures, average powers, interference temperature, and number of secondary users on the achievable capacity.

  20. Beginning SharePoint 2010 Administration Windows SharePoint Foundation 2010 and Microsoft SharePoint Server 2010

    CERN Document Server

    Husman, Göran

    2010-01-01

    Complete coverage on the latest advances in SharePoint 2010 administration. SharePoint 2010 comprises an abundance of new features, and this book shows you how to take advantage of all SharePoint 2010's many improvements. Written by a four-time SharePoint MVP, Beginning SharePoint 2010 Administration begins with a comparison of SharePoint 2010 compared to the previous version and then examines the differences between WSS 4.0 and MSS 2010. Packed with step-by-step instructions, tips and tricks, and real-world examples, this book dives into the basics of how to install, manage, and administrate

  1. Flow Sharing Systems for Mobile Applications

    DEFF Research Database (Denmark)

    Andersen, T. O.; Hansen, M. R.; Conrad, Finn

    2002-01-01

    This contribution reports about some analytical and simulation/experimental studies carried out on different flow control systems for mobile applications with respect to their ability to do flow sharing. All systems have two parallel actuators and are considered regarding functionality...

  2. Prosecutor: parameter-free inference of gene function for prokaryotes using DNA microarray data, genomic context and multiple gene annotation sources

    Directory of Open Access Journals (Sweden)

    van Hijum Sacha AFT

    2008-10-01

    Full Text Available Abstract Background Despite a plethora of functional genomic efforts, the function of many genes in sequenced genomes remains unknown. The increasing amount of microarray data for many species allows employing the guilt-by-association principle to predict function on a large scale: genes exhibiting similar expression patterns are more likely to participate in shared biological processes. Results We developed Prosecutor, an application that enables researchers to rapidly infer gene function based on available gene expression data and functional annotations. Our parameter-free functional prediction method uses a sensitive algorithm to achieve a high association rate of linking genes with unknown function to annotated genes. Furthermore, Prosecutor utilizes additional biological information such as genomic context and known regulatory mechanisms that are specific for prokaryotes. We analyzed publicly available transcriptome data sets and used literature sources to validate putative functions suggested by Prosecutor. We supply the complete results of our analysis for 11 prokaryotic organisms on a dedicated website. Conclusion The Prosecutor software and supplementary datasets available at http://www.prosecutor.nl allow researchers working on any of the analyzed organisms to quickly identify the putative functions of their genes of interest. A de novo analysis allows new organisms to be studied.

  3. Determination of the origin of unknown irradiated nuclear fuel.

    Science.gov (United States)

    Nicolaou, G

    2006-01-01

    An isotopic fingerprinting method is presented to determine the origin of unknown nuclear material with forensic importance. Spent nuclear fuel of known origin has been considered as the 'unknown' nuclear material in order to demonstrate the method and verify its prediction capabilities. The method compares, using factor analysis, the measured U, Pu isotopic compositions of the 'unknown' material with U, Pu isotopic compositions simulating well known spent fuels from a range of commercial nuclear power stations. Then, the 'unknown' fuel has the same origin as the commercial fuel with which it exhibits the highest similarity in U, Pu compositions.

  4. Determination of the origin of unknown irradiated nuclear fuel

    International Nuclear Information System (INIS)

    Nicolaou, G.

    2006-01-01

    An isotopic fingerprinting method is presented to determine the origin of unknown nuclear material with forensic importance. Spent nuclear fuel of known origin has been considered as the 'unknown' nuclear material in order to demonstrate the method and verify its prediction capabilities. The method compares, using factor analysis, the measured U, Pu isotopic compositions of the 'unknown' material with U, Pu isotopic compositions simulating well known spent fuels from a range of commercial nuclear power stations. Then, the 'unknown' fuel has the same origin as the commercial fuel with which it exhibits the highest similarity in U, Pu compositions

  5. Joint estimation of the fractional differentiation orders and the unknown input for linear fractional non-commensurate system

    KAUST Repository

    Belkhatir, Zehor

    2015-11-05

    This paper deals with the joint estimation of the unknown input and the fractional differentiation orders of a linear fractional order system. A two-stage algorithm combining the modulating functions with a first-order Newton method is applied to solve this estimation problem. First, the modulating functions approach is used to estimate the unknown input for a given fractional differentiation orders. Then, the method is combined with a first-order Newton technique to identify the fractional orders jointly with the input. To show the efficiency of the proposed method, numerical examples illustrating the estimation of the neural activity, considered as input of a fractional model of the neurovascular coupling, along with the fractional differentiation orders are presented in both noise-free and noisy cases.

  6. Share and share alike? Social information and interaction style in coordination of shared use

    NARCIS (Netherlands)

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.

    2018-01-01

    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  7. Implementing Explicit and Finding Implicit Sharing in Embedded DSLs

    Directory of Open Access Journals (Sweden)

    Oleg Kiselyov

    2011-09-01

    Full Text Available Aliasing, or sharing, is prominent in many domains, denoting that two differently-named objects are in fact identical: a change in one object (memory cell, circuit terminal, disk block is instantly reflected in the other. Languages for modelling such domains should let the programmer explicitly define the sharing among objects or expressions. A DSL compiler may find other identical expressions and share them, implicitly. Such common subexpression elimination is crucial to the efficient implementation of DSLs. Sharing is tricky in embedded DSL, since host aliasing may correspond to copying of the underlying objects rather than their sharing. This tutorial summarizes discussions of implementing sharing in Haskell DSLs for automotive embedded systems and hardware description languages. The technique has since been used in a Haskell SAT solver and the DSL for music synthesis. We demonstrate the embedding in pure Haskell of a simple DSL with a language form for explicit sharing. The DSL also has implicit sharing, implemented via hash-consing. Explicit sharing greatly speeds up hash-consing. The seemingly imperative nature of hash-consing is hidden beneath a simple combinator language. The overall implementation remains pure functional and easy to reason about.

  8. Determining firms' utility functions and competitive roles from data on market shares using Lotka-Volterra models

    NARCIS (Netherlands)

    A. Marasco; A. Picucci; A. Romano (Alessandro)

    2016-01-01

    textabstractIn this article, we include data on historical and estimated market shares of two markets. In particular, we include annual data on the market shares of the Japanese beer market (1963-2000) and biannual data on the market shares of the mobile phones market in Greece (1998-2007). In

  9. Comment on "Dynamic quantum secret sharing"

    Science.gov (United States)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  10. Immune modules shared by innate lymphoid cells and T cells.

    Science.gov (United States)

    Robinette, Michelle L; Colonna, Marco

    2016-11-01

    In recent years, innate lymphoid cells (ILCs) have emerged as innate correlates to T cells. The similarities between ILCs and T cells indicate that lymphocytes of fundamentally distinct lineages can share core "immune modules" that encompass transcriptional circuitry and effector functions while using nonredundant complementary mechanisms of pattern recognition to enact these functions. We review modules currently recognized to be shared between ILCs and T cells. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  11. Recent Patterns in Shared Decision Making for Prostate-Specific Antigen Testing in the United States.

    Science.gov (United States)

    Fedewa, Stacey A; Gansler, Ted; Smith, Robert; Sauer, Ann Goding; Wender, Richard; Brawley, Otis W; Jemal, Ahmedin

    2018-03-01

    Previous studies report infrequent use of shared decision making for prostate-specific antigen (PSA) testing. It is unknown whether this pattern has changed recently considering increased emphasis on shared decision making in prostate cancer screening recommendations. Thus, the objective of this study is to examine recent changes in shared decision making. We conducted a retrospective cross-sectional study among men aged 50 years and older in the United States using 2010 and 2015 National Health Interview Survey (NHIS) data (n = 9,598). Changes in receipt of shared decision making were expressed as adjusted prevalence ratios (aPR) and 95% confidence intervals (CI). Analyses were stratified on PSA testing (recent [in the past year] or no testing). Elements of shared decision making assessed included the patient being informed about the advantages only, advantages and disadvantages, and full shared decision making (advantages, disadvantages, and uncertainties). Among men with recent PSA testing, 58.5% and 62.6% reported having received ≥1 element of shared decision making in 2010 and 2015, respectively ( P = .054, aPR = 1.04; 95% CI, 0.98-1.11). Between 2010 and 2015, being told only about the advantages of PSA testing significantly declined (aPR = 0.82; 95% CI, 0.71-0.96) and full shared decision making prevalence significantly increased (aPR = 1.51; 95% CI, 1.28-1.79) in recently tested men. Among men without prior PSA testing, 10% reported ≥1 element of shared decision making, which did not change with time. Between 2010 and 2015, there was no increase in shared decision making among men with recent PSA testing though there was a shift away from only being told about the advantages of PSA testing towards full shared decision making. Many men receiving PSA testing did not receive shared decision making. © 2018 Annals of Family Medicine, Inc.

  12. Organizational Conditions for Dealing with The Unknown Unknown Illustrated by how a Dutch water management authority is preparing for climate change

    NARCIS (Netherlands)

    Termeer, Catrien J. A. M.; van den Brink, Margo A.

    2013-01-01

    The central question of this article is the extent to which organizations, governmental authorities in particular, are able to deal with the unknown unknown. Drawing on Weick's work on sensemaking, we introduce seven organizational conditions that can facilitate organizations to be reliable under

  13. Beginning SharePoint 2010 Building Business Solutions with SharePoint

    CERN Document Server

    Perran, Amanda; Mason, Jennifer; Rogers, Laura

    2010-01-01

    Two SharePoint MVPs provide the ultimate introduction to SharePoint 2010Beginning SharePoint 2010: Building Team Solutions with SharePoint provides information workers and site managers with extensive knowledge and expert advice, empowering them to become SharePoint champions within their organizations.Provides expansive coverage of SharePoint topics, as well as specialty areas such as forms, excel services, records management, and web content managementDetails realistic usage scenarios, and includes practice examples that highlight best practices for configuration and customizationIncludes de

  14. Unknown foundation determination for scour.

    Science.gov (United States)

    2012-04-01

    Unknown foundations affect about 9,000 bridges in Texas. For bridges over rivers, this creates a problem : regarding scour decisions as the calculated scour depth cannot be compared to the foundation depth, and a : very conservative costly approach m...

  15. REGULARIZED FUNCTIONAL PRINCIPAL COMPONENT ANALYSIS AND AN APPLICATION ON THE SHARE PRICES OF THE COMPANIES BELONGING TO THE ISE-30 INDEX

    Directory of Open Access Journals (Sweden)

    İSTEM KÖYMEN KESER

    2013-06-01

    Full Text Available The objective of the Functional Data Analysis techniques is to study such type of data which consist of observed functions or curves evaluated at a finite subset of some real interval.   Techniques in Functional Data Analysis can be used to study the variation in a random sample of real functions, xi(t, i=1, 2, …, N and their derivatives. In practice, these functions are often a consequence of a preliminary smoothing process applied to discrete data and in this work, Spline Smoothing Methods are used.  As the number of functions and the number of observation points increases, it would be difficult to handle the functions  altogether. In order to overcome this complexity, we utilize Functional and Regularized Functional Principal Component Analyses where a high percentage of total variation  could be accounted for with only a few component functions.  Finally, an application on the daily closing data for the share prices of the companies belonging to the ISE-30 index is also given.

  16. Organizational conditions for dealing with the unknown unknown : illustrated by how a Dutch water management authority is preparing for climate change

    NARCIS (Netherlands)

    Termeer, C.J.A.M.; Brink, van den M.A.

    2013-01-01

    The central question of this article is the extent to which organizations, governmental authorities in particular, are able to deal with the unknown unknown. Drawing on Weick’s work on sensemaking, we introduce seven organizational conditions that can facilitate organizations to be reliable under

  17. Brain Information Sharing During Visual Short-Term Memory Binding Yields a Memory Biomarker for Familial Alzheimer's Disease.

    Science.gov (United States)

    Parra, Mario A; Mikulan, Ezequiel; Trujillo, Natalia; Sala, Sergio Della; Lopera, Francisco; Manes, Facundo; Starr, John; Ibanez, Agustin

    2017-01-01

    Alzheimer's disease (AD) as a disconnection syndrome which disrupts both brain information sharing and memory binding functions. The extent to which these two phenotypic expressions share pathophysiological mechanisms remains unknown. To unveil the electrophysiological correlates of integrative memory impairments in AD towards new memory biomarkers for its prodromal stages. Patients with 100% risk of familial AD (FAD) and healthy controls underwent assessment with the Visual Short-Term Memory binding test (VSTMBT) while we recorded their EEG. We applied a novel brain connectivity method (Weighted Symbolic Mutual Information) to EEG data. Patients showed significant deficits during the VSTMBT. A reduction of brain connectivity was observed during resting as well as during correct VSTM binding, particularly over frontal and posterior regions. An increase of connectivity was found during VSTM binding performance over central regions. While decreased connectivity was found in cases in more advanced stages of FAD, increased brain connectivity appeared in cases in earlier stages. Such altered patterns of task-related connectivity were found in 89% of the assessed patients. VSTM binding in the prodromal stages of FAD are associated to altered patterns of brain connectivity thus confirming the link between integrative memory deficits and impaired brain information sharing in prodromal FAD. While significant loss of brain connectivity seems to be a feature of the advanced stages of FAD increased brain connectivity characterizes its earlier stages. These findings are discussed in the light of recent proposals about the earliest pathophysiological mechanisms of AD and their clinical expression. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  18. Shared services in accounting and finance

    OpenAIRE

    Swagerman, D.M.; van Steenis, Jorn; Sieber, Pascal; Griese, Joachim

    1998-01-01

    The purpose of this paper is to present examples of the current state of the Shared Services Concept as applied to the finance function. The paper arises out of the ongoing research after current developments in the finance function enabled by information and communication technology, at the University of Twente. The rapid developments in information and communication technology (leading to new ‘economics of information’) combined with developments in organisation theory, have far-reaching im...

  19. Teilen, Sharing 1 und Sharing 2: die Sharing Economy im Licht theoretischer Zugänge

    OpenAIRE

    Haase, Michaela; Pick, Doreén

    2016-01-01

    Der Artikel geht theoretischen Zugängen zum Sharing-Begriff nach. Er erläutert den Beitrag, aber auch die Grenzen von Dienstleistungstheorie und Property-Rights-Theorie für das Verständnis der Sharing Economy. Gründe für die Unterscheidung zwischen kommerzieller und nichtkommerzieller Sharing Economy werden dargelegt sowie mögliche Impulse der Sharing Economy für Änderungen im Verständnis wirtschaftlichen Handels und seiner Organisationsformen erörtert. This article elaborates on theoretic...

  20. Switched-Observer-Based Adaptive Neural Control of MIMO Switched Nonlinear Systems With Unknown Control Gains.

    Science.gov (United States)

    Long, Lijun; Zhao, Jun

    2017-07-01

    In this paper, the problem of adaptive neural output-feedback control is addressed for a class of multi-input multioutput (MIMO) switched uncertain nonlinear systems with unknown control gains. Neural networks (NNs) are used to approximate unknown nonlinear functions. In order to avoid the conservativeness caused by adoption of a common observer for all subsystems, an MIMO NN switched observer is designed to estimate unmeasurable states. A new switched observer-based adaptive neural control technique for the problem studied is then provided by exploiting the classical average dwell time (ADT) method and the backstepping method and the Nussbaum gain technique. It effectively handles the obstacle about the coexistence of multiple Nussbaum-type function terms, and improves the classical ADT method, since the exponential decline property of Lyapunov functions for individual subsystems is no longer satisfied. It is shown that the technique proposed is able to guarantee semiglobal uniformly ultimately boundedness of all the signals in the closed-loop system under a class of switching signals with ADT, and the tracking errors converge to a small neighborhood of the origin. The effectiveness of the approach proposed is illustrated by its application to a two inverted pendulum system.

  1. Shared Action Spaces: a basis function framework for social re-calibration of sensorimotor representations supporting joint action

    Directory of Open Access Journals (Sweden)

    Giovanni ePezzulo

    2013-11-01

    Full Text Available The article explores the possibilities of formalizing and explaining the mechanisms that support spatial and social perspective alignment sustained over the duration of a social interaction. The basic proposed principle is that in social contexts the mechanisms for sensorimotor transformations and multisensory integration (learn to incorporate information relative to the other actor(s, similar to the "re-calibration" of visual receptive fields in response to repeated tool use. This process aligns or merges the co-actors' spatial representations and creates a "Shared Action Space" supporting key computations of social interactions and joint actions; for example, the remapping between the coordinate systems and frames of reference of the co-actors, including perspective taking, the sensorimotor transformations required for lifting jointly an object, and the predictions of the sensory effects of such joint action. The social re-calibration is proposed to be based on common basis function maps and could constitute an optimal solution to sensorimotor transformation and multisensory integration in joint action or more in general social interaction contexts. However, certain situations such as discrepant postural and viewpoint alignment and associated differences in perspectives between the co-actors could constrain the process quite differently. We discuss how alignment is achieved in the first place, and how it is maintained over time, providing a taxonomy of various forms and mechanisms of space alignment and overlap based, for instance, on automaticity vs. control of the transformations between the two agents. Finally, we discuss the link between low-level mechanisms for the sharing of space and high-level mechanisms for the sharing of cognitive representations.

  2. The effects of shared situational awareness on functional and hospital outcomes of hospitalized older adults with heart failure

    Directory of Open Access Journals (Sweden)

    Lee JH

    2014-07-01

    Full Text Available Joo H Lee,1 Sun J Kim,2,3 Julia Lam,4 Sulgi Kim,5 Shunichi Nakagawa,6 Ji W Yoo7,8 1Department of Media and Communication, Hanyang University College of Social Sciences, Seoul, Korea; 2Department of Public Health, 3Institute of Health Services Research, Yonsei University College of Medicine, Seoul, Korea; 4University of Wisconsin School of Medicine and Public Health, Madison, WI, USA; 5Department of Epidemiology and Biostatistics, Case Western Reserve University, Cleveland, OH, USA; 6Department of Medicine, Columbia University College of Physicians and Surgeons, New York, NY, USA; 7Center for Senior Health and Longevity, Aurora Health Care, 8Department of Medicine, University of Wisconsin School of Medicine and Public Health, Milwaukee, WI, USA Background: Functional decline of hospitalized older adults is common and triggers health care expenditures. Physical therapy can retard the functional decline that occurs during hospitalization. This study aims to examine whether shared situational awareness (SSA intervention may enhance the benefits of physical therapy for hospitalized older persons with a common diagnosis, heart failure. Method: An SSA intervention that involved daily multidisciplinary meetings was applied to the care of functionally declining older adults admitted to the medicine floor for heart failure. Covariates were matched between the intervention group (n=473 and control group (n=475. Both intervention and control groups received physical therapy for ≥0.5 hours per day. The following three outcomes were compared between groups: 1 disability, 2 transition to skilled nursing facility (SNF, post-acute care setting, and 3 30-day readmission rate. Results: Disability was lower in the intervention group (28% than in the control group (37% (relative risk [RR] =0.74; 95% confidence interval [CI], 0.35–0.97; P=0.026, and transition to SNF was lower in the intervention group (22% than in the control group (30% (RR =0.77; 95% CI, 0.39

  3. Shared reality in interpersonal relationships.

    Science.gov (United States)

    Andersen, Susan M; Przybylinski, Elizabeth

    2017-11-24

    Close relationships afford us opportunities to create and maintain meaning systems as shared perceptions of ourselves and the world. Establishing a sense of mutual understanding allows for creating and maintaining lasting social bonds, and as such, is important in human relations. In a related vein, it has long been known that knowledge of significant others in one's life is stored in memory and evoked with new persons-in the social-cognitive process of 'transference'-imbuing new encounters with significance and leading to predictable cognitive, evaluative, motivational, and behavioral consequences, as well as shifts in the self and self-regulation, depending on the particular significant other evoked. In these pages, we briefly review the literature on meaning as interpersonally defined and then selectively review research on transference in interpersonal perception. Based on this, we then highlight a recent series of studies focused on shared meaning systems in transference. The highlighted studies show that values and beliefs that develop in close relationships (as shared reality) are linked in memory to significant-other knowledge, and thus, are indirectly activated (made accessible) when cues in a new person implicitly activate that significant-other knowledge (in transference), with these shared beliefs then actively pursued with the new person and even protected against threat. This also confers a sense of mutual understanding, and all told, serves both relational and epistemic functions. In concluding, we consider as well the relevance of co-construction of shared reality n such processes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  5. The science of sharing and the sharing of science.

    Science.gov (United States)

    Milkman, Katherine L; Berger, Jonah

    2014-09-16

    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii) who generates discoveries that are likely to be shared, and (iii) which types of people are most likely to share scientific discoveries. The results described here, combined with a review of recent research on interpersonal communication, suggest how scientists can frame their work to increase its dissemination. They also provide insights about which audiences may be the best targets for the diffusion of scientific content.

  6. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  7. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  8. Here's my location, for your information: The impact of trust, benefits, and social influence on location sharing application use among Indonesian university students

    NARCIS (Netherlands)

    Beldad, Ardion Daroca; Citra Kusumadewi, Margareta

    2015-01-01

    As mobile phones have become nearly ubiquitous, mobile phone applications are also becoming almost indispensable. Applications that enable people to share location information are becoming increasingly popular. What remains unknown, however, are the factors that influence the use of a location

  9. A Nonlinear Unit Root Test in the Presence of an Unknown Break

    OpenAIRE

    Popp, Stephan

    2008-01-01

    The Perron test is the most commonly applied procedure to test for a unit root in the presence of a structural break of unknown timing in the trend function. Deriving the Perron-type test regression from an unobserved component model, it is shown that the test regression in fact is nonlinear in coefficient. Taking account of the nonlinearity leads to a test with properties that are exclusively assigned to Schmidt-Phillips LM-type unit root tests.

  10. The science of sharing and the sharing of science

    OpenAIRE

    Milkman, Katherine L.; Berger, Jonah

    2014-01-01

    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii)...

  11. Automated pathway and reaction prediction facilitates in silico identification of unknown metabolites in human cohort studies.

    Science.gov (United States)

    Quell, Jan D; Römisch-Margl, Werner; Colombo, Marco; Krumsiek, Jan; Evans, Anne M; Mohney, Robert; Salomaa, Veikko; de Faire, Ulf; Groop, Leif C; Agakov, Felix; Looker, Helen C; McKeigue, Paul; Colhoun, Helen M; Kastenmüller, Gabi

    2017-12-15

    Identification of metabolites in non-targeted metabolomics continues to be a bottleneck in metabolomics studies in large human cohorts. Unidentified metabolites frequently emerge in the results of association studies linking metabolite levels to, for example, clinical phenotypes. For further analyses these unknown metabolites must be identified. Current approaches utilize chemical information, such as spectral details and fragmentation characteristics to determine components of unknown metabolites. Here, we propose a systems biology model exploiting the internal correlation structure of metabolite levels in combination with existing biochemical and genetic information to characterize properties of unknown molecules. Levels of 758 metabolites (439 known, 319 unknown) in human blood samples of 2279 subjects were measured using a non-targeted metabolomics platform (LC-MS and GC-MS). We reconstructed the structure of biochemical pathways that are imprinted in these metabolomics data by building an empirical network model based on 1040 significant partial correlations between metabolites. We further added associations of these metabolites to 134 genes from genome-wide association studies as well as reactions and functional relations to genes from the public database Recon 2 to the network model. From the local neighborhood in the network, we were able to predict the pathway annotation of 180 unknown metabolites. Furthermore, we classified 100 pairs of known and unknown and 45 pairs of unknown metabolites to 21 types of reactions based on their mass differences. As a proof of concept, we then looked further into the special case of predicted dehydrogenation reactions leading us to the selection of 39 candidate molecules for 5 unknown metabolites. Finally, we could verify 2 of those candidates by applying LC-MS analyses of commercially available candidate substances. The formerly unknown metabolites X-13891 and X-13069 were shown to be 2-dodecendioic acid and 9

  12. Capacity limits of spectrum-sharing systems over hyper-fading channels

    KAUST Repository

    Ekin, Sabit

    2011-01-20

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  13. Capacity limits of spectrum-sharing systems over hyper-fading channels

    KAUST Repository

    Ekin, Sabit; Yilmaz, Ferkan; Ç elebi, Hasari Burak; Qaraqe, Khalid A.; Alouini, Mohamed-Slim; Serpedin, Erchin

    2011-01-01

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  14. Shared decision making

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  15. Sharing data is a shared responsibility: Commentary on: "The essential nature of sharing in science".

    Science.gov (United States)

    Giffels, Joe

    2010-12-01

    Research data should be made readily available. A robust data-sharing plan, led by the principal investigator of the research project, requires considerable administrative and operational resources. Because external support for data sharing is minimal, principal investigators should consider engaging existing institutional information experts, such as librarians and information systems personnel, to participate in data-sharing efforts.

  16. Adaptive fuzzy wavelet network control of second order multi-agent systems with unknown nonlinear dynamics.

    Science.gov (United States)

    Taheri, Mehdi; Sheikholeslam, Farid; Najafi, Majddedin; Zekri, Maryam

    2017-07-01

    In this paper, consensus problem is considered for second order multi-agent systems with unknown nonlinear dynamics under undirected graphs. A novel distributed control strategy is suggested for leaderless systems based on adaptive fuzzy wavelet networks. Adaptive fuzzy wavelet networks are employed to compensate for the effect of unknown nonlinear dynamics. Moreover, the proposed method is developed for leader following systems and leader following systems with state time delays. Lyapunov functions are applied to prove uniformly ultimately bounded stability of closed loop systems and to obtain adaptive laws. Three simulation examples are presented to illustrate the effectiveness of the proposed control algorithms. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  17. The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    Directory of Open Access Journals (Sweden)

    Y. B. Li

    2012-09-01

    Full Text Available The competitive price game model is used to analyze the spectrum sharing problem in the cognitive radio networks, and the spectrum sharing problem with the constraints of available spectrum resource from primary users is further discussed in this paper. The Rockafeller multiplier method is applied to deal with the constraints of available licensed spectrum resource, and the improved profits function is achieved, which can be used to measure the impact of shared spectrum price strategies on the system profit. However, in the competitive spectrum sharing problem of practical cognitive radio network, primary users have to determine price of the shared spectrum without the acknowledgement of the other primary user’s price strategies. Thus a fast gradient iterative calculation method of equilibrium price is proposed, only with acknowledgement of the price strategies of shared spectrum during last cycle. Through the adaptive iteration at the direction with largest gradient of improved profit function, the equilibrium price strategies can be achieved rapidly. It can also avoid the predefinition of adjustment factor according to the parameters of communication system in conventional linear iteration method. Simulation results show that the proposed competitive price spectrum sharing model can be applied in the cognitive radio networks with constraints of available licensed spectrum, and it has better convergence performance.

  18. Learning to Lead Together: The Promise and Challenge of Sharing Leadership

    Science.gov (United States)

    Chrispeels, Janet H., Ed.

    2004-01-01

    "Learning to Lead Together: The Promise and Challenge of Sharing Leadership" examines the dilemmas for school leaders and administrators, and the benefits for schools and students, when principals work with teachers (and their communities) to share leadership. Most schools function within existing hierarchical structures that contradict…

  19. Hypnosis as a model of functional neurologic disorders.

    Science.gov (United States)

    Deeley, Q

    2016-01-01

    In the 19th century it was recognized that neurologic symptoms could be caused by "morbid ideation" as well as organic lesions. The subsequent observation that hysteric (now called "functional") symptoms could be produced and removed by hypnotic suggestion led Charcot to hypothesize that suggestion mediated the effects of ideas on hysteric symptoms through as yet unknown effects on brain activity. The advent of neuroimaging 100 years later revealed strikingly similar neural correlates in experiments matching functional symptoms with clinical analogs created by suggestion. Integrative models of suggested and functional symptoms regard these alterations in brain function as the endpoint of a broader set of changes in information processing due to suggestion. These accounts consider that suggestions alter experience by mobilizing representations from memory systems, and altering causal attributions, during preconscious processing which alters the content of what is provided to our highly edited subjective version of the world. Hypnosis as a model for functional symptoms draws attention to how radical alterations in experience and behavior can conform to the content of mental representations through effects on cognition and brain function. Experimental study of functional symptoms and their suggested counterparts in hypnosis reveals the distinct and shared processes through which this can occur. © 2016 Elsevier B.V. All rights reserved.

  20. Distributed Cooperative Current-Sharing Control of Parallel Chargers Using Feedback Linearization

    Directory of Open Access Journals (Sweden)

    Jiangang Liu

    2014-01-01

    Full Text Available We propose a distributed current-sharing scheme to address the output current imbalance problem for the parallel chargers in the energy storage type light rail vehicle system. By treating the parallel chargers as a group of agents with output information sharing through communication network, the current-sharing control problem is recast as the consensus tracking problem of multiagents. To facilitate the design, input-output feedback linearization is first applied to transform the nonidentical nonlinear charging system model into the first-order integrator. Then, a general saturation function is introduced to design the cooperative current-sharing control law which can guarantee the boundedness of the proposed control. The cooperative stability of the closed-loop system under fixed and dynamic communication topologies is rigorously proved with the aid of Lyapunov function and LaSalle invariant principle. Simulation using a multicharging test system further illustrates that the output currents of parallel chargers are balanced using the proposed control.

  1. Being Sticker Rich: Numerical Context Influences Children's Sharing Behavior.

    Directory of Open Access Journals (Sweden)

    Tasha Posid

    Full Text Available Young children spontaneously share resources with anonymous recipients, but little is known about the specific circumstances that promote or hinder these prosocial tendencies. Children (ages 3-11 received a small (12 or large (30 number of stickers, and were then given the opportunity to share their windfall with either one or multiple anonymous recipients (Dictator Game. Whether a child chose to share or not varied as a function of age, but was uninfluenced by numerical context. Moreover, children's giving was consistent with a proportion-based account, such that children typically donated a similar proportion (but different absolute number of the resources given to them, regardless of whether they originally received a small or large windfall. The proportion of resources donated, however, did vary based on the number of recipients with whom they were allowed to share, such that on average, children shared more when there were more recipients available, particularly when they had more resources, suggesting they take others into consideration when making prosocial decisions. Finally, results indicated that a child's gender also predicted sharing behavior, with males generally sharing more resources than females. Together, findings suggest that the numerical contexts under which children are asked to share, as well as the quantity of resources that they have to share, may interact to promote (or hinder altruistic behaviors throughout childhood.

  2. Minimal-Approximation-Based Distributed Consensus Tracking of a Class of Uncertain Nonlinear Multiagent Systems With Unknown Control Directions.

    Science.gov (United States)

    Choi, Yun Ho; Yoo, Sung Jin

    2017-03-28

    A minimal-approximation-based distributed adaptive consensus tracking approach is presented for strict-feedback multiagent systems with unknown heterogeneous nonlinearities and control directions under a directed network. Existing approximation-based consensus results for uncertain nonlinear multiagent systems in lower-triangular form have used multiple function approximators in each local controller to approximate unmatched nonlinearities of each follower. Thus, as the follower's order increases, the number of the approximators used in its local controller increases. However, the proposed approach employs only one function approximator to construct the local controller of each follower regardless of the order of the follower. The recursive design methodology using a new error transformation is derived for the proposed minimal-approximation-based design. Furthermore, a bounding lemma on parameters of Nussbaum functions is presented to handle the unknown control direction problem in the minimal-approximation-based distributed consensus tracking framework and the stability of the overall closed-loop system is rigorously analyzed in the Lyapunov sense.

  3. Wealth Share Analysis with “Fundamentalist/Chartist” Heterogeneous Agents

    Directory of Open Access Journals (Sweden)

    Hai-Chuan Xu

    2014-01-01

    Full Text Available We build a multiassets heterogeneous agents model with fundamentalists and chartists, who make investment decisions by maximizing the constant relative risk aversion utility function. We verify that the model can reproduce the main stylized facts in real markets, such as fat-tailed return distribution and long-term memory in volatility. Based on the calibrated model, we study the impacts of the key strategies’ parameters on investors’ wealth shares. We find that, as chartists’ exponential moving average periods increase, their wealth shares also show an increasing trend. This means that higher memory length can help to improve their wealth shares. This effect saturates when the exponential moving average periods are sufficiently long. On the other hand, the mean reversion parameter has no obvious impacts on wealth shares of either type of traders. It suggests that no matter whether fundamentalists take moderate strategy or aggressive strategy on the mistake of stock prices, it will have no different impact on their wealth shares in the long run.

  4. Towards open sharing of task-based fMRI data: The OpenfMRI project

    Directory of Open Access Journals (Sweden)

    Russell A Poldrack

    2013-07-01

    Full Text Available The large-scale sharing of task-based functional neuroimaging data has the potential to allow novel insights into the organization of mental function in the brain, but the field of neuroimaging has lagged behind other areas of bioscience in the development of data sharing resources. This paper describes the OpenFMRI project (accessible online at http://www.openfmri.org, which aims to provide the neuroimaging community with a resource to support open sharing of task-based fMRI studies. We describe the motivation behind the project, focusing particularly on how this project addresses some of the well-known challenges to sharing of task-based fMRI data. Results from a preliminary analysis of the current database are presented, which demonstrate the ability to classify between task contrasts with high generalization accuracy across subjects, and the ability to identify individual subjects from their activation maps with moderately high accuracy. Clustering analyses show that the similarity relations between statistical maps have a somewhat orderly relation to the mental functions engaged by the relevant tasks. These results highlight the potential of the project to support large-scale multivariate analyses of the relation between mental processes and brain function.

  5. Heat Load Sharing in a Capillary Pumped Loop with Multiple Evaporators and Multiple Condensers

    Science.gov (United States)

    Ku, Jentung

    2005-01-01

    This paper describes the heat load sharing function among multiple parallel evaporators in a capillary pumped loop (CPL). In the normal mode of operation, the evaporators cool the instruments by absorbing the waste heat. When an instruments is turned off, the attached evaporator can keep it warm by receiving heat from other evaporators serving the operating instruments. This is referred to as heat load sharing. A theoretical basis of heat load sharing is given first. The fact that the wicks in the powered evaporators will develop capillary pressure to force the generated vapor to flow to cold locations where the pressure is lower leads to the conclusion that heat load sharing is an inherent function of a CPL with multiple evaporators. Heat load sharing has been verified with many CPLs in ground tests. Experimental results of the Capillary Pumped Loop 3 (CAPL 3) Flight Experiment are presented in this paper. Factors that affect the amount of heat being shared are discussed. Some constraints of heat load sharing are also addressed.

  6. Classification of Unknown Thermocouple Types Using Similarity Factor Measurement

    Directory of Open Access Journals (Sweden)

    Seshu K. DAMARLA

    2011-01-01

    Full Text Available In contrast to classification using PCA method, a new methodology is proposed for type identification of unknown thermocouple. The new methodology is based on calculating the degree of similarity between two multivariate datasets using two types of similarity factors. One similarity factor is based on principle component analysis and the angles between the principle component subspaces while the other is based on the Mahalanobis distance between the datasets. Datasets containing thermo-emfs against given temperature ranges are formed for each type of thermocouple (e.g. J, K, S, T, R, E, B and N type by experimentation are considered as reference datasets. Datasets corresponding to unknown type are captured. Similarity factor between the datasets one of which being the unknown type and the other being each known type are compared. When maximum similarity factor occurs, then the class of unknown type is allocated to that of known type.

  7. Measurement of cardiovascular function using a novel view-sharing PET reconstruction method and tracer kinetic analysis

    Directory of Open Access Journals (Sweden)

    Paul R. Territo

    2016-10-01

    Full Text Available Abstract Recent advancements in PET instrumentation have made the non-invasive assessment of cardiovascular function in small animals a reality. The majority of small animal PET systems use stationary detector gantries, thus affording high temporal resolution imaging of cardiac function. Systems designed to maximize spatial resolution and detection sensitivity employing rotating gantry designs are suboptimal when high temporal resolution imaging is needed. To overcome this limitation, the current work developed a novel view-sharing data analysis scheme suitable for dynamic cardiac PET imaging using 18F-NaF as the tracer and tracer kinetic model analysis. This scheme was tested in a rat model of cardiovascular function where the relationship between direct transonic flow measures of cardiac output were highly correlated (f(x = 1.0216x − 24.233, R = 0.9158, p < 0.001 with the new model. Similarly, derived measures of stroke volume were also highly correlated (f(x = 0.9655x − 0.0428, R = 0.9453, p < 0.001 with the current approach. Administration of xylazine caused a statistically significant increase in stroke volume (0.32 ± 0.07 ml, p = 0.003, n = 4 and a significant decrease in both heart rate (−155 ± 7.1 beats/min, p < 0.001, n = 4 and cardiac output (−75.9 ± 23.0 ml/kg min, p = 0.01, n = 4. These findings suggest that the new sinogram binning and kinetic modeling methods produce reliable cardiac function measures suitable for longitudinal monitoring of cardiovascular function.

  8. How to Incorporate Technology with Inquiry-Based Learning to Enhance the Understanding of Chemical Composition; How to Analyze Unknown Samples

    Directory of Open Access Journals (Sweden)

    Suzanne Lunsford

    2017-02-01

    Full Text Available The use of technology in teaching offers numerous amounts of possibilities and can be challenging for physics, chemistry and geology content courses. When incorporating technology into a science content lab it is better to be driven by pedagogy than by technology in an inquiry-based lab setting. Students need to be introduced to real-world technology in the beginning of first year chemistry or physics course to ensure real-world technology concepts while assisting with content such as periodic trends on the periodic table. This article will describe the use of technology with Raman Spectroscopy and Energy Dispersive XRay Spectroscopy (EDS and Fourier Transform Infrared Spectroscopy (FTIR to research chemical compositions in the real world of unknown samples. Such unknown samples utilized in this lab were clamshell (parts of clams that look like shark teeth versus shark teeth. The data will be shared to show how the students (pre-service teachers and in-service teachers solved the problem using technology while learning important content that will assist in the next level of chemistry, physics and even geology.

  9. To share or not to share : Parental, sibling, and situational influences on sharing with a younger sibling

    NARCIS (Netherlands)

    Van Berkel, Sheila R.; Van Der Pol, Lotte D.; Groeneveld, Marleen G.; Hallers-Haalboom, Elizabeth T.; Endendijk, Joyce J.; Mesman, Judi; Bakermans-Kranenburg, Marian J.

    2015-01-01

    Sharing is an important indicator of internalised prosocial values. We examined predictors of sharing of 302 preschoolers with their younger siblings in a one-year longitudinal study. Sharing was observed during different home visits, once with father and once with mother. We examined the following

  10. To share or not to share, that is the question. Conditions for the willingness to share knowledge

    NARCIS (Netherlands)

    Andriessen, J.H.E.

    2006-01-01

    Sharing knowledge is an important aspect of most modern organisation. Ideas about how to stimulate knowledge sharing abound, but without much theorising. The objective of this article is to link basic motivation theories to empirical studies of knowledge sharing and its conditions. The paper starts

  11. Ordinary Share Price Behaviour Around 'C' Share Issues by Investment Trusts

    OpenAIRE

    Adams, Andrew T; Szakacs, M

    1995-01-01

    This paper examines the "C" share issue, a method of issuing shares which is peculiar to the UK investment trust industry. In particular, we analyse abnormal returns and discount/premium to net asset value behaviour of the ordinary shares both before and after the announcement of "C" share issues. The research was conducted using event study methodology and an innovative approach to the analysis of discount/premium movements. The results suggest a tendency for the ordinary shares to outperfor...

  12. Reconceptualising Shared Services

    Directory of Open Access Journals (Sweden)

    Peter McKinlay

    2011-12-01

    Full Text Available Endeavours to improve the efficiency and effectiveness of local government have been a persistent theme both of politicians in higher tiers of government and of interest groups, especially business. The two contenders for improvement which receive most coverage both in the research literature and in popular discussion are amalgamation and shared services. Arguments from the literature have generally favoured shared services over amalgamation. Bish (2001 in a comprehensive review of North American research dismisses the argument for amalgamation as a product of flawed nineteenth-century thinking and a bureaucratic urge for centralized control. He does so making the very reasonable point that the presumed economies of scale which will result from amalgamation are a function not of the size and scale of individual local authorities, but of the services for which those local authorities are responsible, and the point at which economies of scale will be optimised will be very different for different services. The case against amalgamation is also reinforced by the absence of any significant post-facto evidence that amalgamation achieves either the promised savings or the anticipated efficiency gains (McKinlay 2006.

  13. The Value of Sharing Information: A Neural Account of Information Transmission.

    Science.gov (United States)

    Baek, Elisa C; Scholz, Christin; O'Donnell, Matthew Brook; Falk, Emily B

    2017-07-01

    Humans routinely share information with one another. What drives this behavior? We used neuroimaging to test an account of information selection and sharing that emphasizes inherent reward in self-reflection and connecting with other people. Participants underwent functional MRI while they considered personally reading and sharing New York Times articles. Activity in neural regions involved in positive valuation, self-related processing, and taking the perspective of others was significantly associated with decisions to select and share articles, and scaled with preferences to do so. Activity in all three sets of regions was greater when participants considered sharing articles with other people rather than selecting articles to read themselves. The findings suggest that people may consider value not only to themselves but also to others even when selecting news articles to consume personally. Further, sharing heightens activity in these pathways, in line with our proposal that humans derive value from self-reflection and connecting to others via sharing.

  14. A simple tool for neuroimaging data sharing

    Directory of Open Access Journals (Sweden)

    Christian eHaselgrove

    2014-05-01

    Full Text Available Data sharing is becoming increasingly common, but despite encouragement and facilitation by funding agencies, journals, and some research efforts, most neuroimaging data acquired today is still not shared due to political, financial, social, and technical barriers to sharing data that remain. In particular, technical solutions are few for researchers that are not a part of larger efforts with dedicated sharing infrastructures, and social barriers such as the time commitment required to share can keep data from becoming publicly available.We present a system for sharing neuroimaging data, designed to be simple to use and to provide benefit to the data provider. The system consists of a server at the International Neuroinformatics Coordinating Facility (INCF and user tools for uploading data to the server. The primary design principle for the user tools is ease of use: the user identifies a directory containing DICOM data, provides their INCF Portal authentication, and provides identifiers for the subject and imaging session. The user tool anonymizes the data and sends it to the server. The server then runs quality control routines on the data, and the data and the quality control reports are made public. The user retains control of the data and may change the sharing policy as they need. The result is that in a few minutes of the user’s time, DICOM data can be anonymized and made publicly available, and an initial quality control assessment can be performed on the data. The system is currently functional, and user tools and access to the public image database are available at http://xnat.incf.org/.

  15. To Share or Not to Share: Parental, Sibling, and Situational Influences on Sharing with a Younger Sibling

    Science.gov (United States)

    Van Berkel, Sheila R.; Van der Pol, Lotte D.; Groeneveld, Marleen G.; Hallers-Haalboom, Elizabeth T.; Endendijk, Joyce J.; Mesman, Judi; Bakermans-Kranenburg, Marian J.

    2015-01-01

    Sharing is an important indicator of internalised prosocial values. We examined predictors of sharing of 302 preschoolers with their younger siblings in a one-year longitudinal study. Sharing was observed during different home visits, once with father and once with mother. We examined the following predictors: both children's externalising…

  16. Shared identity is key to effective communication.

    Science.gov (United States)

    Greenaway, Katharine H; Wright, Ruth G; Willingham, Joanne; Reynolds, Katherine J; Haslam, S Alexander

    2015-02-01

    The ability to communicate with others is one of the most important human social functions, yet communication is not always investigated from a social perspective. This research examined the role that shared social identity plays in communication effectiveness using a minimal group paradigm. In two experiments, participants constructed a model using instructions that were said to be created by an ingroup or an outgroup member. Participants made models of objectively better quality when working from communications ostensibly created by an ingroup member (Experiments 1 and 2). However, this effect was attenuated when participants were made aware of a shared superordinate identity that included both the ingroup and the outgroup (Experiment 2). These findings point to the importance of shared social identity for effective communication and provide novel insights into the social psychology of communication. © 2014 by the Society for Personality and Social Psychology, Inc.

  17. Impulsive synchronization of Markovian jumping randomly coupled neural networks with partly unknown transition probabilities via multiple integral approach.

    Science.gov (United States)

    Chandrasekar, A; Rakkiyappan, R; Cao, Jinde

    2015-10-01

    This paper studies the impulsive synchronization of Markovian jumping randomly coupled neural networks with partly unknown transition probabilities via multiple integral approach. The array of neural networks are coupled in a random fashion which is governed by Bernoulli random variable. The aim of this paper is to obtain the synchronization criteria, which is suitable for both exactly known and partly unknown transition probabilities such that the coupled neural network is synchronized with mixed time-delay. The considered impulsive effects can be synchronized at partly unknown transition probabilities. Besides, a multiple integral approach is also proposed to strengthen the Markovian jumping randomly coupled neural networks with partly unknown transition probabilities. By making use of Kronecker product and some useful integral inequalities, a novel Lyapunov-Krasovskii functional was designed for handling the coupled neural network with mixed delay and then impulsive synchronization criteria are solvable in a set of linear matrix inequalities. Finally, numerical examples are presented to illustrate the effectiveness and advantages of the theoretical results. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Towards a Process Algebra for Shared Processors

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Andersen, Jacob; Løvengreen, Hans Henrik

    2002-01-01

    We present initial work on a timed process algebra that models sharing of processor resources allowing preemption at arbitrary points in time. This enables us to model both the functional and the timely behaviour of concurrent processes executed on a single processor. We give a refinement relation...

  19. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  20. Two datasets of defect reports labeled by a crowd of annotators of unknown reliability

    Directory of Open Access Journals (Sweden)

    Jerónimo Hernández-González

    2018-06-01

    Full Text Available Classifying software defects according to any defined taxonomy is not straightforward. In order to be used for automatizing the classification of software defects, two sets of defect reports were collected from public issue tracking systems from two different real domains. Due to the lack of a domain expert, the collected defects were categorized by a set of annotators of unknown reliability according to their impact from IBM's orthogonal defect classification taxonomy. Both datasets are prepared to solve the defect classification problem by means of techniques of the learning from crowds paradigm (Hernández-González et al. [1].Two versions of both datasets are publicly shared. In the first version, the raw data is given: the text description of defects together with the category assigned by each annotator. In the second version, the text of each defect has been transformed to a descriptive vector using text-mining techniques.

  1. Multifocal, chronic osteomyelitis of unknown etiology

    International Nuclear Information System (INIS)

    Kozlowski, K.; Beluffi, G.; Feltham, C.; James, M.; Nespoli, L.; Tamaela, L.; Pavia Univ.; Municipal Hospital, Nelson; Medical School, Jakarta

    1985-01-01

    Four cases of multifocal osteomyelitis of unknown origin in childhood are reported. The variable clinical and radiographic appearances of the disease are illustrated and the diagnostic difficulties in the early stages of the disease are stressed. (orig.) [de

  2. How physician electronic health record screen sharing affects patient and doctor non-verbal communication in primary care.

    Science.gov (United States)

    Asan, Onur; Young, Henry N; Chewning, Betty; Montague, Enid

    2015-03-01

    Use of electronic health records (EHRs) in primary-care exam rooms changes the dynamics of patient-physician interaction. This study examines and compares doctor-patient non-verbal communication (eye-gaze patterns) during primary care encounters for three different screen/information sharing groups: (1) active information sharing, (2) passive information sharing, and (3) technology withdrawal. Researchers video recorded 100 primary-care visits and coded the direction and duration of doctor and patient gaze. Descriptive statistics compared the length of gaze patterns as a percentage of visit length. Lag sequential analysis determined whether physician eye-gaze influenced patient eye gaze, and vice versa, and examined variations across groups. Significant differences were found in duration of gaze across groups. Lag sequential analysis found significant associations between several gaze patterns. Some, such as DGP-PGD ("doctor gaze patient" followed by "patient gaze doctor") were significant for all groups. Others, such DGT-PGU ("doctor gaze technology" followed by "patient gaze unknown") were unique to one group. Some technology use styles (active information sharing) seem to create more patient engagement, while others (passive information sharing) lead to patient disengagement. Doctors can engage patients in communication by using EHRs in the visits. EHR training and design should facilitate this. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  3. Incentive mechanism based on cooperative advertising for cost information sharing in a supply chain with competing retailers

    Science.gov (United States)

    Setak, Mostafa; Kafshian Ahar, Hajar; Alaei, Saeed

    2017-09-01

    This paper proposes a new motivation for information sharing in a decentralized channel consisting of a single manufacturer and two competing retailers. The manufacturer provides a common product to the retailers at the same wholesale price. Both retailers add their own values to the product and distribute it to consumers. Factors such as retail prices, values added to the product, and local advertising of the retailers simultaneously have effect on market demand. Each retailer has full information about the own added value which is unknown to the manufacturer and other retailer. The manufacturer uses a cooperative advertising program for motivating the retailers to disclose their private information. A numerical study is presented to compare different scenarios of information sharing. Computational results show that there is a condition in which full information sharing is beneficial for all members of the supply chain through cooperative advertising program and, therefore, retailers have enough incentive to disclose their cost information to the manufacturer.

  4. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Directory of Open Access Journals (Sweden)

    Touhid Bhuiyan

    2010-03-01

    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  5. An Evidence-Based Review Literature About Risk Indicators and Management of Unknown-Origin Xerostomia

    Directory of Open Access Journals (Sweden)

    Farzaneh Agha-hosseini

    2013-01-01

    Full Text Available Objective: This evidence-based article reviews risk indicators and management of unknown-origin xerostomia. Xerostomia and hyposalivation refer to different aspects of dry mouth. Xerostomia is a subjective sensation of dry mouth, whilst hyposalivation is defined as an objective assessment of reduced salivary flow rate. About 30% of the elderly (65 years and older experience xerostomia and hyposalivation. Structural and functional factors, or both may lead to salivary gland dysfunction.Study Selection: The EBM literature search was conducted by using the medical literature database MEDLINE via PubMed and OvidMedline search engines. Results were limited to English language articles (1965 to present including clinical trials (CT, randomized controlled trials (RCT, systematic reviews and review articles. Case control or cohort studies were included for the etiology.Results: Neuropathic etiology such as localized oral alteration of thermal sensations, saliva composition change (for example higher levels of K, Cl, Ca, IgA, amylase, calcium, PTH and cortisol, lower levels of estrogen and progesterone, smaller salivary gland size, and illnesses such as lichen planus, are risk indicators for unknown-origin xerostomia. The management is palliative and preventative. Management of symptoms includes drug administration (systemic secretogogues, saliva substitutes and bile secretion-stimulator, night guard, diet and habit modifications. Other managements may be indicated to treat adverse effects.Conclusion: Neuropathic etiology, saliva composition change, smaller salivary gland size, and illnesses such as oral lichen planus can be suggestive causes for unknown-origin xerostomia. However, longitudinal studies will be important to elucidate the causes of unknown-origin xerostomia.

  6. Fever of unknown origin

    International Nuclear Information System (INIS)

    Misaki, Takashi; Matsui, Akira; Tanaka, Fumiko; Okuno, Yoshishige; Mitsumori, Michihide; Torizuka, Tatsurou; Dokoh, Shigeharu; Hayakawa, Katsumi; Shimbo, Shin-ichirou

    1990-01-01

    Gallium-67 scintigraphy is a commonly performed imaging modality in deteting pyrogenic lesions in cases of long-standing inexplainable fever. To re-evaluate the significance of gallium imaging in such cases, a retrospective review was made of 56 scans performed in febrile patients in whom sufficient clinical and laboratory findings were obtained. Gallium scans were true positive in 30 patients, false positive in 3, true negative in 19, and false negative in 4. In the group of true positive, local inflammatory lesions were detected in 23 patients with a final diagnosis of lung tuberculosis, urinary tract infection, and inflammatory joint disease. Abnormal gallium accumulation, as shown in the other 7 patients, provided clues to the diagnosis of generalized disorders, such as hematological malignancies (n=3), systemic autoimmune diseases (n=3), and severe infectious mononucleosis (n=one). In the group of false positive, gallium imaging revealed intestinal excretion of gallium in 2 patients and physiological pulmonary hilar accumulation in one. In the true negative group of 19 patients, fever of unknown origin was resolved spontaneously in 12 patients, and with antibiotics and corticosteroids in 2 and 5 patients, respectively. Four patients having false negative scans were finally diagnosed as having urinary tract infection (n=2), bacterial meningitis (n=one), and polyarteritis (n=one). Gallium imaging would remain the technique of choice in searching for origin of unknown fever. It may also be useful for early diagnosis of systemic disease, as well as focal inflammation. (N.K.)

  7. Hyperfamiliarity for unknown faces after left lateral temporo-occipital venous infarction: a double dissociation with prosopagnosia.

    Science.gov (United States)

    Vuilleumier, Patrik; Mohr, Christine; Valenza, Nathalie; Wetzel, Corinne; Landis, Theodor

    2003-04-01

    Right hemisphere dominance in face processing is well established and unilateral right inferior temporo-occipital damage can result in prosopagnosia. Here, we describe a 21-year-old right-handed woman with acute impairment in face recognition that selectively concerned unfamiliar faces, following a focal left lateral temporo-occipital venous infarct. She was severely impaired in discerning that unknown people seen in everyday life were unfamiliar, although she had no difficulty recognizing familiar people. Thus, she had no prosopagnosia, but abnormal 'hyperfamiliarity' for unknown faces. Her difficulty was not accompanied by delusions or deficits in discrimination, identification or memory for faces. Standard neuropsychological testing showed that her recognition of familiar faces was entirely normal. By contrast, her sense of personally knowing faces was severely impaired when unknown faces evoked weak signals of familiarity based on spurious cues, to the extent that she would misattribute fame to faces that were unknown but to which she had been incidentally exposed on a prior occasion. Priming experiments also revealed that, unlike normal subjects, she made familiarity judgements without accessing semantic identity representations. Moreover, in face recognition tests, she generally showed bias in that she relied more on right-hemisphere strategies to identify global traits and less on left-hemisphere processes compared with healthy subjects. This case provides novel evidence for a differential contribution of the two hemispheres to face recognition. Hyperfamiliarity for unknown faces might arise from an imbalance between reciprocal hemispheric functions in face recognition, with relative hypoactivation of left hemisphere processes but hyperactivation of right-hemisphere processes for retrieving stored associations about people, linking seen faces to representations of affective and personal relevance. Hence, abnormal bias in attributing some personal meaning to

  8. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  9. Kriging with Unknown Variance Components for Regional Ionospheric Reconstruction

    Directory of Open Access Journals (Sweden)

    Ling Huang

    2017-02-01

    Full Text Available Ionospheric delay effect is a critical issue that limits the accuracy of precise Global Navigation Satellite System (GNSS positioning and navigation for single-frequency users, especially in mid- and low-latitude regions where variations in the ionosphere are larger. Kriging spatial interpolation techniques have been recently introduced to model the spatial correlation and variability of ionosphere, which intrinsically assume that the ionosphere field is stochastically stationary but does not take the random observational errors into account. In this paper, by treating the spatial statistical information on ionosphere as prior knowledge and based on Total Electron Content (TEC semivariogram analysis, we use Kriging techniques to spatially interpolate TEC values. By assuming that the stochastic models of both the ionospheric signals and measurement errors are only known up to some unknown factors, we propose a new Kriging spatial interpolation method with unknown variance components for both the signals of ionosphere and TEC measurements. Variance component estimation has been integrated with Kriging to reconstruct regional ionospheric delays. The method has been applied to data from the Crustal Movement Observation Network of China (CMONOC and compared with the ordinary Kriging and polynomial interpolations with spherical cap harmonic functions, polynomial functions and low-degree spherical harmonic functions. The statistics of results indicate that the daily ionospheric variations during the experimental period characterized by the proposed approach have good agreement with the other methods, ranging from 10 to 80 TEC Unit (TECU, 1 TECU = 1 × 1016 electrons/m2 with an overall mean of 28.2 TECU. The proposed method can produce more appropriate estimations whose general TEC level is as smooth as the ordinary Kriging but with a smaller standard deviation around 3 TECU than others. The residual results show that the interpolation precision of the

  10. Estimating savings in parking demand using shared vehicles for home-work commuting

    OpenAIRE

    Kondor, Dániel; Zhang, Hongmou; Tachet, Remi; Santi, Paolo; Ratti, Carlo

    2017-01-01

    The increasing availability and adoption of shared vehicles as an alternative to personally-owned cars presents ample opportunities for achieving more efficient transportation in cities. With private cars spending on the average over 95\\% of the time parked, one of the possible benefits of shared mobility is the reduced need for parking space. While widely discussed, a systematic quantification of these benefits as a function of mobility demand and sharing models is still mostly lacking in th...

  11. Sharing specific "We" autobiographical memories in close relationships: the role of contact frequency.

    Science.gov (United States)

    Beike, Denise R; Cole, Holly E; Merrick, Carmen R

    2017-11-01

    Sharing memories in conversations with close others is posited to be part of the social function of autobiographical memory. The present research focused on the sharing of a particular type of memory: Specific memories about one-time co-experienced events, which we termed Specific We memories. Two studies with 595 total participants examined the factors that lead to and/or are influenced by the sharing of Specific We memories. In Study 1, participants reported on their most recent conversation. Specific We memories were reportedly discussed most often in conversations with others who were close and with whom the participant had frequent communication. In Study 2, participants were randomly assigned either to increase or to simply record the frequency of communication with a close other (parent). Increases in the frequency of reported sharing of Specific We memories as well as closeness to the parent resulted. Mediation analyses of both studies revealed causal relationships among reported sharing of Specific We memories and closeness. We discuss the relevance of these results for understanding the social function of autobiographical memory.

  12. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  13. A Hybrid Energy Sharing Framework for Green Cellular Networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2016-12-09

    Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy selfreliance and minimize the network’s energy cost, the operator needs to efficiently exploit the RE generated across all BSs. In this paper, a hybrid energy sharing framework for cellular network is proposed, where a combination of physical power lines and energy trading with other BSs using smart grid is used. Algorithms for physical power lines deployment between BSs, based on average and complete statistics of the net RE available, are developed. Afterwards, an energy management framework is formulated to optimally determine the quantities of electricity and RE to be procured and exchanged among BSs, respectively, while considering battery capacities and real-time energy pricing. Three cases are investigated where RE generation is unknown, perfectly known, and partially known ahead of time. Results investigate the time varying energy management of BSs and demonstrate considerable reduction in average energy cost thanks to the hybrid energy sharing scheme.

  14. A Qualitative Analysis of Real-Time Continuous Glucose Monitoring Data Sharing with Care Partners: To Share or Not to Share?

    Science.gov (United States)

    Litchman, Michelle L; Allen, Nancy A; Colicchio, Vanessa D; Wawrzynski, Sarah E; Sparling, Kerri M; Hendricks, Krissa L; Berg, Cynthia A

    2018-01-01

    Little research exists regarding how real-time continuous glucose monitoring (RT-CGM) data sharing plays a role in the relationship between patients and their care partners. To (1) identify the benefits and challenges related to RT-CGM data sharing from the patient and care partner perspective and (2) to explore the number and type of individuals who share and follow RT-CGM data. This qualitative content analysis was conducted by examining publicly available blogs focused on RT-CGM and data sharing. A thematic analysis of blogs and associated comments was conducted. A systematic appraisal of personal blogs examined 39 blogs with 206 corresponding comments. The results of the study provided insight about the benefits and challenges related to individuals with diabetes sharing their RT-CGM data with a care partner(s). The analysis resulted in three themes: (1) RT-CGM data sharing enhances feelings of safety, (2) the need to communicate boundaries to avoid judgment, and (3) choice about sharing and following RT-CGM data. RT-CGM data sharing occurred within dyads (n = 46), triads (n = 15), and tetrads (n = 2). Adults and children with type 1 diabetes and their care partners are empowered by the ability to share and follow RT-CGM data. Our findings suggest that RT-CGM data sharing between an individual with diabetes and their care partner can complicate relationships. Healthcare providers need to engage patients and care partners in discussions about best practices related to RT-CGM sharing and following to avoid frustrations within the relationship.

  15. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  16. Shared vision promotes family firm performance.

    Science.gov (United States)

    Neff, John E

    2015-01-01

    A clear picture of the influential drivers of private family firm performance has proven to be an elusive target. The unique characteristics of private family owned firms necessitate a broader, non-financial approach to reveal firm performance drivers. This research study sought to specify and evaluate the themes that distinguish successful family firms from less successful family firms. In addition, this study explored the possibility that these themes collectively form an effective organizational culture that improves longer-term firm performance. At an organizational level of analysis, research findings identified four significant variables: Shared Vision (PNS), Role Clarity (RCL), Confidence in Management (CON), and Professional Networking (OLN) that positively impacted family firm financial performance. Shared Vision exhibited the strongest positive influence among the significant factors. In addition, Family Functionality (APGAR), the functional integrity of the family itself, exhibited a significant supporting role. Taken together, the variables collectively represent an effective family business culture (EFBC) that positively impacted the long-term financial sustainability of family owned firms. The index of effective family business culture also exhibited potential as a predictive non-financial model of family firm performance.

  17. Shared Vision promotes family firm performance

    Directory of Open Access Journals (Sweden)

    John Edward Neff

    2015-05-01

    Full Text Available A clear picture of the influential drivers of private family firm performance has proven to be an elusive target. The unique characteristics of private family owned firms necessitate a broader, non-financial approach to reveal firm performance drivers. This research study sought to specify and evaluate the themes that distinguish successful family firms from less successful family firms. In addition, this study explored the possibility that these themes collectively form an effective organizational culture that improves longer-term firm performance. At an organizational level of analysis, research findings identified four significant variables: Shared Vision (PNS, Role Clarity (RCL, Confidence in Management (CON, and Professional Networking (OLN that positively impacted family firm financial performance. Shared Vision exhibited the strongest positive influence among the significant factors. In addition, Family Functionality (APGAR, the functional integrity of the family itself exhibited a significant supporting role. Taken together, the variables collectively represent an effective family business culture (EFBC that positively impacted the long-term financial sustainability of family owned firms. The index of effective family business culture also exhibited potential as a predictive non-financial model of family firm performance.

  18. An eigenvalue approach for the automatic scaling of unknowns in model-based reconstructions: Application to real-time phase-contrast flow MRI.

    Science.gov (United States)

    Tan, Zhengguo; Hohage, Thorsten; Kalentev, Oleksandr; Joseph, Arun A; Wang, Xiaoqing; Voit, Dirk; Merboldt, K Dietmar; Frahm, Jens

    2017-12-01

    The purpose of this work is to develop an automatic method for the scaling of unknowns in model-based nonlinear inverse reconstructions and to evaluate its application to real-time phase-contrast (RT-PC) flow magnetic resonance imaging (MRI). Model-based MRI reconstructions of parametric maps which describe a physical or physiological function require the solution of a nonlinear inverse problem, because the list of unknowns in the extended MRI signal equation comprises multiple functional parameters and all coil sensitivity profiles. Iterative solutions therefore rely on an appropriate scaling of unknowns to numerically balance partial derivatives and regularization terms. The scaling of unknowns emerges as a self-adjoint and positive-definite matrix which is expressible by its maximal eigenvalue and solved by power iterations. The proposed method is applied to RT-PC flow MRI based on highly undersampled acquisitions. Experimental validations include numerical phantoms providing ground truth and a wide range of human studies in the ascending aorta, carotid arteries, deep veins during muscular exercise and cerebrospinal fluid during deep respiration. For RT-PC flow MRI, model-based reconstructions with automatic scaling not only offer velocity maps with high spatiotemporal acuity and much reduced phase noise, but also ensure fast convergence as well as accurate and precise velocities for all conditions tested, i.e. for different velocity ranges, vessel sizes and the simultaneous presence of signals with velocity aliasing. In summary, the proposed automatic scaling of unknowns in model-based MRI reconstructions yields quantitatively reliable velocities for RT-PC flow MRI in various experimental scenarios. Copyright © 2017 John Wiley & Sons, Ltd.

  19. Shared genetic effects between hepatic steatosis and fibrosis: A prospective twin study

    Science.gov (United States)

    Cui, Jeffrey; Chen, Chi-Hua; Lo, Min-Tzu; Schork, Nicholas; Bettencourt, Ricki; Gonzalez, Monica P; Bhatt, Archana; Hooker, Jonathan; Shaffer, Katherine; Nelson, Karen E; Long, Michelle T; Brenner, David A; Sirlin, Claude B; Loomba, Rohit

    2016-01-01

    Introduction Nonalcoholic fatty liver disease (NAFLD) is associated with metabolic risk factors including hypertension and dyslipidemia, and may progress to liver fibrosis. Previous studies have shown that hepatic steatosis and fibrosis are heritable but whether they have a significant shared gene effect is unknown. This study aimed to examine the shared gene effects between hepatic steatosis, fibrosis, and their associations with metabolic risk factors. Methods This is a cross-sectional analysis of a prospective cohort of well-characterized, community-dwelling twins (45 monozygotic, 20 dizygotic twin pairs, 130 total subjects) from Southern California. Hepatic steatosis was assessed with MRI-proton density fat fraction (MRI-PDFF) and hepatic fibrosis was assessed with magnetic resonance elastography (MRE). A standard bivariate twin AE model was used to estimate the proportion of phenotypic variance between two phenotypes accounted for by additive genetic effects (A) and individual-specific environmental effects (E). Genetic correlations (rG) estimated from this model represent the degree to which the genetic determinants of two phenotypes overlap. Results The mean (±SD) age and BMI were 47.1 (±21.9) years and 26.9 (±6.5) kg/m2, respectively. 20% (26/130) of the cohort had hepatic steatosis (MRI-PDFF ≥5%) and 8.2% (10/122) had hepatic fibrosis (MRE ≥3Kpa). Blood pressure (systolic and diastolic), triglycerides, glucose, homeostatic model assessment of insulin resistance (HOMA-IR), insulin, hemoglobin A1c (HbA1c), and low high-density lipoprotein (HDL) had significant shared gene effects with hepatic steatosis. Triglycerides, glucose, HOMA-IR, insulin, HbA1c, and low HDL had significant shared gene effects with hepatic fibrosis. Hepatic steatosis and fibrosis had a highly significant shared gene effect of 0.756 (95% CI: 0.716–1, psteatosis pathogenesis may also be involved with fibrosis pathogenesis. PMID:27315352

  20. Study of excitation energy sharing in heavy ion collisions as a function of their inelasticity

    International Nuclear Information System (INIS)

    Lott, B.

    1986-01-01

    The excitation energy sharing between the fragments of a heavy ion collision has been studied for quasi-elastic and deep inelastic mechanisms. A 32 S beam of 232 MeV incident energy has been used to bombard several targets (S, 58 Ni, 93 Nb). The evaporated charged particle multiplicities have been measured by inclusive measurements of the projectile-like nuclei and exclusive measurements of the two final nuclei. Evaporation calculations using the Hauser-Feshbach formalism allows us to deduce from the multiplicity measurements the projectile-like excitation energy. These results are compatible with the assumption of an equal sharing of excitation energies for quasi-elastic reaction products, and with the assumption of a mass ratio sharing for fully relaxed reaction products. Limiting values for the relaxation time of this mode have been deduced and are in agreement with predictions from the model developed by Randrup [fr

  1. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  2. Effect of Knowledge Sharing on Success of IT Outsourcing

    Directory of Open Access Journals (Sweden)

    فرج‌اله رهنورد

    2009-02-01

    Full Text Available Nowadays, Outsourcing relationship in the area of information technology for local organizations is not an option, but a necessity strategy. By outsourcing, organizations can focus on core functions, decrease their operational costs and technology risk, and to use external sources to achieve the organizational objectives. In this research, local organizations in Zanjan province which have outsourcing experience in the area of information technology, were selected as statistical population, to study the effect of knowledge sharing based on outsourcing with regards to contingency approach. Findings of this research showed that knowledge sharing with regards to situational variables, leads to influence success of IT outsourcing. To put it in other words, relationship between knowledge sharing as independent variable and success of IT outsourcing as a dependent variable, is influenced by partnership and organizational capabilities. Therefore, IT outsourcing is a successful strategy if partners through partnership to share their organizational knowledge and by enhancing their organizational capabilities to use the transferred knowledge in an effective way.

  3. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  4. Description of dynamic shared knowledge: an exploratory study during a competitive team sports interaction.

    Science.gov (United States)

    Bourbousson, J; Poizat, G; Saury, J; Seve, C

    2011-02-01

    This exploratory case study describes the sharedness of knowledge within a basketball team (nine players) and how it changes during an official match. To determine how knowledge is mobilised in an actual game situation, the data were collected and processed following course-of-action theory (Theureau 2003). The results were used to characterise the contents of the shared knowledge (i.e. regarding teammate characteristics, team functioning, opponent characteristics, opposing team functioning and game conditions) and to identify the characteristic types of change: (a) the reinforcement of a previous element of shared knowledge; (b) the invalidation of an element of shared knowledge; (c) fragmentation of an element of shared knowledge; (d) the creation of a new element of shared knowledge. The discussion deals with the diverse types of change in shared knowledge and the heterogeneous and dynamic nature of common ground within the team. STATEMENT OF RELEVANCE: The present case study focused on how the cognitions of individual members of a team coordinate to produce a team performance (e.g. surgical teams in hospitals, military teams) and how the shared knowledge changes during team activity. Traditional methods to increase knowledge sharedness can be enhanced by making use of 'opportunities for coordination' to optimise team adaptiveness.

  5. Quantum jointly assisted cloning of an unknown three-dimensional equatorial state

    Science.gov (United States)

    Ma, Peng-Cheng; Chen, Gui-Bin; Li, Xiao-Wei; Zhan, You-Bang

    2018-02-01

    We present two schemes for perfectly cloning an unknown single-qutrit equatorial state with assistance from two and N state preparers, respectively. In the first scheme, the sender wishes to teleport an unknown single-qutrit equatorial state from two state preparers to a remote receiver, and then to create a perfect copy of the unknown state at her location. The scheme consists of two stages. The first stage of the scheme requires the usual teleportation. In the second stage, to help the sender realize the quantum cloning, two state preparers perform single-qutrit projective measurements on their own qutrits from the sender, then the sender can acquire a perfect copy of the unknown state. It is shown that, only if the two state preparers collaborate with each other, the sender can create a copy of the unknown state by means of some appropriate unitary operations. In the second scheme, we generalized the jointly assisted cloning in the first scheme to the case of N state prepares. In the present schemes, the total probability of success for assisted cloning of a perfect copy of the unknown state can reach 1.

  6. On Sharing and Quasi-Sharing : The Tension between Sharing-Economy Practices, Public Policy, and Regulation

    NARCIS (Netherlands)

    Ranchordás, Sofia; Albinsson, Pia A.; Perera, B. Yasanthi

    2018-01-01

    This paper offers a critical and comparative overview of the main regulatory and policy challenges faced by regulators in the context of the sharing economy. The regulation of the sharing economy has been particularly challenging as regulators are being asked to balance the interests protected by

  7. Risk sharing, public policy and the contribution of Islamic finance

    Directory of Open Access Journals (Sweden)

    Hossein Askari

    2014-12-01

    Full Text Available A major reason for the recurrent episodes of financial instability is the predominance of interest-based debt and leveraging. Financial stability is achievable through risk sharing finance instead of risk shifting that characterizes contemporary finance. A risk sharing system serves the true function of finance as facilitator of real sector activities and avoids the emergence of a “paper economy” where there is gradual decoupling of finance from the real sector. Islamic finance was initially proposed as a profit-loss sharing system, but its core principle is risk sharing. In prohibiting interest-based debt instruments, Islam grounds finance on a strong risk sharing footing. Although still a young industry that has come a long way, it has not managed to develop truly risk-sharing instruments that would allow individuals, households, and firms as well as whole economies to mitigate systematic and un-systematic risks. It is suggested that governments should intervene and issue macro-market instruments to provide their treasuries with a significant source of non-interest rate based financing while promoting risk sharing. Moreover, given that evidence across the world suggests that monetary policy’s transmission mechanism may be impaired, it is suggested that these government issued securities could also impart added potency to monetary policy.

  8. A study of an arbiter function in the structures of a shared bus

    Science.gov (United States)

    Seck, J.-P.

    The results of a comparative study of synchronous and asynchronous arbiters for managing user access to a shared bus is presented. The best available method is determined to be modular arbiter structures attached only to the decision module. Linear and circular arbitration strategies are examined for suitability for automatic decision-making. A multiple strategies arbiter scheme is devised, involving the superposition of various strategies of one sequential machine into another. It is then possible to modify the strategy on-line if the current strategy is ineffective. The utilization of a multiple structure of cascading arbiter devices is noted to be effective if response time is not a critical matter. Finally, attention is given to automatic circuit testing and fault detection. An example is furnished in terms of a management system for a shared memory in a multimicroprocessor structure.

  9. Large scale fusion of gray matter and resting-state functional MRI reveals common and shared biological markers across the psychosis spectrum in the B-SNIP cohort

    Directory of Open Access Journals (Sweden)

    Zheng eWang

    2015-12-01

    Full Text Available To investigate whether aberrant interactions between brain structure and function present similarly or differently across probands with psychotic illnesses (schizophrenia (SZ, schizoaffective disorder (SAD, and bipolar I disorder with psychosis (BP and whether these deficits are shared with their first-degree non-psychotic relatives. A total of 1199 subjects were assessed, including 220 SZ, 147 SAD, 180 psychotic BP, 150 first-degree relatives of SZ, 126 SAD relatives, 134 BP relatives and 242 healthy controls. All subjects underwent structural MRI (sMRI and resting-state functional MRI (rs-fMRI scanning. Joint independent analysis (jICA was used to fuse sMRI gray matter (GM and rs-fMRI amplitude of low frequency fluctuations (ALFF data to identify the relationship between the two modalities. Joint ICA revealed two significantly fused components. The association between functional brain alteration in a prefrontal-striatal-thalamic-cerebellar network and structural abnormalities in the default mode network (DMN was found to be common across psychotic diagnoses and correlated with cognitive function, social function and Schizo-Bipolar Scale (SBS scores. The fused alteration in the temporal lobe was unique to SZ and SAD. The above effects were not seen in any relative group (including those with cluster-A personality. Using a multivariate fused approach involving two widely used imaging markers we demonstrate both shared and distinct biological traits across the psychosis spectrum. Further, our results suggest that the above traits are psychosis biomarkers rather than endophenotypes.

  10. Measurements of Charge Sharing Effects in Pixilated CZT/CdTe Detectors

    DEFF Research Database (Denmark)

    Kuvvetli, Irfan; Budtz-Jørgensen, Carl

    2007-01-01

    In this paper, charge sharing and charge loss effects in pixilated CZT/CdTe detectors are investigated by measurements. We measured charge sharing effects function of the inter-pixel gap (with same pixel pitch), the photon energy and the detector bias voltage for a large numbers of CZT and Cd......Te pixel detector samples. The results are used for the development of the large area X-ray and Gamma ray detector for the Atmosphere-Space Interactions Monitor (ASIM) planned for the ISS ESA Columbus module. Charge sharing measurements on detector samples with identical size and pixel geometry...

  11. Distributed Optimal Consensus Control for Nonlinear Multiagent System With Unknown Dynamic.

    Science.gov (United States)

    Zhang, Jilie; Zhang, Huaguang; Feng, Tao

    2017-08-01

    This paper focuses on the distributed optimal cooperative control for continuous-time nonlinear multiagent systems (MASs) with completely unknown dynamics via adaptive dynamic programming (ADP) technology. By introducing predesigned extra compensators, the augmented neighborhood error systems are derived, which successfully circumvents the system knowledge requirement for ADP. It is revealed that the optimal consensus protocols actually work as the solutions of the MAS differential game. Policy iteration algorithm is adopted, and it is theoretically proved that the iterative value function sequence strictly converges to the solution of the coupled Hamilton-Jacobi-Bellman equation. Based on this point, a novel online iterative scheme is proposed, which runs based on the data sampled from the augmented system and the gradient of the value function. Neural networks are employed to implement the algorithm and the weights are updated, in the least-square sense, to the ideal value, which yields approximated optimal consensus protocols. Finally, a numerical example is given to illustrate the effectiveness of the proposed scheme.

  12. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  13. Sharing Economy vs Sharing Cultures? Designing for social, economic and environmental good

    Directory of Open Access Journals (Sweden)

    Ann Light

    2015-05-01

    Full Text Available This paper explores the story behind a crowdfunding service as an example of sharing technology. Research in a small neighborhood of London showed how locally-developed initiatives can differ in tone, scale, ambition and practice to those getting attention in the so-called sharing economy. In local accounts, we see an emphasis on organizing together to create shared spaces for collaborative use of resources and joint ownership of projects and places. Whereas, many global business models feature significant elements of renting, leasing and hiring and focus only on resource management, sometimes at the expense of community growth. The service we discuss is based in the area we studied and has a collective model of sharing, but hopes to be part of the new global movement. We use this hybridity to problematize issues of culture, place and scalability in developing sharing resources and addressing sustainability concerns. We relate this to the motivation, rhetoric and design choices of other local sharing enterprises and other global sharing economy initiatives, arguing, in conclusion, that there is no sharing economy, but a variety of new cultures being fostered.

  14. Thin-layer chromatography of polyphosphoinositides from platelet extracts: interference by an unknown phospholipid

    International Nuclear Information System (INIS)

    Tysnes, O.B.; Aarbakke, G.M.; Verhoeven, A.J.; Holmsen, H.

    1985-01-01

    Different ratios of radioactive polyphosphoinositides in platelets pulse-labelled with 32p-orthophosphate have been reported by various laboratories. We studied whether these differences originate from differences in methodology. Extracts of 32p-Pi labelled human platelets were prepared at various times after gel-filtration and phosphatidylinositol (PI)-, mono (PIP)- and bisphosphate (PIP2) were separated by thin-layer chromatography using four different solvent systems. The 32p-levels in PIP and PIP2 remained constant during one hour after gel-filtration, whereas 32p-PI increased continuously and more than doubled within the first h. In two of the systems PIP co-chromatographed with a radioactive compound which separated well from PIP in the two other systems. This unknown compound was also labelled with 3H-glycerol, 3H-inositol and 3H-arachidonic acid, but it was metabolically and functionally different from the polyphosphoinositides. Both the co-chromatography of this unknown phospholipid and the increase in 32p-PI in gel-filtered platelets can explain the difference in 32p-labelling in phosphoinositides reported in the literature

  15. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  16. Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer

    Directory of Open Access Journals (Sweden)

    T. Youssef

    2013-01-01

    Full Text Available This paper presents an unknown input Proportional Multiple-Integral Observer (PIO for synchronization of chaotic systems based on Takagi-Sugeno (TS fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. Both states and outputs of the fuzzy chaotic models are subject to polynomial unknown input with kth derivative zero. Using Lyapunov stability theory, sufficient design conditions for synchronization are proposed. The PIO gains matrices are obtained by resolving linear matrix inequalities (LMIs constraints. Simulation results show through two TS fuzzy chaotic models the validity of the proposed method.

  17. Data and Models as Social Objects in the HydroShare System for Collaboration in the Hydrology Community and Beyond

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.; Crawley, S.; Ramirez, M.; Sadler, J.; Xue, Z.; Bandaragoda, C.

    2016-12-01

    How do you share and publish hydrologic data and models for a large collaborative project? HydroShare is a new, web-based system for sharing hydrologic data and models with specific functionality aimed at making collaboration easier. HydroShare has been developed with U.S. National Science Foundation support under the auspices of the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) to support the collaboration and community cyberinfrastructure needs of the hydrology research community. Within HydroShare, we have developed new functionality for creating datasets, describing them with metadata, and sharing them with collaborators. We cast hydrologic datasets and models as "social objects" that can be shared, collaborated around, annotated, published and discovered. In addition to data and model sharing, HydroShare supports web application programs (apps) that can act on data stored in HydroShare, just as software programs on your PC act on your data locally. This can free you from some of the limitations of local computing capacity and challenges in installing and maintaining software on your own PC. HydroShare's web-based cyberinfrastructure can take work off your desk or laptop computer and onto infrastructure or "cloud" based data and processing servers. This presentation will describe HydroShare's collaboration functionality that enables both public and private sharing with individual users and collaborative user groups, and makes it easier for collaborators to iterate on shared datasets and models, creating multiple versions along the way, and publishing them with a permanent landing page, metadata description, and citable Digital Object Identifier (DOI) when the work is complete. This presentation will also describe the web app architecture that supports interoperability with third party servers functioning as application engines for analysis and processing of big hydrologic datasets. While developed to support the

  18. Characterizing unknown systematics in large scale structure surveys

    International Nuclear Information System (INIS)

    Agarwal, Nishant; Ho, Shirley; Myers, Adam D.; Seo, Hee-Jong; Ross, Ashley J.; Bahcall, Neta; Brinkmann, Jonathan; Eisenstein, Daniel J.; Muna, Demitri; Palanque-Delabrouille, Nathalie; Yèche, Christophe; Pâris, Isabelle; Petitjean, Patrick; Schneider, Donald P.; Streblyanska, Alina; Weaver, Benjamin A.

    2014-01-01

    Photometric large scale structure (LSS) surveys probe the largest volumes in the Universe, but are inevitably limited by systematic uncertainties. Imperfect photometric calibration leads to biases in our measurements of the density fields of LSS tracers such as galaxies and quasars, and as a result in cosmological parameter estimation. Earlier studies have proposed using cross-correlations between different redshift slices or cross-correlations between different surveys to reduce the effects of such systematics. In this paper we develop a method to characterize unknown systematics. We demonstrate that while we do not have sufficient information to correct for unknown systematics in the data, we can obtain an estimate of their magnitude. We define a parameter to estimate contamination from unknown systematics using cross-correlations between different redshift slices and propose discarding bins in the angular power spectrum that lie outside a certain contamination tolerance level. We show that this method improves estimates of the bias using simulated data and further apply it to photometric luminous red galaxies in the Sloan Digital Sky Survey as a case study

  19. Characterizing unknown systematics in large scale structure surveys

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Nishant; Ho, Shirley [McWilliams Center for Cosmology, Department of Physics, Carnegie Mellon University, Pittsburgh, PA 15213 (United States); Myers, Adam D. [Department of Physics and Astronomy, University of Wyoming, Laramie, WY 82071 (United States); Seo, Hee-Jong [Berkeley Center for Cosmological Physics, LBL and Department of Physics, University of California, Berkeley, CA 94720 (United States); Ross, Ashley J. [Institute of Cosmology and Gravitation, University of Portsmouth, Portsmouth, PO1 3FX (United Kingdom); Bahcall, Neta [Princeton University Observatory, Peyton Hall, Princeton, NJ 08544 (United States); Brinkmann, Jonathan [Apache Point Observatory, P.O. Box 59, Sunspot, NM 88349 (United States); Eisenstein, Daniel J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Muna, Demitri [Department of Astronomy, Ohio State University, Columbus, OH 43210 (United States); Palanque-Delabrouille, Nathalie; Yèche, Christophe [CEA, Centre de Saclay, Irfu/SPP, F-91191 Gif-sur-Yvette (France); Pâris, Isabelle [Departamento de Astronomía, Universidad de Chile, Casilla 36-D, Santiago (Chile); Petitjean, Patrick [Université Paris 6 et CNRS, Institut d' Astrophysique de Paris, 98bis blvd. Arago, 75014 Paris (France); Schneider, Donald P. [Department of Astronomy and Astrophysics, Pennsylvania State University, University Park, PA 16802 (United States); Streblyanska, Alina [Instituto de Astrofisica de Canarias (IAC), E-38200 La Laguna, Tenerife (Spain); Weaver, Benjamin A., E-mail: nishanta@andrew.cmu.edu [Center for Cosmology and Particle Physics, New York University, New York, NY 10003 (United States)

    2014-04-01

    Photometric large scale structure (LSS) surveys probe the largest volumes in the Universe, but are inevitably limited by systematic uncertainties. Imperfect photometric calibration leads to biases in our measurements of the density fields of LSS tracers such as galaxies and quasars, and as a result in cosmological parameter estimation. Earlier studies have proposed using cross-correlations between different redshift slices or cross-correlations between different surveys to reduce the effects of such systematics. In this paper we develop a method to characterize unknown systematics. We demonstrate that while we do not have sufficient information to correct for unknown systematics in the data, we can obtain an estimate of their magnitude. We define a parameter to estimate contamination from unknown systematics using cross-correlations between different redshift slices and propose discarding bins in the angular power spectrum that lie outside a certain contamination tolerance level. We show that this method improves estimates of the bias using simulated data and further apply it to photometric luminous red galaxies in the Sloan Digital Sky Survey as a case study.

  20. Distributed Adaptive Neural Network Output Tracking of Leader-Following High-Order Stochastic Nonlinear Multiagent Systems With Unknown Dead-Zone Input.

    Science.gov (United States)

    Hua, Changchun; Zhang, Liuliu; Guan, Xinping

    2017-01-01

    This paper studies the problem of distributed output tracking consensus control for a class of high-order stochastic nonlinear multiagent systems with unknown nonlinear dead-zone under a directed graph topology. The adaptive neural networks are used to approximate the unknown nonlinear functions and a new inequality is used to deal with the completely unknown dead-zone input. Then, we design the controllers based on backstepping method and the dynamic surface control technique. It is strictly proved that the resulting closed-loop system is stable in probability in the sense of semiglobally uniform ultimate boundedness and the tracking errors between the leader and the followers approach to a small residual set based on Lyapunov stability theory. Finally, two simulation examples are presented to show the effectiveness and the advantages of the proposed techniques.

  1. An experimental evaluation of self-managing availability in shared data spaces

    NARCIS (Netherlands)

    Russello, G.; Chaudron, M.R.V.; Steen, van M.; Bokharouss, I.

    2007-01-01

    With its decoupling of processes in space and time, the shared data space model has proven to be a well-suited solution for developing distributed component-based systems. However, as in many distributed applications, functional and extra-functional aspects are still interwoven in components. In

  2. Share your sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  3. Functions and Dysfunctions of Mass Communication Media | Rabiu ...

    African Journals Online (AJOL)

    Mass communication provides a way of interacting, distantly, with unknown audiences. It is the process of sharing experience in which a huge number of people are involved simultaneously, or almost so. It often occurs through the use of mass media channels and technology. The mass media are all around us. To live even ...

  4. Time-sharing visual and auditory tracking tasks

    Science.gov (United States)

    Tsang, Pamela S.; Vidulich, Michael A.

    1987-01-01

    An experiment is described which examined the benefits of distributing the input demands of two tracking tasks as a function of task integrality. Visual and auditory compensatory tracking tasks were utilized. Results indicate that presenting the two tracking signals in two input modalities did not improve time-sharing efficiency. This was attributed to the difficulty insensitivity phenomenon.

  5. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  6. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  7. Sharing family and household:

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  8. The impact of emotional intelligence on faculty members' knowledge sharing behaviors

    Directory of Open Access Journals (Sweden)

    Masoomeh Arabshahi,

    2013-12-01

    Full Text Available Universities and institutions of higher education with a professional, special, educational and cultural environment, play an important role in effective knowledge management and preparing the background for knowledge sharing. Faculty members are known as the main elements of the university who own mental and intellectual property. Their knowledge sharing under certain conditions along with knowledge sharing behaviors improve individual and organizational operations. Moreover, the tendency to do these actions is the most important factor in knowledge sharing behavior and emotional intelligence (EQ, as one of the social intelligence factors, can guide individual thinking and activity. This study examines the impact of emotional intelligence on faculty members' knowledge sharing behaviors. Regarding the purpose and nature, this study was functional and its methodology was exploratory and due to evaluation of the relations and impacts among variables, it was a correlational method. Data collection included interviews with experts for the qualitative part and a questionnaire for the quantitative part. The qualitative findings indicate different emotional intelligence dimensions, which includes self-awareness, social skills, coping with pressure, adaptability and overall creation. In addition, the result of EQ dimensions on knowledge sharing behavior reveal that “social skills, coping with pressure, and overall creation” share a link with faculty members' research behavior among the four dimensions of knowledge sharing behavior and that “adaptability” has no significant relationship with knowledge sharing behavior.

  9. HydroShare for iUTAH: Collaborative Publication, Interoperability, and Reuse of Hydrologic Data and Models for a Large, Interdisciplinary Water Research Project

    Science.gov (United States)

    Horsburgh, J. S.; Jones, A. S.

    2016-12-01

    Data and models used within the hydrologic science community are diverse. New research data and model repositories have succeeded in making data and models more accessible, but have been, in most cases, limited to particular types or classes of data or models and also lack the type of collaborative, and iterative functionality needed to enable shared data collection and modeling workflows. File sharing systems currently used within many scientific communities for private sharing of preliminary and intermediate data and modeling products do not support collaborative data capture, description, visualization, and annotation. More recently, hydrologic datasets and models have been cast as "social objects" that can be published, collaborated around, annotated, discovered, and accessed. Yet it can be difficult using existing software tools to achieve the kind of collaborative workflows and data/model reuse that many envision. HydroShare is a new, web-based system for sharing hydrologic data and models with specific functionality aimed at making collaboration easier and achieving new levels of interactive functionality and interoperability. Within HydroShare, we have developed new functionality for creating datasets, describing them with metadata, and sharing them with collaborators. HydroShare is enabled by a generic data model and content packaging scheme that supports describing and sharing diverse hydrologic datasets and models. Interoperability among the diverse types of data and models used by hydrologic scientists is achieved through the use of consistent storage, management, sharing, publication, and annotation within HydroShare. In this presentation, we highlight and demonstrate how the flexibility of HydroShare's data model and packaging scheme, HydroShare's access control and sharing functionality, and versioning and publication capabilities have enabled the sharing and publication of research datasets for a large, interdisciplinary water research project

  10. Relationship between sensorimotor peripheral nerve function and indicators of cardiovascular autonomic function in older adults from the Health, Aging and Body Composition Study.

    Science.gov (United States)

    Lange-Maia, Brittney S; Newman, Anne B; Jakicic, John M; Cauley, Jane A; Boudreau, Robert M; Schwartz, Ann V; Simonsick, Eleanor M; Satterfield, Suzanne; Vinik, Aaron I; Zivkovic, Sasa; Harris, Tamara B; Strotmeyer, Elsa S

    2017-10-01

    Age-related peripheral nervous system (PNS) impairments are highly prevalent in older adults. Although sensorimotor and cardiovascular autonomic function have been shown to be related in persons with diabetes, the nature of the relationship in general community-dwelling older adult populations is unknown. Health, Aging and Body Composition participants (n=2399, age=76.5±2.9years, 52% women, 38% black) underwent peripheral nerve testing at the 2000/01 clinic visit. Nerve conduction amplitude and velocity were measured at the peroneal motor nerve. Sensory nerve function was assessed with vibration detection threshold and monofilament (1.4-g/10-g) testing at the big toe. Symptoms of lower-extremity peripheral neuropathy were collected by self-report. Cardiovascular autonomic function indicators included postural hypotension, resting heart rate (HR), as well as HR response to and recovery from submaximal exercise testing (400m walk). Multivariable modeling adjusted for demographic/lifestyle factors, medication use and comorbid conditions. In fully adjusted models, poor motor nerve conduction velocity (function or symptoms of peripheral neuropathy and indicators of cardiovascular autonomic function. Motor nerve function and indicators of cardiovascular autonomic function remained significantly related even after considering many potentially shared risk factors. Future studies should investigate common underlying processes for developing multiple PNS impairments in older adults. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Random neural Q-learning for obstacle avoidance of a mobile robot in unknown environments

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2016-07-01

    Full Text Available The article presents a random neural Q-learning strategy for the obstacle avoidance problem of an autonomous mobile robot in unknown environments. In the proposed strategy, two independent modules, namely, avoidance without considering the target and goal-seeking without considering obstacles, are first trained using the proposed random neural Q-learning algorithm to obtain their best control policies. Then, the two trained modules are combined based on a switching function to realize the obstacle avoidance in unknown environments. For the proposed random neural Q-learning algorithm, a single-hidden layer feedforward network is used to approximate the Q-function to estimate the Q-value. The parameters of the single-hidden layer feedforward network are modified using the recently proposed neural algorithm named the online sequential version of extreme learning machine, where the parameters of the hidden nodes are assigned randomly and the sample data can come one by one. However, different from the original online sequential version of extreme learning machine algorithm, the initial output weights are estimated subjected to quadratic inequality constraint to improve the convergence speed. Finally, the simulation results demonstrate that the proposed random neural Q-learning strategy can successfully solve the obstacle avoidance problem. Also, the higher learning efficiency and better generalization ability are achieved by the proposed random neural Q-learning algorithm compared with the Q-learning based on the back-propagation method.

  12. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Science.gov (United States)

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun

    2017-10-03

    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  13. Shared Genetic Architecture in the Relationship between Adult Stature and Subclinical Coronary Artery Atherosclerosis

    Science.gov (United States)

    Cassidy-Bushrow, Andrea E.; Bielak, Lawrence F.; Sheedy, Patrick F.; Turner, Stephen T.; Chu, Julia S.; Peyser, Patricia A.

    2011-01-01

    Background Short stature is associated with increased risk of coronary heart disease (CHD); although the mechanisms for this relationship are unknown, shared genetic factors have been proposed. Subclinical atherosclerosis, measured by coronary artery calcification (CAC), is associated with CHD events and represents part of the biological continuum to overt CHD. Many molecular mechanisms of CAC development are shared with bone growth. Thus, we examined whether there was evidence of shared genes (pleiotropy) between adult stature and CAC. Methods 877 asymptomatic white adults (46% men) from 625 families in a community-based sample had computed tomography measures of CAC. Pleiotropy between height and CAC was determined using maximum-likelihood estimation implemented in SOLAR. Results Adult height was significantly and inversely associated with CAC score (P=0.01). After adjusting for age, sex, and CHD risk factors, the estimated genetic correlation between height and CAC score was -0.37 and was significantly different than 0 (P=0.001) and -1 (P<0.001). The environmental correlation between height and CAC score was 0.60 and was significantly different than 0 (P=0.024). Conclusions Further studies of shared genetic factors between height and CAC may provide important insight into the complex genetic architecture of CHD, in part through increased understanding of the molecular pathways underlying the process of both normal growth and disease development. Bivariate genetic linkage analysis may provide a powerful mechanism for identifying specific genomic regions associated with both height and CAC. PMID:21937044

  14. Synchronization properties of coupled chaotic neurons: The role of random shared input

    International Nuclear Information System (INIS)

    Kumar, Rupesh; Bilal, Shakir; Ramaswamy, Ram

    2016-01-01

    Spike-time correlations of neighbouring neurons depend on their intrinsic firing properties as well as on the inputs they share. Studies have shown that periodically firing neurons, when subjected to random shared input, exhibit asynchronicity. Here, we study the effect of random shared input on the synchronization of weakly coupled chaotic neurons. The cases of so-called electrical and chemical coupling are both considered, and we observe a wide range of synchronization behaviour. When subjected to identical shared random input, there is a decrease in the threshold coupling strength needed for chaotic neurons to synchronize in-phase. The system also supports lag–synchronous states, and for these, we find that shared input can cause desynchronization. We carry out a master stability function analysis for a network of such neurons and show agreement with the numerical simulations. The contrasting role of shared random input for complete and lag synchronized neurons is useful in understanding spike-time correlations observed in many areas of the brain.

  15. Synchronization properties of coupled chaotic neurons: The role of random shared input

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Rupesh [School of Computational and Integrative Sciences, Jawaharlal Nehru University, New Delhi 110067 (India); Bilal, Shakir [Department of Physics and Astrophysics, University of Delhi, Delhi 110 007 (India); Ramaswamy, Ram [School of Computational and Integrative Sciences, Jawaharlal Nehru University, New Delhi 110067 (India); School of Physical Sciences, Jawaharlal Nehru University, New Delhi 110067 (India)

    2016-06-15

    Spike-time correlations of neighbouring neurons depend on their intrinsic firing properties as well as on the inputs they share. Studies have shown that periodically firing neurons, when subjected to random shared input, exhibit asynchronicity. Here, we study the effect of random shared input on the synchronization of weakly coupled chaotic neurons. The cases of so-called electrical and chemical coupling are both considered, and we observe a wide range of synchronization behaviour. When subjected to identical shared random input, there is a decrease in the threshold coupling strength needed for chaotic neurons to synchronize in-phase. The system also supports lag–synchronous states, and for these, we find that shared input can cause desynchronization. We carry out a master stability function analysis for a network of such neurons and show agreement with the numerical simulations. The contrasting role of shared random input for complete and lag synchronized neurons is useful in understanding spike-time correlations observed in many areas of the brain.

  16. Statistics of Shared Components in Complex Component Systems

    Science.gov (United States)

    Mazzolini, Andrea; Gherardi, Marco; Caselle, Michele; Cosentino Lagomarsino, Marco; Osella, Matteo

    2018-04-01

    Many complex systems are modular. Such systems can be represented as "component systems," i.e., sets of elementary components, such as LEGO bricks in LEGO sets. The bricks found in a LEGO set reflect a target architecture, which can be built following a set-specific list of instructions. In other component systems, instead, the underlying functional design and constraints are not obvious a priori, and their detection is often a challenge of both scientific and practical importance, requiring a clear understanding of component statistics. Importantly, some quantitative invariants appear to be common to many component systems, most notably a common broad distribution of component abundances, which often resembles the well-known Zipf's law. Such "laws" affect in a general and nontrivial way the component statistics, potentially hindering the identification of system-specific functional constraints or generative processes. Here, we specifically focus on the statistics of shared components, i.e., the distribution of the number of components shared by different system realizations, such as the common bricks found in different LEGO sets. To account for the effects of component heterogeneity, we consider a simple null model, which builds system realizations by random draws from a universe of possible components. Under general assumptions on abundance heterogeneity, we provide analytical estimates of component occurrence, which quantify exhaustively the statistics of shared components. Surprisingly, this simple null model can positively explain important features of empirical component-occurrence distributions obtained from large-scale data on bacterial genomes, LEGO sets, and book chapters. Specific architectural features and functional constraints can be detected from occurrence patterns as deviations from these null predictions, as we show for the illustrative case of the "core" genome in bacteria.

  17. Repeated functional convergent effects of NaV1.7 on acid insensitivity in hibernating mammals.

    Science.gov (United States)

    Liu, Zhen; Wang, Wei; Zhang, Tong-Zuo; Li, Gong-Hua; He, Kai; Huang, Jing-Fei; Jiang, Xue-Long; Murphy, Robert W; Shi, Peng

    2014-02-07

    Hibernating mammals need to be insensitive to acid in order to cope with conditions of high CO2; however, the molecular basis of acid tolerance remains largely unknown. The African naked mole-rat (Heterocephalus glaber) and hibernating mammals share similar environments and physiological features. In the naked mole-rat, acid insensitivity has been shown to be conferred by the functional motif of the sodium ion channel NaV1.7. There is now an opportunity to evaluate acid insensitivity in other taxa. In this study, we tested for functional convergence of NaV1.7 in 71 species of mammals, including 22 species that hibernate. Our analyses revealed a functional convergence of amino acid sequences, which occurred at least six times independently in mammals that hibernate. Evolutionary analyses determined that the convergence results from both parallel and divergent evolution of residues in the functional motif. Our findings not only identify the functional molecules responsible for acid insensitivity in hibernating mammals, but also open new avenues to elucidate the molecular underpinnings of acid insensitivity in mammals.

  18. Job sharing. Part 1.

    Science.gov (United States)

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  19. [Badminton--unknown sport].

    Science.gov (United States)

    Zekan-Petrinović, Lidija

    2007-01-01

    For a long time, badminton was considered to be only a slow and light game for children, a game that is played outdoors and is structurally undemanding.Today, it is not an unknown and unrecognised sport, especially after it was included into the Olympics Games in 1992. Badminton is one of the oldest sports in the world. It is suitable for all ages (for children and elderly equally), women and men and even handicapped persons. Beginners can start playing badminton matches early because the basics are learned quickly. As a recreational activity, badminton is very popular in Zagreb. In the last 10 years, a number of halls specialized for badminton or offering badminton as one of available sports activities have been opened in Zagreb. At present, there are over 70 professional playgrounds for training of top contestants but also for the citizens who can play recreational badminton.

  20. Detection of viral sequence fragments of HIV-1 subfamilies yet unknown

    Directory of Open Access Journals (Sweden)

    Stanke Mario

    2011-04-01

    Full Text Available Abstract Background Methods of determining whether or not any particular HIV-1 sequence stems - completely or in part - from some unknown HIV-1 subtype are important for the design of vaccines and molecular detection systems, as well as for epidemiological monitoring. Nevertheless, a single algorithm only, the Branching Index (BI, has been developed for this task so far. Moving along the genome of a query sequence in a sliding window, the BI computes a ratio quantifying how closely the query sequence clusters with a subtype clade. In its current version, however, the BI does not provide predicted boundaries of unknown fragments. Results We have developed Unknown Subtype Finder (USF, an algorithm based on a probabilistic model, which automatically determines which parts of an input sequence originate from a subtype yet unknown. The underlying model is based on a simple profile hidden Markov model (pHMM for each known subtype and an additional pHMM for an unknown subtype. The emission probabilities of the latter are estimated using the emission frequencies of the known subtypes by means of a (position-wise probabilistic model for the emergence of new subtypes. We have applied USF to SIV and HIV-1 sequences formerly classified as having emerged from an unknown subtype. Moreover, we have evaluated its performance on artificial HIV-1 recombinants and non-recombinant HIV-1 sequences. The results have been compared with the corresponding results of the BI. Conclusions Our results demonstrate that USF is suitable for detecting segments in HIV-1 sequences stemming from yet unknown subtypes. Comparing USF with the BI shows that our algorithm performs as good as the BI or better.

  1. Structure and Function of Your Skin

    Science.gov (United States)

    ... Name: Category: Share: Yes No, Keep Private Structure & Function of Your Skin Share | What It Looks Like . . . ... in the dermis. What It Does . . . The major function of skin is to provide a barrier between ...

  2. Job Sharing--Opportunities or Headaches?

    Science.gov (United States)

    Leighton, Patricia

    1986-01-01

    Discusses the issue of job sharing as a new alternative available to workers. Topics covered include (1) a profile of job sharers, (2) response to job sharing, (3) establishing a job share, (4) job sharing in operation, and (5) legal analysis of job sharing. (CH)

  3. Psychological profile: the problem of modeling the unknown criminal personality

    Directory of Open Access Journals (Sweden)

    Г. М. Гетьман

    2013-10-01

    Full Text Available The article investigates the problem of modeling an unknown person in the preparation of criminal psychological profile. Some approaches to the concept of "psychological profile" and "psychological portrait", in particular the proposed delineation of these terms. We consider the system steps in the development of the psychological profile of an unknown perpetrator.

  4. Multifocal chronic osteomyelitis of unknown etiology

    International Nuclear Information System (INIS)

    Kozlowski, K.; Masel, J.; Harbison, S.; Yu, J.; Royal Brisbane Children Hospital; Regional Hospital Bowral

    1983-01-01

    Five cases of chronic, inflammatory, multifocal bone lesions of unknown etiology are reported. Although bone biopsy confirmed osteomyelitis in each case in none of them were organisms found inspite of an extensive work up. Different clinical course of the disease reflects different aetiology in respective cases. These cases present changing aspects of osteomyelitis emerging since introduction of antibiotics. (orig.)

  5. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  6. Bayesian source term determination with unknown covariance of measurements

    Science.gov (United States)

    Belal, Alkomiet; Tichý, Ondřej; Šmídl, Václav

    2017-04-01

    Determination of a source term of release of a hazardous material into the atmosphere is a very important task for emergency response. We are concerned with the problem of estimation of the source term in the conventional linear inverse problem, y = Mx, where the relationship between the vector of observations y is described using the source-receptor-sensitivity (SRS) matrix M and the unknown source term x. Since the system is typically ill-conditioned, the problem is recast as an optimization problem minR,B(y - Mx)TR-1(y - Mx) + xTB-1x. The first term minimizes the error of the measurements with covariance matrix R, and the second term is a regularization of the source term. There are different types of regularization arising for different choices of matrices R and B, for example, Tikhonov regularization assumes covariance matrix B as the identity matrix multiplied by scalar parameter. In this contribution, we adopt a Bayesian approach to make inference on the unknown source term x as well as unknown R and B. We assume prior on x to be a Gaussian with zero mean and unknown diagonal covariance matrix B. The covariance matrix of the likelihood R is also unknown. We consider two potential choices of the structure of the matrix R. First is the diagonal matrix and the second is a locally correlated structure using information on topology of the measuring network. Since the inference of the model is intractable, iterative variational Bayes algorithm is used for simultaneous estimation of all model parameters. The practical usefulness of our contribution is demonstrated on an application of the resulting algorithm to real data from the European Tracer Experiment (ETEX). This research is supported by EEA/Norwegian Financial Mechanism under project MSMT-28477/2014 Source-Term Determination of Radionuclide Releases by Inverse Atmospheric Dispersion Modelling (STRADI).

  7. Celiac Disease Presenting as Fever of Unknown Origin

    Directory of Open Access Journals (Sweden)

    Megan J. Cooney

    2013-01-01

    Full Text Available Celiac disease (CD is a common autoimmune enteropathy that occurs, in affected individuals, with exposure to gluten in the diet and improves with removal of dietary gluten. Although CD is readily considered in patients with classical presentations of the disease, atypical manifestations may be the only presenting symptoms. We present a case of CD in a 16-year-old female presenting as fever of unknown origin, which has not been reported previously. The postulated mechanism for fever in CD and the importance of clinicians having a low threshold for considering CD in the differential diagnosis of fever of unknown origin and other enigmatic clinical presentations is discussed.

  8. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam; Beirami, Ahmad; Touri, Behrouz; Shamma, Jeff S.

    2015-01-01

    of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a

  9. The determination of an unknown boundary condition in a fractional diffusion equation

    KAUST Repository

    Rundell, William

    2013-07-01

    In this article we consider an inverse boundary problem, in which the unknown boundary function ∂u/∂v = f(u) is to be determined from overposed data in a time-fractional diffusion equation. Based upon the free space fundamental solution, we derive a representation for the solution f as a nonlinear Volterra integral equation of second kind with a weakly singular kernel. Uniqueness and reconstructibility by iteration is an immediate result of a priori assumption on f and applying the fixed point theorem. Numerical examples are presented to illustrate the validity and effectiveness of the proposed method. © 2013 Copyright Taylor and Francis Group, LLC.

  10. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  11. Fast grasping of unknown objects using principal component analysis

    Science.gov (United States)

    Lei, Qujiang; Chen, Guangming; Wisse, Martijn

    2017-09-01

    Fast grasping of unknown objects has crucial impact on the efficiency of robot manipulation especially subjected to unfamiliar environments. In order to accelerate grasping speed of unknown objects, principal component analysis is utilized to direct the grasping process. In particular, a single-view partial point cloud is constructed and grasp candidates are allocated along the principal axis. Force balance optimization is employed to analyze possible graspable areas. The obtained graspable area with the minimal resultant force is the best zone for the final grasping execution. It is shown that an unknown object can be more quickly grasped provided that the component analysis principle axis is determined using single-view partial point cloud. To cope with the grasp uncertainty, robot motion is assisted to obtain a new viewpoint. Virtual exploration and experimental tests are carried out to verify this fast gasping algorithm. Both simulation and experimental tests demonstrated excellent performances based on the results of grasping a series of unknown objects. To minimize the grasping uncertainty, the merits of the robot hardware with two 3D cameras can be utilized to suffice the partial point cloud. As a result of utilizing the robot hardware, the grasping reliance is highly enhanced. Therefore, this research demonstrates practical significance for increasing grasping speed and thus increasing robot efficiency under unpredictable environments.

  12. We need to talk: Primary care provider communication at discharge in the era of a shared electronic medical record.

    Science.gov (United States)

    Sheu, Leslie; Fung, Kelly; Mourad, Michelle; Ranji, Sumant; Wu, Ethel

    2015-05-01

    Poor communication between hospitalists and outpatient physicians can contribute to adverse events after discharge. Electronic medical records (EMRs) shared by inpatient and outpatient clinicians offer primary care providers (PCPs) better access to information surrounding a patient's hospitalization. However, the PCP experience and subsequent expectations for discharge communication within a shared EMR are unknown. We surveyed PCPs 1 year after a shared EMR was implemented at our institution to assess PCP satisfaction with current discharge communication practices and identify areas for improvement. Seventy-five of 124 (60%) clinicians completed the survey. Although most PCPs reported receiving automated discharge notifications (71%), only 39% felt that notifications plus discharge summaries were adequate for safe transitions of care. PCPs expressed that complex hospitalizations necessitated additional communication via e-mail or telephone; only 31% reported receiving such communication. The content most important in additional communication included medication changes, follow-up actions, and active medical issues. Despite optimized access to information provided by a shared EMR, only 52% of PCPs were satisfied with current discharge communication. PCPs express a continued need for high-touch communication for safe transitions of care. Further standardization of discharge communication practices is necessary. © 2015 Society of Hospital Medicine.

  13. Previously unknown and highly divergent ssDNA viruses populate the oceans.

    Science.gov (United States)

    Labonté, Jessica M; Suttle, Curtis A

    2013-11-01

    Single-stranded DNA (ssDNA) viruses are economically important pathogens of plants and animals, and are widespread in oceans; yet, the diversity and evolutionary relationships among marine ssDNA viruses remain largely unknown. Here we present the results from a metagenomic study of composite samples from temperate (Saanich Inlet, 11 samples; Strait of Georgia, 85 samples) and subtropical (46 samples, Gulf of Mexico) seawater. Most sequences (84%) had no evident similarity to sequenced viruses. In total, 608 putative complete genomes of ssDNA viruses were assembled, almost doubling the number of ssDNA viral genomes in databases. These comprised 129 genetically distinct groups, each represented by at least one complete genome that had no recognizable similarity to each other or to other virus sequences. Given that the seven recognized families of ssDNA viruses have considerable sequence homology within them, this suggests that many of these genetic groups may represent new viral families. Moreover, nearly 70% of the sequences were similar to one of these genomes, indicating that most of the sequences could be assigned to a genetically distinct group. Most sequences fell within 11 well-defined gene groups, each sharing a common gene. Some of these encoded putative replication and coat proteins that had similarity to sequences from viruses infecting eukaryotes, suggesting that these were likely from viruses infecting eukaryotic phytoplankton and zooplankton.

  14. Comprehensive identification and clustering of CLV3/ESR-related (CLE) genes in plants finds groups with potentially shared function.

    Science.gov (United States)

    Goad, David M; Zhu, Chuanmei; Kellogg, Elizabeth A

    2017-10-01

    CLV3/ESR (CLE) proteins are important signaling peptides in plants. The short CLE peptide (12-13 amino acids) is cleaved from a larger pre-propeptide and functions as an extracellular ligand. The CLE family is large and has resisted attempts at classification because the CLE domain is too short for reliable phylogenetic analysis and the pre-propeptide is too variable. We used a model-based search for CLE domains from 57 plant genomes and used the entire pre-propeptide for comprehensive clustering analysis. In total, 1628 CLE genes were identified in land plants, with none recognizable from green algae. These CLEs form 12 groups within which CLE domains are largely conserved and pre-propeptides can be aligned. Most clusters contain sequences from monocots, eudicots and Amborella trichopoda, with sequences from Picea abies, Selaginella moellendorffii and Physcomitrella patens scattered in some clusters. We easily identified previously known clusters involved in vascular differentiation and nodulation. In addition, we found a number of discrete groups whose function remains poorly characterized. Available data indicate that CLE proteins within a cluster are likely to share function, whereas those from different clusters play at least partially different roles. Our analysis provides a foundation for future evolutionary and functional studies. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  15. Is sharing specific autobiographical memories a distinct form of self-disclosure?

    Science.gov (United States)

    Beike, Denise R; Brandon, Nicole R; Cole, Holly E

    2016-04-01

    Theories of autobiographical memory posit a social function, meaning that recollecting and sharing memories of specific discrete events creates and maintains relationship intimacy. Eight studies with 1,271 participants tested whether sharing specific autobiographical memories in conversations increases feelings of closeness among conversation partners, relative to sharing other self-related information. The first 2 studies revealed that conversations in which specific autobiographical memories were shared were also accompanied by feelings of closeness among conversation partners. The next 5 studies experimentally introduced specific autobiographical memories versus general information about the self into conversations between mostly unacquainted pairs of participants. Discussing specific autobiographical memories led to greater closeness among conversation partners than discussing nonself-related topics, but no greater closeness than discussing other, more general self-related information. In the final study unacquainted pairs in whom feelings of closeness had been experimentally induced through shared humor were more likely to discuss specific autobiographical memories than unacquainted control participant pairs. We conclude that sharing specific autobiographical memories may express more than create relationship closeness, and discuss how relationship closeness may afford sharing of specific autobiographical memories by providing common ground, a social display, or a safety signal. (c) 2016 APA, all rights reserved).

  16. Business models of sharing economy companies : exploring features responsible for sharing economy companies’ internationalization

    OpenAIRE

    Kosintceva, Aleksandra

    2016-01-01

    This paper is dedicated to the sharing economy business models and their features responsible for internationalization. The study proposes derived definitions for the concepts of “sharing economy” and “business model” and first generic sharing economy business models typology. The typology was created through the qualitative analysis of secondary data on twenty sharing economy companies from nine different industries. The outlined categories of sharing economy business models a...

  17. Professional SharePoint 2010 Development

    CERN Document Server

    Rizzo, Tom; Fried, Jeff

    2010-01-01

    Learn to leverage the features of the newest version of SharePoint, in this update to the bestseller. More than simply a portal, SharePoint is Microsoft's popular content management solution for building intranets and Web sites or hosting wikis and blogs. Offering broad coverage on all aspects of development for the SharePoint platform, this comprehensive book shows you exactly what SharePoint does, how to build solutions, and what features are accessible within SharePoint. Written by one of the most recognized names in SharePoint development, Professional SharePoint 2010 Development offers an

  18. Professional SharePoint 2013 administration

    CERN Document Server

    Young, Shane; Klindt, Todd

    2013-01-01

    SharePoint admin author gurus return to prepare you for working with the new features of SharePoint 2013! The new iteration of SharePoint boasts exciting new features. However, any new version also comes with its fair share of challenges and that's where this book comes in. The team of SharePoint admin gurus returns to presents a fully updated resource that prepares you for making all the new SharePoint 2013 features work right. They cover all of the administration components of SharePoint 2013 in detail, and present a clear understanding of how they affect the role of the adminis

  19. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  20. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  1. Shared Variable Oriented Parallel Precompiler for SPMD Model

    Institute of Scientific and Technical Information of China (English)

    1995-01-01

    For the moment,commercial parallel computer systems with distributed memory architecture are usually provided with parallel FORTRAN or parallel C compliers,which are just traditional sequential FORTRAN or C compilers expanded with communication statements.Programmers suffer from writing parallel programs with communication statements. The Shared Variable Oriented Parallel Precompiler (SVOPP) proposed in this paper can automatically generate appropriate communication statements based on shared variables for SPMD(Single Program Multiple Data) computation model and greatly ease the parallel programming with high communication efficiency.The core function of parallel C precompiler has been successfully verified on a transputer-based parallel computer.Its prominent performance shows that SVOPP is probably a break-through in parallel programming technique.

  2. 12 CFR 701.35 - Share, share draft, and share certificate accounts.

    Science.gov (United States)

    2010-01-01

    ..., and share certificate accounts in all advertising, disclosures, or agreements, whether written or oral..., other federal law, and its contractual obligations, determine the types of fees or charges and other...

  3. The curious relation between theory of mind and sharing in preschool age children.

    Science.gov (United States)

    Cowell, Jason M; Samek, Anya; List, John; Decety, Jean

    2015-01-01

    Young children have long been known to act selfishly and gradually appear to become more generous across middle childhood. While this apparent change has been well documented, the underlying mechanisms supporting this remain unclear. The current study examined the role of early theory of mind and executive functioning in facilitating sharing in a large sample (N = 98) of preschoolers. Results reveal a curious relation between early false-belief understanding and sharing behavior. Contrary to many commonsense notions and predominant theories, competence in this ability is actually related to less sharing. Thus, the relation between developing theory of mind and sharing may not be as straightforward as it seems in preschool age children. It is precisely the children who can engage in theory of mind that decide to share less with others.

  4. Quantum key distribution with an unknown and untrusted source

    Science.gov (United States)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  5. Grasping Unknown Objects in an Early Cognitive Vision System

    DEFF Research Database (Denmark)

    Popovic, Mila

    2011-01-01

    Grasping of unknown objects presents an important and challenging part of robot manipulation. The growing area of service robotics depends upon the ability of robots to autonomously grasp and manipulate a wide range of objects in everyday environments. Simple, non task-specific grasps of unknown ...... and comparing vision-based grasping methods, and the creation of algorithms for bootstrapping a process of acquiring world understanding for artificial cognitive agents....... presents a system for robotic grasping of unknown objects us- ing stereo vision. Grasps are defined based on contour and surface information provided by the Early Cognitive Vision System, that organizes visual informa- tion into a biologically motivated hierarchical representation. The contributions...... of the thesis are: the extension of the Early Cognitive Vision representation with a new type of feature hierarchy in the texture domain, the definition and evaluation of contour based grasping methods, the definition and evaluation of surface based grasping methods, the definition of a benchmark for testing...

  6. The determination of a neutron source position in an unknown homogeneous medium: The planar case

    International Nuclear Information System (INIS)

    Dubinski, S.; Talmor, A.; Presler, O.; Tshuva, A.; Yaar, I.; Orion, I.; Alfassi, Z.B.

    2005-01-01

    The possibility of localization of an unknown neutron source in various bulky homogeneous media (box) was studied. For the planar case, two 3 He detectors on the opposite faces of the box were used. A constant polypropylene shield around the box and detectors was used to eliminate the varying contribution from the environment to increase count rates of the detectors and to protect the experimentalist. It is shown that the location of a single small neutron emitting source in a large box can be found to a better than 7% by using two neutron detectors positioned on parallel faces of the box, coplanar with the source. The localization requires measurement of the count rate of both the unknown source and an extra source positioned on one of the faces of the box. The localization is based on the finding that the ratio of the count rates of the two detectors is an exponential function of the distance of the source from one of the detectors

  7. A case of hemophagocytic lymphohistiocytosis presenting as pyrexia of unknown origin

    Directory of Open Access Journals (Sweden)

    Indira Madhavan

    2015-01-01

    Full Text Available Hemophagocytic lymphohistiocytosis (HLH is a potentially fatal hyper inflammatory condition, which occurs as either primary (genetic or secondary (acquired due to impaired or absent function of natural killer cells and cytotoxic cells. Common secondary causes include viral and bacterial infections, autoimmune diseases, and hematological malignancies. Extensive phagocytosis of blood cells by histiocytes in bone marrow, spleen, liver and lymphnodes result in peripheral blood cytopenias, hepatosplenomegaly, and lymphadenopathy. We evaluated a case of pyrexia of unknown origin and found out that he fulfilled the criteria for diagnosing HLH. He was started on immunochemotherapy with etoposide, cyclosporine and steroids, but he succumbed to illness within 2 weeks of treatment. High index of suspicion is needed to diagnose HLH and prompt treatment on diagnosis can be lifesaving.

  8. 18F-FDG-PET/CT in fever of unknown origin

    DEFF Research Database (Denmark)

    Middelbo Buch-Olsen, Karen; Andersen, Rikke V; Hess, Søren

    2014-01-01

    OBJECTIVE: Fever of unknown origin continues to be a diagnostic challenge for clinicians. The aim of this study was to confirm whether (18)F-fluorodeoxyglucose ((18)F-FDG)-PET/computed tomography (CT) is a helpful tool in patients suffering from this condition. PATIENTS AND METHODS: Fifty......-seven patients with fever of unknown origin were examined with (18)F-FDG-PET/CT as part of their diagnostic workup at the clinicians' discretion. The medical records were read retrospectively to establish the final diagnosis and evaluate the degree to which PET/CT contributed to the diagnosis. RESULTS......-FDG-PET/CT is a useful tool in the investigation of fever of unknown origin; it can reduce patient inconvenience and possibly costs to society if used earlier in the diagnostic process....

  9. Experience Replay for Optimal Control of Nonzero-Sum Game Systems With Unknown Dynamics.

    Science.gov (United States)

    Zhao, Dongbin; Zhang, Qichao; Wang, Ding; Zhu, Yuanheng

    2016-03-01

    In this paper, an approximate online equilibrium solution is developed for an N -player nonzero-sum (NZS) game systems with completely unknown dynamics. First, a model identifier based on a three-layer neural network (NN) is established to reconstruct the unknown NZS games systems. Moreover, the identifier weight vector is updated based on experience replay technique which can relax the traditional persistence of excitation condition to a simplified condition on recorded data. Then, the single-network adaptive dynamic programming (ADP) with experience replay algorithm is proposed for each player to solve the coupled nonlinear Hamilton- (HJ) equations, where only the critic NN weight vectors are required to tune for each player. The feedback Nash equilibrium is provided by the solution of the coupled HJ equations. Based on the experience replay technique, a novel critic NN weights tuning law is proposed to guarantee the stability of the closed-loop system and the convergence of the value functions. Furthermore, a Lyapunov-based stability analysis shows that the uniform ultimate boundedness of the closed-loop system is achieved. Finally, two simulation examples are given to verify the effectiveness of the proposed control scheme.

  10. Job Sharing in Geography.

    Science.gov (United States)

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  11. Reduction of Linear Functional Systems using Fuhrmann's Equivalence

    Directory of Open Access Journals (Sweden)

    Mohamed S. Boudellioua

    2016-11-01

    Full Text Available Functional systems arise in the treatment of systems of partial differential equations, delay-differential equations, multidimensional equations, etc. The problem of reducing a linear functional system to a system containing fewer equations and unknowns was first studied by Serre. Finding an equivalent presentation of a linear functional system containing fewer equations and fewer unknowns can generally simplify both the study of the structural properties of the linear functional system and of different numerical analysis issues, and it can sometimes help in solving the linear functional system. In this paper, Fuhrmann's equivalence is used to present a constructive result on the reduction of under-determined linear functional systems to a single equation involving a single unknown. This equivalence transformation has been studied by a number of authors and has been shown to play an important role in the theory of linear functional systems.

  12. Identification of CJC-1295, a growth-hormone-releasing peptide, in an unknown pharmaceutical preparation.

    Science.gov (United States)

    Henninge, John; Pepaj, Milaim; Hullstein, Ingunn; Hemmersbach, Peter

    2010-01-01

    Several peptide drugs are being manufactured illicitly, and in some cases they are being made available to the public before entering or completing clinical trials. At the request of Norwegian police and customs authorities, unknown pharmaceutical preparations suspected to contain peptide drugs are regularly subjected to analysis. In 2009, an unknown pharmaceutical preparation was submitted for analysis by liquid chromatography-high resolution tandem mass spectrometry (LC-HRMS/MS). The preparation was found to contain a 29 amino acid peptide with a C-terminal amide function. Based on the interpretation of mass spectrometric data, an amino acid sequence was proposed. The sequence is consistent with a peptide currently marketed under the name CJC-1295. CJC-1295 is a releasing factor for growth hormone and is therefore considered a Prohibited Substance under Section S2 of the WADA Prohibited List. This substance has potential performance-enhancing effects, it is readily available, and there is reason to believe that it is being used within the bodybuilding community. Copyright © 2010 John Wiley & Sons, Ltd.

  13. Statistics of Shared Components in Complex Component Systems

    Directory of Open Access Journals (Sweden)

    Andrea Mazzolini

    2018-04-01

    Full Text Available Many complex systems are modular. Such systems can be represented as “component systems,” i.e., sets of elementary components, such as LEGO bricks in LEGO sets. The bricks found in a LEGO set reflect a target architecture, which can be built following a set-specific list of instructions. In other component systems, instead, the underlying functional design and constraints are not obvious a priori, and their detection is often a challenge of both scientific and practical importance, requiring a clear understanding of component statistics. Importantly, some quantitative invariants appear to be common to many component systems, most notably a common broad distribution of component abundances, which often resembles the well-known Zipf’s law. Such “laws” affect in a general and nontrivial way the component statistics, potentially hindering the identification of system-specific functional constraints or generative processes. Here, we specifically focus on the statistics of shared components, i.e., the distribution of the number of components shared by different system realizations, such as the common bricks found in different LEGO sets. To account for the effects of component heterogeneity, we consider a simple null model, which builds system realizations by random draws from a universe of possible components. Under general assumptions on abundance heterogeneity, we provide analytical estimates of component occurrence, which quantify exhaustively the statistics of shared components. Surprisingly, this simple null model can positively explain important features of empirical component-occurrence distributions obtained from large-scale data on bacterial genomes, LEGO sets, and book chapters. Specific architectural features and functional constraints can be detected from occurrence patterns as deviations from these null predictions, as we show for the illustrative case of the “core” genome in bacteria.

  14. Sharing Rare Attitudes Attracts.

    Science.gov (United States)

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  15. The Design of Individual Knowledge Sharing Platform Based on Blog for Online Information Literacy Education

    Science.gov (United States)

    Qun, Zeng; Xiaocheng, Zhong

    Knowledge sharing means that an individual, team and organization share the knowledge with other members of the organization in the course of activities through the various ways. This paper analyzes the obstacle factors in knowledge sharing based on the technical point, and chooses the Blog technology to build a platform for improving knowledge sharing between individuals. The construction of the platform is an important foundation for information literacy education, and it also can be used to achieve online information literacy education. Finally, it gives a detailed analysis of its functions, advantages and disadvantages.

  16. 'Reacting to the unknown': experiencing the first birth at home or in hospital in Australia.

    Science.gov (United States)

    Dahlen, Hannah G; Barclay, Lesley; Homer, Caroline S E

    2010-08-01

    to explore the experiences of a small group of first-time mothers giving birth at home or in hospital. a grounded theory methodology was used. Data were generated from in-depth interviews with women in their own homes. Sydney, Australia. 19 women were interviewed. Seven women who gave birth for the first time in a public hospital and seven women who gave birth for the first time at home were interviewed, and their experiences were contrasted with two mothers who gave birth for the first time in a birth centre, one mother who gave birth for the first time in a private hospital and two women who had given birth more than once. these women shared common experiences of giving birth as 'novices'. Regardless of birth setting, they were all 'reacting to the unknown'. As they entered labour, the women chose different levels of responsibility for their birth. They also readjusted their expectations when the reality of labour occurred, reacted to the 'force' of labour, and connected or disconnected from the labour and eventually the baby. knowing that first-time mothers, irrespective of birth setting, are essentially 'reacting to the unknown' as they negotiate the experience of birth, could alter the way in which care is provided and increase the sensitivity of midwives to women's needs. Most importantly, midwives need to be aware of the need to help women adjust their expectations during labour and birth. Identifying the 'novice' status of first-time mothers also better explains previous research that reports unrealistic expectations and fear that may be associated with first-time birthing. Crown Copyright 2008. Published by Elsevier Ltd. All rights reserved.

  17. Intraabdominal abscessus of unknown etiology

    Directory of Open Access Journals (Sweden)

    Čolović Radoje

    2012-01-01

    Full Text Available Introduction. Intraabdominal abscesses are in 98-99% cases the result of secondary and only in 1-2% of primary peritonitis. They are easy and successfully diagnosed. Abdominal abscesses of unknown cause are extremely rare. Case Outline. The authors present a 68-year-old man, without significant data in past history, who suddenly developed epigastric pain, nausea, vomiting and leukocytosis which was treated with antibiotics resulting in the alleviation of complaints and reduction of white blood cells count. After five days ultrasonography showed incapsulated collection of dense fluid in the epigastrium confirmed by CT scan two days later. Upper endoscopy excluded ulcer and/or perforation of the stomach and duodenum. Under local anesthesia, through the upper part of the left rectal muscle, puncture followed by incision was done, and about 50 ml of dense pus was removed. Finger exploration of the cavity showed no foreign body within the cavity. Using drainage, the recovery was quick and uneventful. By preoperative and postoperative abdominal investigations no cause of the abscess was found. Two and a half years after surgery the patient remained symptom-free with normal clinical, laboratory and ultrasonographic findings. Conclusion. The authors presented an intraabdominal abscess of unknown cause that was successfully treated with antibiotics, percutaneous puncture and drainage under local anaesthesia. In spite of all diagnostic methods the cause of the abscess could not be found. Thus, such a possibility, although being rare, should be taken into account.

  18. Childrens' Sharing Behavior: Success and Failure, the "Norm of Deserving" and Reciprocity in Sharing.

    Science.gov (United States)

    Staub, Ervin

    Three studies of children's sharing behavior were designed to discover the effects of success or failure on children's willingness to share material rewards with others. In two studies, age differences in willingness to share were noted. Extensive discussion of the results indicates how a child's self concept might influence a child's sharing. The…

  19. Understanding Activation Patterns in Shared Circuits: Toward a Value Driven Model

    Directory of Open Access Journals (Sweden)

    Lisa Aziz-Zadeh

    2018-05-01

    Full Text Available Over the past decade many studies indicate that we utilize our own motor system to understand the actions of other people. This mirror neuron system (MNS has been proposed to be involved in social cognition and motor learning. However, conflicting findings regarding the underlying mechanisms that drive these shared circuits make it difficult to decipher a common model of their function. Here we propose adapting a “value-driven” model to explain discrepancies in the human mirror system literature and to incorporate this model with existing models. We will use this model to explain discrepant activation patterns in multiple shared circuits in the human data, such that a unified model may explain reported activation patterns from previous studies as a function of value.

  20. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  1. C-share: Optical circuits sharing for software-defined data-centers [arXiv

    DEFF Research Database (Denmark)

    Ben-Itzhak, Yaniv; Caba, Cosmin Marius; Schour, Liran

    2016-01-01

    Integrating optical circuit switches in data-centers is an ongoing research challenge. In recent years, state-of-the-art solutions introduce hybrid packet/circuit architectures for different optical circuit switch technologies, control techniques, and traffic rerouting methods. These solutions...... are based on separated packet and circuit planes which do not have the ability to utilize an optical circuit with flows that do not arrive from or delivered to switches directly connected to the circuit’s end-points. Moreover, current SDN-based elephant flow rerouting methods require a forwarding rule...... for each flow, which raise scalability issues. In this paper, we present C-Share - a practical, scalable SDN-based circuit sharing solution for data center networks. C-Share inherently enable elephant flows to share optical circuits by exploiting a flat upper tier network topology. C-Share is based...

  2. Decentralized adaptive neural control for high-order interconnected stochastic nonlinear time-delay systems with unknown system dynamics.

    Science.gov (United States)

    Si, Wenjie; Dong, Xunde; Yang, Feifei

    2018-03-01

    This paper is concerned with the problem of decentralized adaptive backstepping state-feedback control for uncertain high-order large-scale stochastic nonlinear time-delay systems. For the control design of high-order large-scale nonlinear systems, only one adaptive parameter is constructed to overcome the over-parameterization, and neural networks are employed to cope with the difficulties raised by completely unknown system dynamics and stochastic disturbances. And then, the appropriate Lyapunov-Krasovskii functional and the property of hyperbolic tangent functions are used to deal with the unknown unmatched time-delay interactions of high-order large-scale systems for the first time. At last, on the basis of Lyapunov stability theory, the decentralized adaptive neural controller was developed, and it decreases the number of learning parameters. The actual controller can be designed so as to ensure that all the signals in the closed-loop system are semi-globally uniformly ultimately bounded (SGUUB) and the tracking error converges in the small neighborhood of zero. The simulation example is used to further show the validity of the design method. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Professional SharePoint 2010 Development

    CERN Document Server

    Rizzo, Tom; Fried, Jeff; Swider, Paul J; Hillier, Scot; Schaefer, Kenneth

    2012-01-01

    Updated guidance on how to take advantage of the newest features of SharePoint programmability More than simply a portal, SharePoint is Microsoft's popular content management solution for building intranets and websites or hosting wikis and blogs. Offering broad coverage on all aspects of development for the SharePoint platform, this comprehensive book shows you exactly what SharePoint does, how to build solutions, and what features are accessible within SharePoint. Written by a team of SharePoint experts, this new edition offers an extensive selection of field-tested best practices that shows

  4. Professional SharePoint 2013 development

    CERN Document Server

    Alirezaei, Reza; Ranlett, Matt; Hillier, Scot; Wilson, Brian; Fried, Jeff; Swider, Paul

    2013-01-01

    Thorough coverage of development in SharePoint 2013 A team of well-known Microsoft MVPs joins forces in this fully updated resource, providing you with in-depth coverage of development tools in the latest iteration of the immensely popular SharePoint. From building solutions to building custom workflow and content management applications, this book shares field-tested best practices on all aspect of SharePoint 2013 development. Offers a thorough look at Windows Azure and SharePoint 2013Includes new chapters on Application Life Cycle Management, developing apps in ShareP

  5. SharePoint 2010 For Dummies

    CERN Document Server

    Williams, Vanessa L

    2012-01-01

    Here's the bestselling guide on SharePoint 2010, updated to cover Office 365 SharePoint Portal Server is an essential part of the enterprise infrastructure for many businesses. The Office 365 version includes significantly enhanced cloud capabilities. This second edition of the bestselling guide to SharePoint covers getting a SharePoint site up and running, branded, populated with content, and more. It explains ongoing site management and offers plenty of advice for administrators who want to leverage SharePoint and Office 365 in various ways.Many businesses today rely on SharePoint Portal Ser

  6. Compulsory acquisition of shares buyer, other shareholders, abuse of right of compulsory acquisition of shares

    Directory of Open Access Journals (Sweden)

    Arsić Zoran V.

    2015-01-01

    Full Text Available Company Act of Republic of Serbia includes mechanism for the compulsory acquisition of the shareholdings of minority shareholders. Technically this procedure is effected on the basis of the shareholders assembly resolution. Buyer is shareholder who has at least 90% of share capital and at least 90% of votes. Shares owned by entity under his dominant influence will be treated as shares of that shareholder provided that dominant influence exists at least one year. Company's own shares, and shares subject o a pledge do not represent shares of other shareholders. There are several actions which may be treated as abuse of right of compulsory acquisition of shares.

  7. The stand-alone test and decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Thorlund-Petersen, Lars

    2000-01-01

    The rule of decreasing serial cost sharing defined in de Frutos [1] over the class of concave cost functions may violate the important stand-alone test. Sufficient conditions for the test to be satisfied are given, in terms of individual rationality as well as coalitional stability...

  8. Identification of novel functional inhibitors of acid sphingomyelinase.

    Directory of Open Access Journals (Sweden)

    Johannes Kornhuber

    Full Text Available We describe a hitherto unknown feature for 27 small drug-like molecules, namely functional inhibition of acid sphingomyelinase (ASM. These entities named FIASMAs (Functional Inhibitors of Acid SphingoMyelinAse, therefore, can be potentially used to treat diseases associated with enhanced activity of ASM, such as Alzheimer's disease, major depression, radiation- and chemotherapy-induced apoptosis and endotoxic shock syndrome. Residual activity of ASM measured in the presence of 10 µM drug concentration shows a bimodal distribution; thus the tested drugs can be classified into two groups with lower and higher inhibitory activity. All FIASMAs share distinct physicochemical properties in showing lipophilic and weakly basic properties. Hierarchical clustering of Tanimoto coefficients revealed that FIASMAs occur among drugs of various chemical scaffolds. Moreover, FIASMAs more frequently violate Lipinski's Rule-of-Five than compounds without effect on ASM. Inhibition of ASM appears to be associated with good permeability across the blood-brain barrier. In the present investigation, we developed a novel structure-property-activity relationship by using a random forest-based binary classification learner. Virtual screening revealed that only six out of 768 (0.78% compounds of natural products functionally inhibit ASM, whereas this inhibitory activity occurs in 135 out of 2028 (6.66% drugs licensed for medical use in humans.

  9. A Heuristic Design Information Sharing Framework for Hard Discrete Optimization Problems

    National Research Council Canada - National Science Library

    Jacobson, Sheldon H

    2007-01-01

    .... This framework has been used to gain new insights into neighborhood structure designs that allow different neighborhood functions to share information when using the same heuristic applied to the same problem...

  10. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  11. Shared Reading Quality and Brain Activation during Story Listening in Preschool-Age Children.

    Science.gov (United States)

    Hutton, John S; Phelan, Kieran; Horowitz-Kraus, Tzipi; Dudley, Jonathan; Altaye, Mekibib; DeWitt, Tom; Holland, Scott K

    2017-12-01

    To explore the relationship between maternal shared reading quality (verbal interactivity and engagement) and brain function during story listening in at-risk, preschool-age children, in the context of behavioral evidence and American Academy of Pediatrics, recommendations. In this cross-sectional study, 22 healthy, 4-year-old girls from low socioeconomic status households completed functional magnetic resonance imaging using an established story listening task, followed by videotaped observation of uncoached mother-daughter reading of the same, age-appropriate picture book. Shared reading quality was independently scored applying dialogic reading and other evidence-based criteria reflecting interactivity and engagement, and applied as a predictor of neural activation during the functional magnetic resonance imaging task, controlling for income and maternal education. Shared reading quality scores were generally low and negatively correlated with maternal distraction by smartphones (P reading quality is positively correlated with brain activation supporting complex language, executive function, and social-emotional processing in at-risk, preschool-age children. These findings represent novel neural biomarkers of how this modifiable aspect of home reading environment may influence foundational emergent literacy skills, reinforce behavioral evidence and American Academy of Pediatrics, recommendations, and underscore the potential of dialogic reading interventions to promote healthy brain development, especially in at-risk households. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Finite-time sliding surface constrained control for a robot manipulator with an unknown deadzone and disturbance.

    Science.gov (United States)

    Ik Han, Seong; Lee, Jangmyung

    2016-11-01

    This paper presents finite-time sliding mode control (FSMC) with predefined constraints for the tracking error and sliding surface in order to obtain robust positioning of a robot manipulator with input nonlinearity due to an unknown deadzone and external disturbance. An assumed model feedforward FSMC was designed to avoid tedious identification procedures for the manipulator parameters and to obtain a fast response time. Two constraint switching control functions based on the tracking error and finite-time sliding surface were added to the FSMC to guarantee the predefined tracking performance despite the presence of an unknown deadzone and disturbance. The tracking error due to the deadzone and disturbance can be suppressed within the predefined error boundary simply by tuning the gain value of the constraint switching function and without the addition of an extra compensator. Therefore, the designed constraint controller has a simpler structure than conventional transformed error constraint methods and the sliding surface constraint scheme can also indirectly guarantee the tracking error constraint while being more stable than the tracking error constraint control. A simulation and experiment were performed on an articulated robot manipulator to validate the proposed control schemes. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Scheme for teleportation of unknown states of trapped ion

    Institute of Scientific and Technical Information of China (English)

    Chen Mei-Feng; Ma Song-She

    2008-01-01

    A scheme is presented for teleporting an unknown state in a trapped ion system.The scheme only requires a single laser beam.It allows the trap to be in any state with a few phonons,e.g.a thermal motion.Furthermore,it works in the regime,where the Rabi frequency of the laser is on the order of the trap frequency.Thus,the teleportation speed is greatly increased,which is important for decreasing the decoherence effect.This idea can also be used to teleport an unknown ionic entangled state.

  14. Optimal Cross-Layer Design for Energy Efficient D2D Sharing Systems

    KAUST Repository

    Alabbasi, Abdulrahman

    2016-11-23

    In this paper, we propose a cross-layer design, which optimizes the energy efficiency of a potential future 5G spectrum-sharing environment, in two sharing scenarios. In the first scenario, underlying sharing is considered. We propose and minimize a modified energy per good bit (MEPG) metric, with respect to the spectrum sharing user’s transmission power and media access frame length. The cellular users, legacy users, are protected by an outage probability constraint. To optimize the non-convex targeted problem, we utilize the generalized convexity theory and verify the problem’s strictly pseudoconvex structure. We also derive analytical expressions of the optimal resources. In the second scenario, we minimize a generalized MEPG function while considering a probabilistic activity of cellular users and its impact on the MEPG performance of the spectrum sharing users. Finally, we derive the associated optimal resource allocation of this problem. Selected numerical results show the improvement of the proposed system compared with other systems.

  15. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  16. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  17. Exploring the process of writing about and sharing traumatic birth experiences online.

    Science.gov (United States)

    Blainey, Sarah H; Slade, Pauline

    2015-05-01

    This study aimed to explore the experience of writing about a traumatic birth experience and sharing it online. Twelve women who had submitted their stories about traumatic birth experiences to the Birth Trauma Association for online publication were interviewed about their experiences. Women were interviewed shortly after writing but before posting and again 1 month after the story was posted online. All participants completed both interviews. These were transcribed and analysed using template analysis. Women described varied reasons for writing and sharing their stories, including wanting to help themselves and others. The process of writing was described as emotional, however was generally seen as a positive thing. Aspects of writing that were identified as helpful included organizing their experiences into a narrative, and distancing themselves from the experience. Writing and posting online about a traumatic birth is experienced positively by women. It may be a useful self-help intervention and is worthy of systematic evaluation. The mechanisms through which writing is reported to have impacted as described in the interviews link to the mechanisms of change in cognitive-behavioural approaches to post-traumatic symptoms. Statement of contribution What is already known on this subject? Some women develop post-traumatic stress disorder-like symptoms following birth. These can impact on both themselves and their family, yet these women may not seek professional help. Writing about a traumatic event may be a useful approach for reducing post-traumatic stress symptoms, but the impact of online sharing is unknown. What does this study add? This study demonstrates that women report benefits from writing about their birth experiences. Writing enabled organizing the experience into a narrative and distancing from the trauma, which was helpful. Sharing the story online was an emotional experience for participants, however was generally seen positively. © 2014 The

  18. Prevalence and Impact of Unknown Diabetes in the ICU.

    Science.gov (United States)

    Carpenter, David L; Gregg, Sara R; Xu, Kejun; Buchman, Timothy G; Coopersmith, Craig M

    2015-12-01

    Many patients with diabetes and their care providers are unaware of the presence of the disease. Dysglycemia encompassing hyperglycemia, hypoglycemia, and glucose variability is common in the ICU in patients with and without diabetes. The purpose of this study was to determine the impact of unknown diabetes on glycemic control in the ICU. Prospective observational study. Nine ICUs in an academic, tertiary hospital and a hybrid academic/community hospital. Hemoglobin A1c levels were ordered at all ICU admissions from March 1, 2011 to September 30, 2013. Electronic medical records were examined for a history of antihyperglycemic medications or International Classification of Diseases, 9th Edition diagnosis of diabetes. Patients were categorized as having unknown diabetes (hemoglobin A1c > 6.5%, without history of diabetes), no diabetes (hemoglobin A1c 6.5%, with documented history of diabetes). None. A total of 15,737 patients had an hemoglobin A1c and medical record evaluable for the history of diabetes, and 5,635 patients had diabetes diagnosed by either medical history or an elevated hemoglobin A1c in the ICU. Of these, 1,460 patients had unknown diabetes, accounting for 26.0% of all patients with diabetes. This represented 41.0% of patients with an hemoglobin A1c > 6.5% and 9.3% of all ICU patients. Compared with patients without diabetes, patients with unknown diabetes had a higher likelihood of requiring an insulin infusion (44.3% vs 29.3%; p 180 mg/dL; p < 0.0001) and hypoglycemia (8.9% vs 2.5%; blood glucose < 70 mg/dL; p < 0.0001), higher glycemic variability (55.6 vs 28.8, average of patient SD of glucose; p < 0.0001), and increased mortality (13.8% vs 11.4%; p = 0.01). Patients with unknown diabetes represent a significant percentage of ICU admissions. Measurement of hemoglobin A1c at admission can prospectively identify a population that are not known to have diabetes but have significant challenges in glycemic control in the ICU.

  19. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  20. Cervical Lymph Node Metastases From Unknown Primary Cancer: A Single-Institution Experience With Intensity-Modulated Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Villeneuve, Hugo, E-mail: hugo.villeneuve@umontreal.ca [Department of Radiation Oncology, Centre hospitalier de l' Universite de Montreal, Montreal, QC (Canada); Despres, Philippe; Fortin, Bernard; Filion, Edith; Donath, David [Department of Radiation Oncology, Centre hospitalier de l' Universite de Montreal, Montreal, QC (Canada); Soulieres, Denis [Department of Medical Oncology, Centre hospitalier de l' Universite de Montreal, Montreal, QC (Canada); Guertin, Louis; Ayad, Tarek; Christopoulos, Apostolos [Department of Head and Neck Surgery, Centre hospitalier de l' Universite de Montreal, Montreal, QC (Canada); Nguyen-Tan, Phuc Felix [Department of Radiation Oncology, Centre hospitalier de l' Universite de Montreal, Montreal, QC (Canada)

    2012-04-01

    Purpose: To determine the effectiveness and rate of complications of intensity-modulated radiotherapy (IMRT) in the treatment of cervical lymph node metastases from unknown primary cancer. Methods and Materials: Between February 2005 and November 2008, 25 patients with an unknown primary cancer underwent IMRT, with a median radiation dose of 70 Gy. The bilateral neck and ipsilateral putative pharyngeal mucosa were included in the target volume. All patients had squamous cell carcinoma, except for 1 patient who had adenosquamous differentiation. They were all treated with curative intent. Of the 25 included patients, 20 were men and 5 were women, with a median age of 54 years. Of these patients, 3 had Stage III, 18 had Stage IVa, and 4 had Stage IVb. Of the 25 patients, 18 (72%) received platinum-based chemotherapy in a combined-modality setting. Neck dissection was reserved for residual disease after definitive IMRT. Overall survival, disease-free survival, and locoregional control were calculated using the Kaplan-Meier method. Results: With a median follow-up of 38 months, the overall survival, disease-free survival, and locoregional control rates were all 100% at 3 years. No occurrence of primary cancer was observed during the follow-up period. The reported rates of xerostomia reduced with the interval from the completion of treatment. Nine patients (36%) reported Grade 2 or greater xerostomia at 6 months, and only 2 (8%) of them reported the same grade of salivary function toxicity after 24 months of follow-up. Conclusion: In our institution, IMRT for unknown primary cancer has provided good overall and disease-free survival in all the patients with an acceptable rate of complications. IMRT allowed us to address the bilateral neck and ipsilateral putative pharyngeal mucosa with minimal late salivary function toxicity. The use of concurrent chemotherapy and IMRT for more advanced disease led to good clinical results with reasonable toxicities.

  1. Update on CERN Search based on SharePoint 2013

    Science.gov (United States)

    Alvarez, E.; Fernandez, S.; Lossent, A.; Posada, I.; Silva, B.; Wagner, A.

    2017-10-01

    CERN’s enterprise Search solution “CERN Search” provides a central search solution for users and CERN service providers. A total of about 20 million public and protected documents from a wide range of document collections is indexed, including Indico, TWiki, Drupal, SharePoint, JACOW, E-group archives, EDMS, and CERN Web pages. In spring 2015, CERN Search was migrated to a new infrastructure based on SharePoint 2013. In the context of this upgrade, the document pre-processing and indexing process was redesigned and generalised. The new data feeding framework allows to profit from new functionality and it facilitates the long term maintenance of the system.

  2. Sharing wind power forecasts in electricity markets: A numerical analysis

    International Nuclear Information System (INIS)

    Exizidis, Lazaros; Kazempour, S. Jalal; Pinson, Pierre; Greve, Zacharie de; Vallée, François

    2016-01-01

    Highlights: • Information sharing among different agents can be beneficial for electricity markets. • System cost decreases by sharing wind power forecasts between different agents. • Market power of wind producer may increase by sharing forecasts with market operator. • Extensive out-of-sample analysis is employed to draw reliable conclusions. - Abstract: In an electricity pool with significant share of wind power, all generators including conventional and wind power units are generally scheduled in a day-ahead market based on wind power forecasts. Then, a real-time market is cleared given the updated wind power forecast and fixed day-ahead decisions to adjust power imbalances. This sequential market-clearing process may cope with serious operational challenges such as severe power shortage in real-time due to erroneous wind power forecasts in day-ahead market. To overcome such situations, several solutions can be considered such as adding flexible resources to the system. In this paper, we address another potential solution based on information sharing in which market players share their own wind power forecasts with others in day-ahead market. This solution may improve the functioning of sequential market-clearing process through making more informed day-ahead schedules, which reduces the need for balancing resources in real-time operation. This paper numerically evaluates the potential value of sharing forecasts for the whole system in terms of system cost reduction. Besides, its impact on each market player’s profit is analyzed. The framework of this study is based on a stochastic two-stage market setup and complementarity modeling, which allows us to gain further insights into information sharing impacts.

  3. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  4. Job-Sharing the Principalship.

    Science.gov (United States)

    Brown, Shelley; Feltham, Wendy

    1997-01-01

    The coprincipals of a California elementary school share their ideas for building a successful job-sharing partnership. They suggest it is important to find the right partner, develop and present a job-sharing proposal, establish systems of communication with each other, evaluate one's progress, focus on the principalship, and provide leadership…

  5. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  6. Network computing infrastructure to share tools and data in global nuclear energy partnership

    International Nuclear Information System (INIS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    2010-01-01

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer - Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP. (author)

  7. Decentralised output feedback control of Markovian jump interconnected systems with unknown interconnections

    Science.gov (United States)

    Li, Li-Wei; Yang, Guang-Hong

    2017-07-01

    The problem of decentralised output feedback control is addressed for Markovian jump interconnected systems with unknown interconnections and general transition rates (TRs) allowed to be unknown or known with uncertainties. A class of decentralised dynamic output feedback controllers are constructed, and a cyclic-small-gain condition is exploited to dispose the unknown interconnections so that the resultant closed-loop system is stochastically stable and satisfies an H∞ performance. With slack matrices to cope with the nonlinearities incurred by unknown and uncertain TRs in control synthesis, a novel controller design condition is developed in linear matrix inequality formalism. Compared with the existing works, the proposed approach leads to less conservatism. Finally, two examples are used to illustrate the effectiveness of the new results.

  8. A Processor-Sharing Scheduling Strategy for NFV Nodes

    Directory of Open Access Journals (Sweden)

    Giuseppe Faraci

    2016-01-01

    Full Text Available The introduction of the two paradigms SDN and NFV to “softwarize” the current Internet is making management and resource allocation two key challenges in the evolution towards the Future Internet. In this context, this paper proposes Network-Aware Round Robin (NARR, a processor-sharing strategy, to reduce delays in traversing SDN/NFV nodes. The application of NARR alleviates the job of the Orchestrator by automatically working at the intranode level, dynamically assigning the processor slices to the virtual network functions (VNFs according to the state of the queues associated with the output links of the network interface cards (NICs. An extensive simulation set is presented to show the improvements achieved with respect to two more processor-sharing strategies chosen as reference.

  9. Sharing and helping: predictors of adolescents' willingness to share diabetes personal health information with peers.

    Science.gov (United States)

    Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A

    2018-02-01

    Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  10. Autonomous Flight in Unknown Indoor Environments

    OpenAIRE

    Bachrach, Abraham Galton; He, Ruijie; Roy, Nicholas

    2009-01-01

    This paper presents our solution for enabling a quadrotor helicopter, equipped with a laser rangefinder sensor, to autonomously explore and map unstructured and unknown indoor environments. While these capabilities are already commodities on ground vehicles, air vehicles seeking the same performance face unique challenges. In this paper, we describe the difficulties in achieving fully autonomous helicopter flight, highlighting the differences between ground and helicopter robots that make it ...

  11. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  12. Designing towards the Unknown: Engaging with Material and Aesthetic Uncertainty

    Directory of Open Access Journals (Sweden)

    Danielle Wilde

    2017-12-01

    Full Text Available New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation—where outcomes remain unknown long enough that new discoveries become possible—is not easy in technology design where complex interdisciplinary teams with time and resource constraints need to deliver concrete outcomes on schedule. The Poetic Kinaesthetic Interface project (PKI engages with this problematic directly. In PKI we use unfolding processes—informed by participatory, speculative and critical design—in emergent actions, to design towards unknown outcomes, using unknown materials. The impossibility of this task is proving as useful as it is disruptive. At its most potent, it is destabilising expectations, aesthetics and processes. Keeping the researchers, collaborators and participants in a state of unknowing, is opening the research potential to far-ranging possibilities. In this article we unpack the motivations driving the PKI project. We present our mixed-methodology, which entangles textile crafts, design interactions and materiality to shape an embodied enquiry. Our research outcomes are procedural and methodological. PKI brings together diverse human, non-human, known and unknown actors to discover where the emergent assemblages might lead. Our approach is re-invigorating—as it demands re-envisioning of—the design process.

  13. Value of Bone marrow Examination in Pyrexia of unknown origin

    Directory of Open Access Journals (Sweden)

    A Jha

    2013-10-01

    Full Text Available Background: Pyrexia of unknown origin is a common diagnostic dilemma. Series of diagnostic modalities are required to arrive at diagnosis. Bone marrow examination is one of the common tests implicated in the diagnosis in combination with other diagnostic modalities. Present study has attempted to explore the causes of pyrexia of unknown origin based on bone marrow morphological study. Materials and Methods: In a one year prospective study conducted at Manipal Teaching Hospital, Pokhara, Nepal; bone marrow aspiration and biopsy was performed and evaluated morphologically, in 57 patients fulfilling the criteria of classic pyrexia of unknown origin. Results: In 42% cases; specific diagnosis could be made and hematological neoplasm was the most common finding followed by megaloblastic anemia, hypoplastic anemia and one case each of hemophagocytosis, malaria and tuberculosis. Acute leukemia was the most frequently encountered hematological malignancy followed by multiple myeloma, chronic myeloid leukemia, essential thrombocythemia and myelodysplastic syndrome. Conclusion: Morphological examination of bone marrow has important role in diagnosis of pyrexia of unknown origin. However, yield of diagnosis can be increased if it is combined with other diagnostic modalities including radiological, microbiological and serological tests. DOI: http://dx.doi.org/10.3126/jpn.v3i6.8991 Journal of Pathology of Nepal (2013 Vol. 3, 447-451

  14. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  15. Sharing wind power forecasts in electricity markets: A numerical analysis

    DEFF Research Database (Denmark)

    Exizidis, Lazaros; Pinson, Pierre; Kazempour, Jalal

    2016-01-01

    In an electricity pool with significant share of wind power, all generators including conventional and wind power units are generally scheduled in a day-ahead market based on wind power forecasts. Then, a real-time market is cleared given the updated wind power forecast and fixed day......-ahead decisions to adjust power imbalances. This sequential market-clearing process may cope with serious operational challenges such as severe power shortage in real-time due to erroneous wind power forecasts in day-ahead market. To overcome such situations, several solutions can be considered such as adding...... flexible resources to the system. In this paper, we address another potential solution based on information sharing in which market players share their own wind power forecasts with others in day-ahead market. This solution may improve the functioning of sequential market-clearing process through making...

  16. The Sharing Economy and the Future of Personal Mobility: New Models Based on Car Sharing

    Directory of Open Access Journals (Sweden)

    Olga Novikova

    2017-08-01

    Full Text Available The sharing economy is an emerging phenomenon that shapes the cultural, economic, and social landscape of our modern world. With variations of the concept of the sharing economy emerging in so many fields, the area of shared mobility – the shared use of a motor vehicle, bicycle, or other mode that enables travellers to gain short-term access to transportation modes on an on-demand basis – has developed as the forerunner of the transformation to be expected in other areas. This article examines how the sphere of personal mobility has been affected by the growth of sharing economy. It contributes to the growing body of shared mobility literature by uncovering innovative mobility-based models that represent solutions on the intersection of shared mobility, physical infrastructure, and integrated-mobility schemes.

  17. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  18. Labia Majora Share

    Directory of Open Access Journals (Sweden)

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  19. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  20. Shared Contract-Obedient Endpoints

    Directory of Open Access Journals (Sweden)

    Étienne Lozes

    2012-12-01

    Full Text Available Most of the existing verification techniques for message-passing programs suppose either that channel endpoints are used in a linear fashion, where at most one thread may send or receive from an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach usually forbids the sharing of channels while the latter limits what is provable about programs. In this paper we propose a midpoint between these techniques by extending a proof system based on separation logic to allow sharing of endpoints. We identify two independent mechanisms for supporting sharing: an extension of fractional shares to endpoints, and a new technique based on what we call reflexive ownership transfer. We demonstrate on a number of examples that a linear treatment of sharing is possible.

  1. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  2. Job share a consultant post.

    OpenAIRE

    Thornicroft, G.; Strathdee, G.

    1992-01-01

    Job sharing offers advantages to both employer and employee but it is still uncommon in medicine. Based on the experiences of two psychiatrists sharing a consultant post this article describes some of the problems in obtaining a job share. The most difficult part can be getting an interview, and once a post has been obtained the terms and conditions of service may have to be modified to suit job sharing. Getting on well with your job sharing partner and good communication will not only help o...

  3. Meta-analysis of shared genetic architecture across ten pediatric autoimmune diseases

    Science.gov (United States)

    Li, Yun R; Li, Jin; Zhao, Sihai D; Bradfield, Jonathan P; Mentch, Frank D; Maggadottir, S Melkorka; Hou, Cuiping; Abrams, Debra J; Chang, Diana; Gao, Feng; Guo, Yiran; Wei, Zhi; Connolly, John J; Cardinale, Christopher J; Bakay, Marina; Glessner, Joseph T; Li, Dong; Kao, Charlly; Thomas, Kelly A; Qiu, Haijun; Chiavacci, Rosetta M; Kim, Cecilia E; Wang, Fengxiang; Snyder, James; Richie, Marylyn D; Flatø, Berit; Førre, Øystein; Denson, Lee A; Thompson, Susan D; Becker, Mara L; Guthery, Stephen L; Latiano, Anna; Perez, Elena; Resnick, Elena; Russell, Richard K; Wilson, David C; Silverberg, Mark S; Annese, Vito; Lie, Benedicte A; Punaro, Marilynn; Dubinsky, Marla C; Monos, Dimitri S; Strisciuglio, Caterina; Staiano, Annamaria; Miele, Erasmo; Kugathasan, Subra; Ellis, Justine A; Munro, Jane E; Sullivan, Kathleen E; Wise, Carol A; Chapel, Helen; Cunningham-Rundles, Charlotte; Grant, Struan F A; Orange, Jordan S; Sleiman, Patrick M A; Behrens, Edward M; Griffiths, Anne M; Satsangi, Jack; Finkel, Terri H; Keinan, Alon; Prak, Eline T Luning; Polychronakos, Constantin; Baldassano, Robert N; Li, Hongzhe; Keating, Brendan J; Hakonarson, Hakon

    2016-01-01

    Genome-wide association studies (GWASs) have identified hundreds of susceptibility genes, including shared associations across clinically distinct autoimmune diseases. We performed an inverse χ2 meta-analysis across ten pediatric-age-of-onset autoimmune diseases (pAIDs) in a case-control study including more than 6,035 cases and 10,718 shared population-based controls. We identified 27 genome-wide significant loci associated with one or more pAIDs, mapping to in silico–replicated autoimmune-associated genes (including IL2RA) and new candidate loci with established immunoregulatory functions such as ADGRL2, TENM3, ANKRD30A, ADCY7 and CD40LG. The pAID-associated single-nucleotide polymorphisms (SNPs) were functionally enriched for deoxyribonuclease (DNase)-hypersensitivity sites, expression quantitative trait loci (eQTLs), microRNA (miRNA)-binding sites and coding variants. We also identified biologically correlated, pAID-associated candidate gene sets on the basis of immune cell expression profiling and found evidence of genetic sharing. Network and protein-interaction analyses demonstrated converging roles for the signaling pathways of type 1, 2 and 17 helper T cells (TH1, TH2 and TH17), JAK-STAT, interferon and interleukin in multiple autoimmune diseases. PMID:26301688

  4. Storm in the electricity sector: the emergence of a sharing economy in the case of Netherlands

    International Nuclear Information System (INIS)

    Vernay, Anne-Lorene; Gauthier, Caroline

    2017-01-01

    Dominated by a few actors, the electricity sector has long been very stable. Today, it is facing significant disruption as a result of two political decisions: the liberalization of the sector and the signing of the Kyoto protocol. Surprisingly, the sector is also experiencing the emergence of a new paradigm: that of the sharing economy. The sharing economy is historically unknown in the sector where its appearance seemed rather unlikely. This article traces the emergence and ascension of this paradigm in the Netherlands from the 1980's to nowadays. A business model perspective is adopted. The business model describes how firms create, deliver and capture value. This article shows that the transformation is not a technical one but rather a managerial one with the development of new ways of organizing the production of electricity. It also shows that the sector went from a situation where a small number of isolated initiatives were present to one where an ecosystem was created around sharing activities with many actors present. These actors sometimes compete with each other but, more often, they are complementary to one another. The article goes on to discuss the various forms that the sharing economy takes in the electricity sector and the ways that firms, through their business models, facilitated the emergence and development of this paradigm. Finally, this article criticizes the use of the business model as an instrument to analyse the evolution of a sector

  5. A Unified Discussion on the Concept of Score Functions Used in the Context of Nonparametric Linkage Analysis

    Directory of Open Access Journals (Sweden)

    Lars Ängquist

    2008-01-01

    Full Text Available In this article we try to discuss nonparametric linkage (NPL score functions within a broad and quite general framework. The main focus of the paper is the structure, derivation principles and interpretations of the score function entity itself. We define and discuss several families of one-locus score function definitions, i.e. the implicit, explicit and optimal ones. Some generalizations and comments to the two-locus, unconditional and conditional, cases are included as well. Although this article mainly aims at serving as an overview, where the concept of score functions are put into a covering context, we generalize the noncentrality parameter (NCP optimal score functions in Ängquist et al. (2007 to facilitate—through weighting—for incorporation of several plausible distinct genetic models. Since the genetic model itself most oftenly is to some extent unknown this facilitates weaker prior assumptions with respect to plausible true disease models without loosing the property of NCP-optimality. Moreover, we discuss general assumptions and properties of score functions in the above sense. For instance, the concept of identical by descent (IBD sharing structures and score function equivalence are discussed in some detail.

  6. Pro SharePoint 2013 administration

    CERN Document Server

    Garrett, Robert

    2013-01-01

    Pro SharePoint 2013 Administration is a practical guide to SharePoint 2013 for intermediate to advanced SharePoint administrators and power users, covering the out-of-the-box feature set and capabilities of Microsoft's collaboration and business productivity platform. SharePoint 2013 is an incredibly complex product, with many moving parts, new features, best practices, and 'gotchas.' Author Rob Garrett distills SharePoint's portfolio of features, capabilities, and utilities into an in-depth professional guide-with no fluff and copious advice-that is designed from scratch to be the manual Micr

  7. Open Education, OER & MOOCs for entrepreneurship: To share or not to share

    NARCIS (Netherlands)

    Stracke, Christian M.

    2016-01-01

    Invited Speech at the Conference Skills and competences on female entrepreneurship, Athens, Greece, by Stracke, C. M. (2016, 6 July): "Open Education, OER & MOOCs for entrepreneurship: To share or not to share"

  8. Sharing medicine: the candidacy of medicines and other household items for sharing, Dominican Republic.

    Directory of Open Access Journals (Sweden)

    Michael N Dohn

    Full Text Available People share medicines and problems can result from this behavior. Successful interventions to change sharing behavior will require understanding people's motives and purposes for sharing medicines. Better information about how medicines fit into the gifting and reciprocity system could be useful in designing interventions to modify medicine sharing behavior. However, it is uncertain how people situate medicines among other items that might be shared. This investigation is a descriptive study of how people sort medicines and other shareable items.This study in the Dominican Republic examined how a convenience sample (31 people sorted medicines and rated their shareability in relation to other common household items. We used non-metric multidimensional scaling to produce association maps in which the distances between items offer a visual representation of the collective opinion of the participants regarding the relationships among the items. In addition, from a pile sort constrained by four categories of whether sharing or loaning the item was acceptable (on a scale from not shareable to very shareable, we assessed the degree to which the participants rated the medicines as shareable compared to other items. Participants consistently grouped medicines together in all pile sort activities; yet, medicines were mixed with other items when rated by their candidacy to be shared. Compared to the other items, participants had more variability of opinion as to whether medicines should be shared.People think of medicines as a distinct group, suggesting that interventions might be designed to apply to medicines as a group. People's differing opinions as to whether it was appropriate to share medicines imply a degree of uncertainty or ambiguity that health promotion interventions might exploit to alter attitudes and behaviors. These findings have implications for the design of health promotion interventions to impact medicine sharing behavior.

  9. Two Person Zero-Sum Semi-Markov Games with Unknown Holding Times Distribution on One Side: A Discounted Payoff Criterion

    International Nuclear Information System (INIS)

    Minjarez-Sosa, J. Adolfo; Luque-Vasquez, Fernando

    2008-01-01

    This paper deals with two person zero-sum semi-Markov games with a possibly unbounded payoff function, under a discounted payoff criterion. Assuming that the distribution of the holding times H is unknown for one of the players, we combine suitable methods of statistical estimation of H with control procedures to construct an asymptotically discount optimal pair of strategies

  10. 34 CFR 675.45 - Allowable costs, Federal share, and institutional share.

    Science.gov (United States)

    2010-07-01

    ... education, financial self-help, and community service-learning opportunities. (3) Carry out activities in... 34 Education 3 2010-07-01 2010-07-01 false Allowable costs, Federal share, and institutional share. 675.45 Section 675.45 Education Regulations of the Offices of the Department of Education (Continued...

  11. Uric Acid: The Unknown Uremic Toxin.

    Science.gov (United States)

    Treviño-Becerra, Alejandro

    2018-01-01

    This review brings together concepts of uric acid metabolism affecting renal parenchyma and its function and the current therapies to reduce hyperuricemia (HyU) and avoid renal disease progression. High uric acid plays an important role in several chronic diseases including kidney diseases such as lithiasis, gout nephropathy, and preeclampsia. In the last 30 years, it has been shown that reducing HyU with low protein and low purine diets in addition to allopurinol creates physiopathological conditions that produce a slight increase in the glomerular filtration rate (GFR). In recent years, in a new era of research in clinical, genetics, pharmacological, and epidemiologic fields, they have been moving forward to support the idea that reduction in HyU could benefit the chronic renal failure (CRF) patients (stage III-IV), thereby avoiding the drop of GFR for undefined mechanisms. There are several clinical trials in progress that show the HyU reducing to very low values and an increased GFR. In a young population, when treating HyU there is a reduction in high blood pressure. There are some reports showing that HyU could play a role in the diabetic nephropathy. Therefore, there have been some speculations that HyU treatment could stop the progression of CRF modifying the natural history of the diseases. So there will be new clinical trials with old and new medication and metabolic procedure to maintain a very low blood levels in the unknown uremic toxin know as uric acid which seems to be the toxin to the damage kidney. © 2018 S. Karger AG, Basel.

  12. Share opportunity sets and cooperative games

    NARCIS (Netherlands)

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.

    2008-01-01

    In many share problems there is ana priorigiven a natural set of possible divisions to solve the sharing problem. Cooperative games related to such share sets are introduced, which may be helpful in solving share problems. Relations between properties of share sets and properties of games are

  13. Sharing without caring? Respect for moral others compensates for low sympathy in children's sharing.

    Science.gov (United States)

    Zuffianò, Antonio; Colasante, Tyler; Peplak, Joanna; Malti, Tina

    2015-06-01

    We examined links between sharing, respect for moral others, and sympathy in an ethnically diverse sample of 7- and 15-year-olds (N = 146). Sharing was assessed through children's allocation of resources in the dictator game. Children reported their respect towards hypothetical characters performing moral acts. Sympathy was evaluated via caregiver and child reports. Respect and caregiver-reported sympathy interacted in predicting sharing: Higher levels of respect were associated with higher levels of sharing for children with low, but not medium or high, levels of sympathy. The motivational components of other-oriented respect may compensate for low levels of sympathetic concern in the promotion of sharing. © 2015 The British Psychological Society.

  14. Analysing lawyers’ attitude towards knowledge sharing

    Directory of Open Access Journals (Sweden)

    Wole M. Olatokun

    2012-02-01

    Full Text Available Objectives: The study examined and identified the factors that affect lawyers’ attitudes to knowledge sharing, and their knowledge sharing behaviour. Specifically, it investigated the relationship between the salient beliefs affecting the knowledge sharing attitude of lawyers’, and applied a modified version of the Theory of Reasoned Action (TRA in the knowledge sharing context, to predict how these factors affect their knowledge sharing behaviour.Method: A field survey of 273 lawyers was carried out, using questionnaire for data collection. Collected data on all variables were structured into grouped frequency distributions. Principal Component Factor Analysis was applied to reduce the constructs and Simple Regression was applied to test the hypotheses. These were tested at 0.05% level of significance.Results: Results showed that expected associations and contributions were the major determinants of lawyers’ attitudes towards knowledge sharing. Expected reward was not significantly related to lawyers’ attitudes towards knowledge sharing. A positive attitude towards knowledge sharing was found to lead to a positive intention to share knowledge, although a positive intention to share knowledge did not significantly predict a positive knowledge sharing behaviour. The level of Information Technology (IT usage was also found to significantly affect the knowledge sharing behaviour of lawyers’.Conclusion: It was recommended that law firms in the study area should deploy more IT infrastructure and services that encourage effective knowledge sharing amongst lawyers. 

  15. Lod score curves for phase-unknown matings.

    Science.gov (United States)

    Hulbert-Shearon, T; Boehnke, M; Lange, K

    1996-01-01

    For a phase-unknown nuclear family, we show that the likelihood and lod score are unimodal, and we describe conditions under which the maximum occurs at recombination fraction theta = 0, theta = 1/2, and 0 < theta < 1/2. These simply stated necessary and sufficient conditions seem to have escaped the notice of previous statistical geneticists.

  16. Share Opportunity Sets and Cooperative Games

    NARCIS (Netherlands)

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.

    2006-01-01

    In many share problems there is a priori given a natural set of possible divisions to solve the sharing problem.Cooperative games related to such share sets are introduced, which may be helpful in solving share problems.Relations between properties of share sets and properties of games are

  17. Understanding Social OER Environments--A Quantitative Study on Factors Influencing the Motivation to Share and Collaborate

    Science.gov (United States)

    Pirkkalainen, Henri; Jokinen, Jussi P. P.; Pawlowski, Jan M.

    2014-01-01

    Social software environments are increasingly used for open education: teachers and learners share and collaborate in these environments. While there are various possibilities for the inclusion of such social functionalities for OER, many organizational, individual and technological challenges can hinder the motivation of teachers to share and…

  18. M-MRAC Backstepping for Systems with Unknown Virtual Control Coefficients

    Science.gov (United States)

    Stepanyan, Vahram; Krishnakumar, Kalmanje

    2015-01-01

    The paper presents an over-parametrization free certainty equivalence state feedback backstepping adaptive control design method for systems of any relative degree with unmatched uncertainties and unknown virtual control coefficients. It uses a fast prediction model to estimate the unknown parameters, which is independent of the control design. It is shown that the system's input and output tracking errors can be systematically decreased by the proper choice of the design parameters. The benefits of the approach are demonstrated in numerical simulations.

  19. SharePoint 2013 for dummies

    CERN Document Server

    Withee, Ken

    2013-01-01

    The bestselling guide on running SharePoint, now updated to cover all the new features of SharePoint 2013 SharePoint Portal Server is an essential part of the enterprise infrastructure for many businesses. Building on the success of previous versions of SharePoint For Dummies, this new edition covers all the latest features of SharePoint 2013 and provides you with an easy-to-understand resource for making the most of all that this version has to offer. You'll learn how to get a site up and running, branded, and populated with content, workflow, and management. In addition, t

  20. To share or not to share? Expected pros and cons of data sharing in radiological research.

    Science.gov (United States)

    Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni

    2018-06-01

    The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.

  1. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  2. A point-value enhanced finite volume method based on approximate delta functions

    Science.gov (United States)

    Xuan, Li-Jun; Majdalani, Joseph

    2018-02-01

    We revisit the concept of an approximate delta function (ADF), introduced by Huynh (2011) [1], in the form of a finite-order polynomial that holds identical integral properties to the Dirac delta function when used in conjunction with a finite-order polynomial integrand over a finite domain. We show that the use of generic ADF polynomials can be effective at recovering and generalizing several high-order methods, including Taylor-based and nodal-based Discontinuous Galerkin methods, as well as the Correction Procedure via Reconstruction. Based on the ADF concept, we then proceed to formulate a Point-value enhanced Finite Volume (PFV) method, which stores and updates the cell-averaged values inside each element as well as the unknown quantities and, if needed, their derivatives on nodal points. The sharing of nodal information with surrounding elements saves the number of degrees of freedom compared to other compact methods at the same order. To ensure conservation, cell-averaged values are updated using an identical approach to that adopted in the finite volume method. Here, the updating of nodal values and their derivatives is achieved through an ADF concept that leverages all of the elements within the domain of integration that share the same nodal point. The resulting scheme is shown to be very stable at successively increasing orders. Both accuracy and stability of the PFV method are verified using a Fourier analysis and through applications to the linear wave and nonlinear Burgers' equations in one-dimensional space.

  3. Estimating a Smooth Common Transfer Function with a Panel of Time Series - Inflow of Larvae Cod as an Example

    Directory of Open Access Journals (Sweden)

    Elizabeth Hansen

    2012-07-01

    Full Text Available Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} The annual response variable in an ecological monitoring study often relates linearly to the weighted cumulative effect of some daily covariate, after adjusting for other annual covariates. Here we consider the problem of non-parametrically estimating the weights involved in computing the aforementioned cumulative effect, with a panel of short and contemporaneously correlated time series whose responses share the common cumulative effect of a daily covariate. The sequence of (unknown daily weights constitutes the so-called transfer function. Specifically, we consider the problem of estimating a smooth common transfer function shared by a panel of short time series that are contemporaneously correlated. We propose an estimation scheme using a likelihood approach that penalizes the roughness of the common transfer function. We illustrate the proposed method with a simulation study and a biological example of indirectly estimating the spawning date distribution of North Sea cod.

  4. SharePoint 2010 Six-in-One

    CERN Document Server

    Geier, Chris; Bertram, Becky

    2011-01-01

    A team of SharePoint authorities addresses the six most essential areas of SharePoint 2010. SharePoint enables Web sites to host shared workspaces and is a leading solution for Enterprise Content Management. This book serves as one-stop shopping for concise coverage on six key areas that you need to know in order to get up and running with SharePoint 2010 quickly. After an introduction to the new features of SharePoint 2010, the author team of SharePoint experts walk you through branding and customization, workflow, business connectivity services, social networking and tools, the search functi

  5. Extraocular muscle function testing

    Science.gov (United States)

    ... medlineplus.gov/ency/article/003397.htm Extraocular muscle function testing To use the sharing features on this page, please enable JavaScript. Extraocular muscle function testing examines the function of the eye muscles. ...

  6. Speeding up transmissions of unknown quantum information along Ising-type quantum channels

    International Nuclear Information System (INIS)

    Guo W J; Wei L F

    2017-01-01

    Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearest-neighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the distant receiver. In this paper, by simplifying the usual SWAP gates we propose an approach to speed up the transmissions of unknown quantum information, specifically including the single-qubit unknown state and two-qubit unknown entangled ones, by a series of entangling and disentangling operations between the remote qubits with distant interactions. The generic proposal is demonstrated specifically with experimentally-existing Ising-type quantum channels without transverse interaction; liquid NMR-molecules driven by global radio frequency electromagnetic pulses and capacitively-coupled Josephson circuits driven by local microwave pulses. The proposal should be particularly useful to set up the connections between the distant qubits in a chip of quantum computing. (paper)

  7. Robust Control for the Segway with Unknown Control Coefficient and Model Uncertainties

    Directory of Open Access Journals (Sweden)

    Byung Woo Kim

    2016-06-01

    Full Text Available The Segway, which is a popular vehicle nowadays, is an uncertain nonlinear system and has an unknown time-varying control coefficient. Thus, we should consider the unknown time-varying control coefficient and model uncertainties to design the controller. Motivated by this observation, we propose a robust control for the Segway with unknown control coefficient and model uncertainties. To deal with the time-varying unknown control coefficient, we employ the Nussbaum gain technique. We introduce an auxiliary variable to solve the underactuated problem. Due to the prescribed performance control technique, the proposed controller does not require the adaptive technique, neural network, and fuzzy logic to compensate the uncertainties. Therefore, it can be simple. From the Lyapunov stability theory, we prove that all signals in the closed-loop system are bounded. Finally, we provide the simulation results to demonstrate the effectiveness of the proposed control scheme.

  8. How to share inspection practices internationally?

    International Nuclear Information System (INIS)

    Zerger, B.

    2009-01-01

    ASN strives to share practices with its foreign counterparts in order to develop and adopt best practice worldwide. With regard to inspection practices, the exchanges are made with AEN, in particular within the context of the Working Group on Inspection Practices (WGIP). As well as being very rewarding, the exchanges sometimes come up against marked differences in terms of inspection organisation and even in the meaning given to the inspections. The WGIP endeavors, however, to make inspection practice recommendations that are as functional and feasible as possible. (author)

  9. Thymidine kinases share a conserved function for nucleotide salvage and play an essential role in Arabidopsis thaliana growth and development.

    Science.gov (United States)

    Xu, Jing; Zhang, Lin; Yang, Dong-Lei; Li, Qun; He, Zuhua

    2015-12-01

    Thymidine kinases (TKs) are important components in the nucleotide salvage pathway. However, knowledge about plant TKs is quite limited. In this study, the molecular function of TKs in Arabidopsis thaliana was investigated. Two TKs were identified and named AtTK1 and AtTK2. Expression of both genes was ubiquitous, but AtTK1 was strongly expressed in high-proliferation tissues. AtTK1 was localized to the cytosol, whereas AtTK2 was localized to the mitochondria. Mutant analysis indicated that the two genes function coordinately to sustain normal plant development. Enzymatic assays showed that the two TK proteins shared similar catalytic specificity for pyrimidine nucleosides. They were able to complement an Escherichia coli strain lacking TK activity. 5'-Fluorodeoxyuridine (FdU) resistance and 5-ethynyl 2'-deoxyuridine (EdU) incorporation assays confirmed their activity in vivo. Furthermore, the tk mutant phenotype could be alleviated by nucleotide feeding, establishing that the biosynthesis of pyrimidine nucleotides was disrupted by the TK deficiency. Finally, both human and rice (Oryza sativa) TKs were able to rescue the tk mutants, demonstrating the functional conservation of TKs across organisms. Taken together, our findings clarify the specialized function of two TKs in A. thaliana and establish that the salvage pathway mediated by the kinases is essential for plant growth and development. © 2015 Institute of Plant Physiology and Ecology, SIBS, CAS New Phytologist © 2015 New Phytologist Trust.

  10. SharePoint User's Guide

    CERN Document Server

    Corporation, Infusion Development

    2009-01-01

    This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.

  11. Instant Social Ride-Sharing

    OpenAIRE

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben

    2008-01-01

    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  12. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  13. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  14. Identification of fractional-order systems with unknown initial values and structure

    Energy Technology Data Exchange (ETDEWEB)

    Du, Wei, E-mail: duwei0203@gmail.com [Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai 200237 (China); Miao, Qingying, E-mail: qymiao@sjtu.edu.cn [School of Continuing Education, Shanghai Jiao Tong University, Shanghai 200030 (China); Tong, Le, E-mail: tongle0328@gmail.com [Faculty of Applied Science and Textiles, The Hong Kong Polytechnic University, Hong Kong (China); Tang, Yang [Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai 200237 (China)

    2017-06-21

    In this paper, the identification problem of fractional-order chaotic systems is proposed and investigated via an evolutionary optimization approach. Different with other studies to date, this research focuses on the identification of fractional-order chaotic systems with not only unknown orders and parameters, but also unknown initial values and structure. A group of fractional-order chaotic systems, i.e., Lorenz, Lü, Chen, Rössler, Arneodo and Volta chaotic systems, are set as the system candidate pool. The identification problem of fractional-order chaotic systems in this research belongs to mixed integer nonlinear optimization in essence. A powerful evolutionary algorithm called composite differential evolution (CoDE) is introduced for the identification problem presented in this paper. Extensive experiments are carried out to show that the fractional-order chaotic systems with unknown initial values and structure can be successfully identified by means of CoDE. - Highlights: • Unknown initial values and structure are introduced in the identification of fractional-order chaotic systems; • Only a series of output is utilized in the identification of fractional-order chaotic systems; • CoDE is used for the identification problem and the results are satisfactory when compared with other DE variants.

  15. Optimization and Control for Sharing of the ITER Vacuum Vessel Support Force

    International Nuclear Information System (INIS)

    Rozov, V.

    2006-01-01

    The ITER Vacuum Vessel (VV) is a complex body supported in 9 points below lower ports by restraints in the radial, toroidal and vertical directions. The applied load produces a combination of reaction forces, which must be consistent with the design of the supported object. A reasonable sharing of the load among the supports is important for overall performance of the structure and helps to avoid excessive stress at the joints between the VV and lower ports. Optimization has been performed of the sharing of the total horizontal load applied to the ITER VV between radial and toroidal restraints. An effective method of finding simple parametric relationships between the design parameters of supports and the balance of the reaction forces has been developed. This allows purely analytical prediction of the sharing of the reaction forces for any desired stiffness of the applied restraints with no need for finite element structural analysis, and also allows control of the sharing by a proper selection of parameters of the supports. The method is based on the use of elementary mono-directional schemes - equivalent oscillators built for the main global modes, in static problems. The types of schemes and parameters of their members, related to the a-priori unknown stiffness of the VV structure under the supports, are found from consideration of the free vibration problem for the object using a 3D model of the VV with mass simulators - a series of simple eigenvalue analyses with variation of stiffness of the external restraints, that demands quite moderate computational resources. The equivalent schemes for the main modes not only enable simple one-line analytical calculation of the natural frequencies at any desired stiffness of the supports, but also indicate the contributions and balance of stiffness, to be considered in the static problem. The results of assessments of the reaction forces by direct static structural analyses for several cases are in agreement with values

  16. Multidimensional procurement auctions with unknown weights

    DEFF Research Database (Denmark)

    Greve, Thomas

    This paper studies the consequences of holding a procurement auction when the principal chooses not to show its preferences. My paper extends the procurement auction model of Che (1993) to a situation where both the principal and the agents have private information. Thus, unknown parameters of bo...... gives rise to an analysis of a principal that can not fully commit to the outcome induced by the scoring rule. Therefore, my result apply to contract theory and it’s problems with imperfect commitment....

  17. Shared Authentic Leadership in Research Teams: Testing a Multiple Mediation Model

    NARCIS (Netherlands)

    Günter, Hannes; Gardner, William L.; Davis McCauley, Kelly; Randolph-Seng, Brandon; P. Prahbu, Veena

    2017-01-01

    Research teams face complex leadership and coordination challenges. We propose shared authentic leadership (SAL) as a timely approach to addressing these challenges. Drawing from authentic and functional leadership theories, we posit a multiple mediation model that suggests three mechanisms whereby

  18. A GPS-Based Control Framework for Accurate Current Sharing and Power Quality Improvement in Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Savaghebi, Mehdi; Lu, Dylan

    2017-01-01

    This paper proposes a novel hierarchical control strategy for improvement of load sharing and power quality in ac microgrids. This control framework is composed of a droop based controller at the primary level, and a combination of distributed power sharing and voltage conditioning schemes...... consensus protocol to ensure proportional sharing of average power. The voltage conditioning scheme produces compensation signals at fundamental and dominant harmonics to improve the voltage quality at a sensitive load bus. Experimental results are presented to validate the efficacy of the proposed method....... dynamic response. The droop coefficient, which acts as a virtual resistance is adaptively changed as a function of the peak current. This strategy not only simplifies the control design but also improves the current sharing accuracy at high loading conditions. The distributed power sharing scheme uses...

  19. DeID – A Data Sharing Tool for Neuroimaging Studies

    Directory of Open Access Journals (Sweden)

    Xuebo eSong

    2015-09-01

    Full Text Available Funding institutions and researchers increasingly expect that data will be shared to increase scientific integrity and provide other scientists with the opportunity to use the data with novel methods that may advance understanding in a particular field of study. In practice, sharing human subject data can be complicated because data must be de-identified prior to sharing. Moreover, integrating varied data types collected in a study can be challenging and time consuming. For example, sharing data from structural imaging studies of a complex disorder requires the integration of imaging, demographic and/or behavioral data in a way that no subject identifiers are included in the de-identified dataset and with new subject labels or identification values that cannot be tracked back to the original ones. We have developed a Java program that users can use to remove identifying information in neuroimaging datasets, while still maintaining the association among different data types from the same subject for further studies. This software provides a series of user interaction wizards to allow users to select data variables to be de-identified, implements functions for auditing and validation of de-identified data, and enables the user to share the de-identified data in a single compressed package through various communication protocols, such as FTPS and SFTP. DeID runs with Windows, Linux, and Mac operating systems and its open architecture allows it to be easily adapted to support a broader array of data types, with the goal of facilitating data sharing. DeID can be obtained at http://www.nitrc.org/projects/deid.

  20. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Science.gov (United States)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  1. BBSRC Data Sharing Policy

    OpenAIRE

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  2. Digital music and subculture: Sharing files, sharing styles (originally published in February 2004)

    OpenAIRE

    Ebare, Sean

    2005-01-01

    Digital music and subculture: Sharing files, sharing styles by Sean Ebare In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around iss...

  3. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  4. Image Sharing in Radiology-A Primer.

    Science.gov (United States)

    Chatterjee, Arindam R; Stalcup, Seth; Sharma, Arjun; Sato, T Shawn; Gupta, Pushpender; Lee, Yueh Z; Malone, Christopher; McBee, Morgan; Hotaling, Elise L; Kansagra, Akash P

    2017-03-01

    By virtue of its information technology-oriented infrastructure, the specialty of radiology is uniquely positioned to be at the forefront of efforts to promote data sharing across the healthcare enterprise, including particularly image sharing. The potential benefits of image sharing for clinical, research, and educational applications in radiology are immense. In this work, our group-the Association of University Radiologists (AUR) Radiology Research Alliance Task Force on Image Sharing-reviews the benefits of implementing image sharing capability, introduces current image sharing platforms and details their unique requirements, and presents emerging platforms that may see greater adoption in the future. By understanding this complex ecosystem of image sharing solutions, radiologists can become important advocates for the successful implementation of these powerful image sharing resources. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  5. Clostridium difficile: A healthcare-associated infection of unknown ...

    African Journals Online (AJOL)

    Clostridium difficile: A healthcare-associated infection of unknown significance in adults in sub-Saharan Africa. ... Abstract. Background: Clostridium difficile infection (CDI) causes a high burden of disease in high-resource healthcare systems, with significant morbidity, mortality, and financial implications. CDI is a ...

  6. Severe scratcher-reaction: an unknown health hazard?

    Directory of Open Access Journals (Sweden)

    Carsten Sauer Mikkelsen

    2015-03-01

    Full Text Available Tattoos are well known to cause skin problems and the number of reported adverse reactions after tattooing has increased. Illegally imported tattoo ink is unrestrained and can contain unknown ingredients and contamination thereby posing a serious health hazard. We present a case illustrating the risk of pronounced phototoxic allergic reaction and other severe complications after using home kit tattoo ink.

  7. Designing for Sharing in Local Communities

    DEFF Research Database (Denmark)

    Malmborg, Lone; Light, Ann; Fitzpatrick, Geraldine

    2015-01-01

    The Sharing Economy has brought new attention to the everyday practice of sharing. Digital tools are changing both what we can do together across neighbourhoods and how we think about sharing our time, materials and skills. It is possible to design to boost resource management, economic wellbeing...... and social resilience by fostering sharing practices, but do different designs speak to different priorities in design for sharing?...

  8. Models of Postural Control: Shared Variance in Joint and COM Motions.

    Directory of Open Access Journals (Sweden)

    Melissa C Kilby

    Full Text Available This paper investigated the organization of the postural control system in human upright stance. To this aim the shared variance between joint and 3D total body center of mass (COM motions was analyzed using multivariate canonical correlation analysis (CCA. The CCA was performed as a function of established models of postural control that varied in their joint degrees of freedom (DOF, namely, an inverted pendulum ankle model (2DOF, ankle-hip model (4DOF, ankle-knee-hip model (5DOF, and ankle-knee-hip-neck model (7DOF. Healthy young adults performed various postural tasks (two-leg and one-leg quiet stances, voluntary AP and ML sway on a foam and rigid surface of support. Based on CCA model selection procedures, the amount of shared variance between joint and 3D COM motions and the cross-loading patterns we provide direct evidence of the contribution of multi-DOF postural control mechanisms to human balance. The direct model fitting of CCA showed that incrementing the DOFs in the model through to 7DOF was associated with progressively enhanced shared variance with COM motion. In the 7DOF model, the first canonical function revealed more active involvement of all joints during more challenging one leg stances and dynamic posture tasks. Furthermore, the shared variance was enhanced during the dynamic posture conditions, consistent with a reduction of dimension. This set of outcomes shows directly the degeneracy of multivariate joint regulation in postural control that is influenced by stance and surface of support conditions.

  9. Universal algorithm of time sharing

    International Nuclear Information System (INIS)

    Silin, I.N.; Fedyun'kin, E.D.

    1979-01-01

    Timesharing system algorithm is proposed for the wide class of one- and multiprocessor computer configurations. Dynamical priority is the piece constant function of the channel characteristic and system time quantum. The interactive job quantum has variable length. Characteristic recurrent formula is received. The concept of the background job is introduced. Background job loads processor if high priority jobs are inactive. Background quality function is given on the base of the statistical data received in the timesharing process. Algorithm includes optimal trashing off procedure for the jobs replacements in the memory. Sharing of the system time in proportion to the external priorities is guaranteed for the all active enough computing channels (back-ground too). The fast answer is guaranteed for the interactive jobs, which use small time and memory. The external priority control is saved for the high level scheduler. The experience of the algorithm realization on the BESM-6 computer in JINR is discussed

  10. Functional Outcome and Healing of Large and Massive Rotator Cuff Tears Repaired With a Load-Sharing Rip-Stop Construct.

    Science.gov (United States)

    Noyes, Matthew P; Ladermann, Alexandre; Denard, Patrick J

    2017-09-01

    To prospectively review functional outcomes and healing rates of large and massive rotator cuff tears repaired with a load-sharing rip-stop (LSRS) technique. Twenty-one consecutive patients underwent arthroscopic rotator cuff repair with an LSRS construct between January and December 2014. Seventeen patients with a minimum of 2 years' follow-up were included. Four patients did not complete clinical evaluations and functional outcome scores at a minimum of 2 years' follow-up and were lost to follow-up. Ultrasound imaging was used to assess for rotator cuff healing at a minimum of 6 months postoperatively. Range of motion, strength, and functional outcome scores were evaluated at final follow-up. Mean active forward elevation improved from 109° preoperatively to 153° postoperatively, and mean supraspinatus strength improved by 1 strength grade, from 3.5 preoperatively to 4.4 postoperatively. When we compared preoperative and postoperative values, the American Shoulder and Elbow Surgeons score improved from 40.8 to 89.5, the Single Assessment Numeric Evaluation score improved from 32.8 to 83.1, the Simple Shoulder Test score improved from 3.8 to 10.3, and the pain score on a visual analog scale decreased from 4.8 to 0.8 (P rotator cuff tears. This construct may be an alternative for tears not amenable to double-row repair. Level IV, therapeutic case series. Copyright © 2017 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  11. Previously unknown species of Aspergillus.

    Science.gov (United States)

    Gautier, M; Normand, A-C; Ranque, S

    2016-08-01

    The use of multi-locus DNA sequence analysis has led to the description of previously unknown 'cryptic' Aspergillus species, whereas classical morphology-based identification of Aspergillus remains limited to the section or species-complex level. The current literature highlights two main features concerning these 'cryptic' Aspergillus species. First, the prevalence of such species in clinical samples is relatively high compared with emergent filamentous fungal taxa such as Mucorales, Scedosporium or Fusarium. Second, it is clearly important to identify these species in the clinical laboratory because of the high frequency of antifungal drug-resistant isolates of such Aspergillus species. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry (MALDI-TOF MS) has recently been shown to enable the identification of filamentous fungi with an accuracy similar to that of DNA sequence-based methods. As MALDI-TOF MS is well suited to the routine clinical laboratory workflow, it facilitates the identification of these 'cryptic' Aspergillus species at the routine mycology bench. The rapid establishment of enhanced filamentous fungi identification facilities will lead to a better understanding of the epidemiology and clinical importance of these emerging Aspergillus species. Based on routine MALDI-TOF MS-based identification results, we provide original insights into the key interpretation issues of a positive Aspergillus culture from a clinical sample. Which ubiquitous species that are frequently isolated from air samples are rarely involved in human invasive disease? Can both the species and the type of biological sample indicate Aspergillus carriage, colonization or infection in a patient? Highly accurate routine filamentous fungi identification is central to enhance the understanding of these previously unknown Aspergillus species, with a vital impact on further improved patient care. Copyright © 2016 European Society of Clinical Microbiology and

  12. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  13. ASPECTS REGARDING THE SHARE TRANSFER

    Directory of Open Access Journals (Sweden)

    Cristina Cojocaru

    2015-11-01

    Full Text Available Throughout its content, the memorandum of association, even in the case of a limited liability company, stipulates the contribution of each shareholder to the share capital while the share capital is divided into shares, corresponding to the contribution of each shareholder to the share capital. The limited liability company is established in consideration of the people who set it up and as such, the share transfer is subject to certain conditions provided by law. Therefore, the law sets out strict conditions for share transfer in the case the transfer is done to one or more shareholders, but especially if the transfer is done to people outside the company, or following the inheritance. If the transfer is done to a shareholder, such is possible provided that this transfer has not been prohibited by the act of incorporation itself. Instead, the transfer to people outside the company cannot be done without the cons ent of shareholders representing at least three quarters of the capital. In case of share transfer by succession, the law allows it provided that this transfer is permitted within the memorandum of association .

  14. Row Reduced Echelon Form for Solving Fully Fuzzy System with Unknown Coefficients

    Directory of Open Access Journals (Sweden)

    Ghassan Malkawi

    2014-08-01

    Full Text Available This study proposes a new method for finding a feasible fuzzy solution in positive Fully Fuzzy Linear System (FFLS, where the coefficients are unknown. The fully fuzzy system is transferred to linear system in order to obtain the solution using row reduced echelon form, thereafter; the crisp solution is restricted in obtaining the positive fuzzy solution. The fuzzy solution of FFLS is included crisp intervals, to assign alternative values of unknown entries of fuzzy numbers. To illustrate the proposed method, numerical examples are solved, where the entries of coefficients are unknown in right or left hand side, to demonstrate the contributions in this study.

  15. Vision-based autonomous grasping of unknown piled objects

    International Nuclear Information System (INIS)

    Johnson, R.K.

    1994-01-01

    Computer vision techniques have been used to develop a vision-based grasping capability for autonomously picking and placing unknown piled objects. This work is currently being applied to the problem of hazardous waste sorting in support of the Department of Energy's Mixed Waste Operations Program

  16. An Effective Assessment of Knowledge Sharing and E-Learning Portals

    Science.gov (United States)

    Subramanian, D. Venkata; Geetha, Angelina; Shankar, P.

    2015-01-01

    In recent years, most of the companies have increasingly realized the importance of the knowledge sharing portal and E-Learning portals to provide competitive knowledge for their employees. The knowledge stored in these portals varies from technical, process and project knowledge functional or domain specific knowledge to face the competitiveness…

  17. 48 CFR 52.222-49 - Service Contract Act-Place of Performance Unknown.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Service Contract Act-Place... Provisions and Clauses 52.222-49 Service Contract Act—Place of Performance Unknown. As prescribed in 22.1006(f), insert the following clause: Service Contract Act—Place of Performance Unknown (MAY 1989) (a...

  18. School Nurses Share a Job.

    Science.gov (United States)

    Merwin, Elizabeth G.; Voss, Sondra

    1981-01-01

    Job sharing is a relatively new idea in which two or more people share the hours, the work, and the responsibilities of one job. Advantages and disadvantages to this situation are discussed in relation to the experiences of two nurses who shared a position as district nurse. (JN)

  19. Shared and unshared exposure measurement error in occupational cohort studies and their effects on statistical inference in proportional hazards models

    Science.gov (United States)

    Laurier, Dominique; Rage, Estelle

    2018-01-01

    Exposure measurement error represents one of the most important sources of uncertainty in epidemiology. When exposure uncertainty is not or only poorly accounted for, it can lead to biased risk estimates and a distortion of the shape of the exposure-response relationship. In occupational cohort studies, the time-dependent nature of exposure and changes in the method of exposure assessment may create complex error structures. When a method of group-level exposure assessment is used, individual worker practices and the imprecision of the instrument used to measure the average exposure for a group of workers may give rise to errors that are shared between workers, within workers or both. In contrast to unshared measurement error, the effects of shared errors remain largely unknown. Moreover, exposure uncertainty and magnitude of exposure are typically highest for the earliest years of exposure. We conduct a simulation study based on exposure data of the French cohort of uranium miners to compare the effects of shared and unshared exposure uncertainty on risk estimation and on the shape of the exposure-response curve in proportional hazards models. Our results indicate that uncertainty components shared within workers cause more bias in risk estimation and a more severe attenuation of the exposure-response relationship than unshared exposure uncertainty or exposure uncertainty shared between individuals. These findings underline the importance of careful characterisation and modeling of exposure uncertainty in observational studies. PMID:29408862

  20. Knowledge Sharing and National Culture

    DEFF Research Database (Denmark)

    Michailova, Snejina; Hutchings, Kate

    2004-01-01

    Much of the knowledge management literature tends to assume a rather universalistunderstanding of knowledge sharing. Yet, attitudes to knowledge sharing as well as actualknowledge-sharing behaviour depend on conditions that vary across institutional and culturalenvironments. This paper contributes...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...

  1. Improvement of multiprocessing performance by using optical centralized shared bus

    Science.gov (United States)

    Han, Xuliang; Chen, Ray T.

    2004-06-01

    With the ever-increasing need to solve larger and more complex problems, multiprocessing is attracting more and more research efforts. One of the challenges facing the multiprocessor designers is to fulfill in an effective manner the communications among the processes running in parallel on multiple multiprocessors. The conventional electrical backplane bus provides narrow bandwidth as restricted by the physical limitations of electrical interconnects. In the electrical domain, in order to operate at high frequency, the backplane topology has been changed from the simple shared bus to the complicated switched medium. However, the switched medium is an indirect network. It cannot support multicast/broadcast as effectively as the shared bus. Besides the additional latency of going through the intermediate switching nodes, signal routing introduces substantial delay and considerable system complexity. Alternatively, optics has been well known for its interconnect capability. Therefore, it has become imperative to investigate how to improve multiprocessing performance by utilizing optical interconnects. From the implementation standpoint, the existing optical technologies still cannot fulfill the intelligent functions that a switch fabric should provide as effectively as their electronic counterparts. Thus, an innovative optical technology that can provide sufficient bandwidth capacity, while at the same time, retaining the essential merits of the shared bus topology, is highly desirable for the multiprocessing performance improvement. In this paper, the optical centralized shared bus is proposed for use in the multiprocessing systems. This novel optical interconnect architecture not only utilizes the beneficial characteristics of optics, but also retains the desirable properties of the shared bus topology. Meanwhile, from the architecture standpoint, it fits well in the centralized shared-memory multiprocessing scheme. Therefore, a smooth migration with substantial

  2. Analysing lawyers’ attitude towards knowledge sharing

    Directory of Open Access Journals (Sweden)

    Wole M. Olatokun

    2012-09-01

    Method: A field survey of 273 lawyers was carried out, using questionnaire for data collection. Collected data on all variables were structured into grouped frequency distributions. Principal Component Factor Analysis was applied to reduce the constructs and Simple Regression was applied to test the hypotheses. These were tested at 0.05% level of significance. Results: Results showed that expected associations and contributions were the major determinants of lawyers’ attitudes towards knowledge sharing. Expected reward was not significantly related to lawyers’ attitudes towards knowledge sharing. A positive attitude towards knowledge sharing was found to lead to a positive intention to share knowledge, although a positive intention to share knowledge did not significantly predict a positive knowledge sharing behaviour. The level of Information Technology (IT usage was also found to significantly affect the knowledge sharing behaviour of lawyers’. Conclusion: It was recommended that law firms in the study area should deploy more IT infrastructure and services that encourage effective knowledge sharing amongst lawyers.

  3. Carcinoma of Unknown Primary Treatment (PDQ®)—Patient Version

    Science.gov (United States)

    Carcinoma of unknown primary (CUP), treatment can include surgery, radiation therapy, chemotherapy, or hormone therapy. Get detailed information about the diagnosis and treatment of CUP in this expert-reviewed summary.

  4. Cooperative Data Sharing: Simple Support for Clusters of SMP Nodes

    Science.gov (United States)

    DiNucci, David C.; Balley, David H. (Technical Monitor)

    1997-01-01

    can add overhead to some DSM systems, and does not require an SPMD programming model. unlike some message-passing interfaces, CDS allows the user to implement efficient demand-driven applications where processes must "fight" over data, and does not perform copying if processes share memory and do not attempt concurrent writes. CDS also supports heterogeneous computing, dynamic process creation, handlers, and a very simple thread-arbitration mechanism. Additional support for array subsections is currently being considered. The CDS1 API, which forms the kernel of CDS, is built primarily upon only 2 communication primitives, one process initiation primitive, and some data translation (and marshalling) routines, memory allocation routines, and priority control routines. The entire current collection of 28 routines provides enough functionality to implement most (or all) of MPI 1 and 2, which has a much larger interface consisting of hundreds of routines. still, the API is small enough to consider integrating into standard os interfaces for handling inter-process communication in a network-independent way. This approach would also help to solve many of the problems plaguing other higher-level standards such as MPI and PVM which must, in some cases, "play OS" to adequately address progress and process control issues. The CDS2 API, a higher level of interface roughly equivalent in functionality to MPI and to be built entirely upon CDS1, is still being designed. It is intended to add support for the equivalent of communicators, reduction and other collective operations, process topologies, additional support for process creation, and some automatic memory management. CDS2 will not exactly match MPI, because the copy-free semantics of communication from CDS1 will be supported. CDS2 application programs will be free to carefully also use CDS1. CDS1 has been implemented on networks of workstations running unmodified Unix-based operating systems, using UDP/IP and vendor

  5. Melanoma of unknown origin: a case series.

    LENUS (Irish Health Repository)

    Kelly, J

    2010-12-01

    The natural history of metastatic melanoma involving lymph nodes, in the absence of a known primary site (cutaneous, ocular or mucosal) has, to date, been poorly defined; and the optimal management of this rare subtype of disease is therefore unclear. Melanomas of unknown primary site (MUP) are estimated to comprise between 3.7 and 6% of all melanomas (Anbari et al. in Cancer 79:1861-1821, 1997).

  6. Financial Impact of Liver Sharing and Organ Procurement Organizations' Experience With Share 35: Implications for National Broader Sharing.

    Science.gov (United States)

    Fernandez, H; Weber, J; Barnes, K; Wright, L; Levy, M

    2016-01-01

    The Share 35 policy for organ allocation, which was adopted in June 2013, allocates livers regionally for candidates with Model for End-Stage Liver Disease scores of 35 or greater. The authors analyzed the costs resulting from the increased movement of allografts related to this new policy. Using a sample of nine organ procurement organizations, representing 17% of the US population and 19% of the deceased donors in 2013, data were obtained on import and export costs before Share 35 implementation (June 15, 2012, to June 14, 2013) and after Share 35 implementation (June 15, 2013, to June 14, 2014). Results showed that liver import rates increased 42%, with an increased cost of 51%, while export rates increased 112%, with an increased cost of 127%. When the costs of importing and exporting allografts were combined, the total change in costs for all nine organ procurement organizations was $11 011 321 after Share 35 implementation. Extrapolating these costs nationally resulted in an increased yearly cost of $68 820 756 by population or $55 056 605 by number of organ donors. Any alternative allocation proposal needs to account for the financial implications to the transplant infrastructure. © Copyright 2015 The American Society of Transplantation and the American Society of Transplant Surgeons.

  7. Prediction and Assignment of Function for a Divergent N-succinyl Amino Acid Racemase

    Energy Technology Data Exchange (ETDEWEB)

    Song,L.; Kalyanaraman, C.; Fedorov, A.; Fedorov, E.; Glasner, M.; Brown, S.; Imker, H.; Babbitt, P.; Almo, S.; et al.

    2007-01-01

    The protein databases contain many proteins with unknown function. A computational approach for predicting ligand specificity that requires only the sequence of the unknown protein would be valuable for directing experiment-based assignment of function. We focused on a family of unknown proteins in the mechanistically diverse enolase superfamily and used two approaches to assign function: (i) enzymatic assays using libraries of potential substrates, and (ii) in silico docking of the same libraries using a homology model based on the most similar (35% sequence identity) characterized protein. The results matched closely; an experimentally determined structure confirmed the predicted structure of the substrate-liganded complex. We assigned the N-succinyl arginine/lysine racemase function to the family, correcting the annotation (L-Ala-D/L-Glu epimerase) based on the function of the most similar characterized homolog. These studies establish that ligand docking to a homology model can facilitate functional assignment of unknown proteins by restricting the identities of the possible substrates that must be experimentally tested.

  8. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  9. Beginning SharePoint 2010 Development

    CERN Document Server

    Fox, Steve

    2010-01-01

    Discover how to take advantage of the many new features in SharePoint 2010. SharePoint provides content management (enterprise content management, Web content management, records management, and more), workflow, and social media features, and the new version boasts enhanced capabilities. This introductory-level book walks you through the process of learning, developing, and deploying SharePoint 2010 solutions. You'll leverage your existing skills and tools to grasp the fundamental programming concepts and practices of SharePoint 2010. The author clearly explains how to develop your first appli

  10. Governing Individual Knowledge Sharing Behavior

    DEFF Research Database (Denmark)

    Minbaeva, Dana; Pedersen, Torben

    2010-01-01

    The emerging Knowledge Governance Approach asserts the need to build microfoundations grounded in individual action. Toward this goal, using the Theory of Planned Behavior, we aim to explain individual knowledge sharing behavior as being determined by the intention to share knowledge and its...... antecedents: attitude toward knowledge sharing, subjective norms, and perceived behavioral control. In addition, we consider managerial interventions (governance mechanisms) that managers can employ to influence the identified antecedents and thereby govern individual knowledge sharing behavior. We test...... a positive effect on subjective norms and perceived behavioral control, respectively....

  11. Interaction between asthma and lung function growth in early life

    DEFF Research Database (Denmark)

    Bisgaard, Hans; Jensen, Signe Marie; Bønnelykke, Klaus

    2012-01-01

    The causal direction between asthma and lung function deficit is unknown, but important for the focus of preventive measures and research into the origins of asthma.......The causal direction between asthma and lung function deficit is unknown, but important for the focus of preventive measures and research into the origins of asthma....

  12. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  13. Atmospheric turbulence profiling with unknown power spectral density

    Science.gov (United States)

    Helin, Tapio; Kindermann, Stefan; Lehtonen, Jonatan; Ramlau, Ronny

    2018-04-01

    Adaptive optics (AO) is a technology in modern ground-based optical telescopes to compensate for the wavefront distortions caused by atmospheric turbulence. One method that allows to retrieve information about the atmosphere from telescope data is so-called SLODAR, where the atmospheric turbulence profile is estimated based on correlation data of Shack-Hartmann wavefront measurements. This approach relies on a layered Kolmogorov turbulence model. In this article, we propose a novel extension of the SLODAR concept by including a general non-Kolmogorov turbulence layer close to the ground with an unknown power spectral density. We prove that the joint estimation problem of the turbulence profile above ground simultaneously with the unknown power spectral density at the ground is ill-posed and propose three numerical reconstruction methods. We demonstrate by numerical simulations that our methods lead to substantial improvements in the turbulence profile reconstruction compared to the standard SLODAR-type approach. Also, our methods can accurately locate local perturbations in non-Kolmogorov power spectral densities.

  14. Shared vs. Primary Epistemic Authority in Jaminjung/Ngaliwurru

    Directory of Open Access Journals (Sweden)

    Schultze-Berndt Eva

    2017-10-01

    Full Text Available This paper contributes to the typology of complex perspective markers by presenting an in-depth analysis of a system of epistemic authority marking which functionally overlaps with, but has no exact parallels in, similar systems attested cross-linguistically; it is also the first analysis of grammaticalised marking of epistemic authority in a language of Australia. Jaminjung/Ngaliwurru, a language of the Mirndi family, distinguishes between primary and shared epistemic authority by means of two non-obligatory clitics. By employing the first clitic, speakers claim privileged (asymmetrical access to evidence informing their utterance; the holder of epistemic primacy shifts to addressees in questions. The second marker, which is transparently related to a 1st+2nd person minimal pronoun, indicates shared (symmetrical epistemic access, but is further constrained in its distribution in that the evidence has to be accessible at the time of discourse and in that the encoded situation itself is not yet part of the common ground. In the light of the proposed analysis as well as cross-linguistic findings, it will be argued that epistemic authority markers more generally can be considered as part of a single functional domain with evidentials, and that this domain also includes egophoricity.

  15. SharePoint 2007 Collaboration For Dummies

    CERN Document Server

    Harvey, Greg

    2009-01-01

    If you're looking for a way to help your teams access what they need to know, work together, and get the job done, SharePoint can do just that. SharePoint 2007 Collaboration For Dummies shows you the easiest way to set up and customize SharePoint, manage your data, interact using SharePoint blogs and wikis, integrate Office programs, and make your office more productive. You'll learn what SharePoint can do and how to make it work for your business, understand the technical terms, and enable your people to collaborate on documents and spreadsheets. You'll even discover how to get SharePoint hel

  16. Understanding shared services (Article 1 of 3

    Directory of Open Access Journals (Sweden)

    T. N. Van der Linde

    2006-12-01

    Full Text Available Purpose: Shared services is a viable business model that can be used by organisations to reduce costs and enhance efficiency and effectiveness in the organisation. The purpose of this trilogy of articles is to introduce shared services as a business model, and how to efficiently and effectively manage a shared services business unit. The purpose of the first article in the trilogy, introduces shared services as a business model, defines what shared services is, the transformation required to successfully implement a shared services business model, as well as the benefits that can be derived from implementing a shared services business model. Methodology: A comprehensive literature study was conducted in order to: - Define and describe shared services as a business model, - Compare shared services with centralisation and de-centralisation, - Determine and describe the transformation required to successfully implement shared services. Findings: In the article, a framework is generated to help organisations understand the business concept of shared services. This work has further potential: when applied correctly, there are both tangible and intangible benefits that can be accrued above cost savings. Implications: The findings of this article are important for organisations that are in the process of implementing or have implemented shared services, as it will assist the organisation in determining if shared services is the correct business model for them to implement. Value: This article provides an understanding of shared services and the business environment required to successfully implement a shared services business model. Value created by a shared services business model is further enhanced once the organisation has embarked on the successful implementation of a shared services business model, which is the primary objective of the second article, Implementation and continuous evolution in shared services.

  17. The Complete Guide to Job Sharing.

    Science.gov (United States)

    Hohn, Marcia D.

    This booklet provides information on job sharing that resulted from the research and experience of the Merrimack Valley Job Sharing Project. An overview of the topic considers the need for job sharing, employer benefits, types of jobs shared, job division, benefits, employer costs and savings, financial considerations for job sharers, perspectives…

  18. Intravenous thrombolysis in ischemic stroke with unknown onset using CT perfusion.

    Science.gov (United States)

    Cortijo, E; García-Bermejo, P; Calleja, A I; Pérez-Fernández, S; Gómez, R; del Monte, J M; Reyes, J; Arenillas, J F

    2014-03-01

    Acute ischemic stroke patients with unclear onset time presenting >4.5 h from last-seen-normal (LSN) time are considered late patients and excluded from i.v. thrombolysis. We aimed to evaluate whether this subgroup of patients is different from patients presenting >4.5 h from a witnessed onset, in terms of eligibility and response to computed tomography perfusion (CTP)-guided i.v. thrombolysis. We prospectively studied consecutive acute non-lacunar middle cerebral artery (MCA) ischemic stroke patients presenting >4.5 h from LSN. All patients underwent multimodal CT and were considered eligible for i.v. thrombolysis according to CTP criteria. Two patient groups were established based on the knowledge of the stroke onset time. We compared the proportion of candidates suitable for intravenous thrombolysis between both groups, and their outcome after thrombolytic therapy. Among 147 MCA ischemic stroke patients presenting >4.5 h from LSN, stroke onset was witnessed in 74 and unknown in 73. Thirty-seven (50%) patients in the first group and 32 (44%) in the second met CTP criteria for thrombolysis (P = 0.7). Baseline variables were comparable between both groups with the exception of age, which was higher in the unclear onset group. The rates of early neurological improvement (54.1% vs 46.9%), 2-h MCA recanalization (43.5% vs 37%), symptomatic hemorrhagic transformation (3% vs 0%) and good 3-month functional outcome (62.2% vs 56.3%) did not differ significantly between both groups. Delayed stroke patients with unknown onset time were no different than patients >4.5 h regarding eligibility and response to CTP-based i.v. thrombolysis. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  19. Neurological Autoantibody Prevalence in Epilepsy of Unknown Etiology.

    Science.gov (United States)

    Dubey, Divyanshu; Alqallaf, Abdulradha; Hays, Ryan; Freeman, Matthew; Chen, Kevin; Ding, Kan; Agostini, Mark; Vernino, Steven

    2017-04-01

    Autoimmune epilepsy is an underrecognized condition, and its true incidence is unknown. Identifying patients with an underlying autoimmune origin is critical because these patients' condition may remain refractory to conventional antiseizure medications but may respond to immunotherapy. To determine the prevalence of neurological autoantibodies (Abs) among adult patients with epilepsy of unknown etiology. Consecutive patients presenting to neurology services with new-onset epilepsy or established epilepsy of unknown etiology were identified. Serum samples were tested for autoimmune encephalitis Abs as well as thyroperoxidase (TPO) and glutamic acid decarboxylase 65 (GAD65) Abs. An antibody prevalence in epilepsy (APE) score based on clinical characteristics was assigned prospectively. Data were collected from June 1, 2015, to June 1, 2016. Presence of neurological Abs. A score based on clinical characteristics was assigned to estimate the probability of seropositivity prior to antibody test results. Good seizure outcome was estimated on the basis of significant reduction of seizure frequency at the first follow-up or seizure freedom. Of the 127 patients (68 males and 59 females) enrolled in the study, 15 were subsequently excluded after identification of an alternative diagnosis. Serum Abs suggesting a potential autoimmune etiology were detected in 39 (34.8%) cases. More than 1 Ab was detected in 7 patients (6.3%): 3 (2.7%) had TPO-Ab and voltage-gated potassium channel complex (VGKCc) Ab, 2 (1.8%) had GAD65-Ab and VGKCc-Ab, 1 had TPO-Ab and GAD65-Ab, and 1 had anti-Hu Ab and GAD65-Ab. Thirty-two patients (28.6%) had a single Ab marker. Among 112 patients included in the study, 15 (13.4%) had TPO-Ab, 14 (12.5%) had GAD65-Ab, 12 (10.7%) had VGKCc (4 of whom were positive for leucine-rich glioma-inactivated protein 1 [LGI1] Ab), and 4 (3.6%) had N-methyl-D-aspartate receptor (NMDAR) Ab. Even after excluding TPO-Ab and low-titer GAD65-Ab, Abs strongly suggesting an

  20. Job Sharing in Education.

    Science.gov (United States)

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  1. SharePoint Server 2010 Enterprise Content Management

    CERN Document Server

    Kitta, Todd; Caplinger, Chris; Houberg, Russ

    2011-01-01

    SharePoint experts focus on SharePoint 2010 as a platform for Enterprise Content Management SharePoint allows all users in an organization to manage and share their content reliably and securely. If you're interested in building Web sites using the new capabilities of enterprise content management (ECM) in SharePoint 2010, then this book is for you. You'll discover how SharePoint 2010 spans rich document management, records management, business process management and web content management in a seamless way to manage and share content. The team of SharePoint experts discusses the ECM capabi

  2. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  3. Shared molecular pathways and gene networks for cardiovascular disease and type 2 diabetes mellitus in women across diverse ethnicities.

    Science.gov (United States)

    Chan, Kei Hang K; Huang, Yen-Tsung; Meng, Qingying; Wu, Chunyuan; Reiner, Alexander; Sobel, Eric M; Tinker, Lesley; Lusis, Aldons J; Yang, Xia; Liu, Simin

    2014-12-01

    Although cardiovascular disease (CVD) and type 2 diabetes mellitus (T2D) share many common risk factors, potential molecular mechanisms that may also be shared for these 2 disorders remain unknown. Using an integrative pathway and network analysis, we performed genome-wide association studies in 8155 blacks, 3494 Hispanic American, and 3697 Caucasian American women who participated in the national Women's Health Initiative single-nucleotide polymorphism (SNP) Health Association Resource and the Genomics and Randomized Trials Network. Eight top pathways and gene networks related to cardiomyopathy, calcium signaling, axon guidance, cell adhesion, and extracellular matrix seemed to be commonly shared between CVD and T2D across all 3 ethnic groups. We also identified ethnicity-specific pathways, such as cell cycle (specific for Hispanic American and Caucasian American) and tight junction (CVD and combined CVD and T2D in Hispanic American). In network analysis of gene-gene or protein-protein interactions, we identified key drivers that included COL1A1, COL3A1, and ELN in the shared pathways for both CVD and T2D. These key driver genes were cross-validated in multiple mouse models of diabetes mellitus and atherosclerosis. Our integrative analysis of American women of 3 ethnicities identified multiple shared biological pathways and key regulatory genes for the development of CVD and T2D. These prospective findings also support the notion that ethnicity-specific susceptibility genes and process are involved in the pathogenesis of CVD and T2D. © 2014 American Heart Association, Inc.

  4. The catalystic function of leadership in efficient group functioning ...

    African Journals Online (AJOL)

    The more efficient group leaders were found to be more competent and revealed a greater task orientation. Compared to the less efficient groups, the better functioning groups were characterised by a higher degree of shared leadership. The bigger involvement in leadership functions seems to increase the competence ...

  5. A test of conformal invariance: Correlation functions on a disk

    International Nuclear Information System (INIS)

    Badke, R.; Rittenberg, V.; Ruegg, H.

    1985-06-01

    Using conformal invariance one can derive the correlation functions of a disk from those in the half-plane. The correlation function in the half-plane is determined by the 'small' conformal invariance up to an unknown function of one variable. By measuring through the Monte Carlo method the correlation function for two different configurations, the unknown function can be eliminated and one obtains a test of conformal invariance. It is shown that the Ising and the three state Potts model pass the test for very small lattices. (orig.)

  6. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  7. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  8. Modeling of the time sharing for lecturers

    Directory of Open Access Journals (Sweden)

    E. Yu. Shakhova

    2017-01-01

    Full Text Available In the context of modernization of the Russian system of higher education, it is necessary to analyze the working time of the university lecturers, taking into account both basic job functions as the university lecturer, and others.The mathematical problem is presented for the optimal working time planning for the university lecturers. The review of the documents, native and foreign works on the study is made. Simulation conditions, based on analysis of the subject area, are defined. Models of optimal working time sharing of the university lecturers («the second half of the day» are developed and implemented in the system MathCAD. Optimal solutions have been obtained.Three problems have been solved:1 to find the optimal time sharing for «the second half of the day» in a certain position of the university lecturer;2 to find the optimal time sharing for «the second half of the day» for all positions of the university lecturers in view of the established model of the academic load differentiation;3 to find the volume value of the non-standardized part of time work in the department for the academic year, taking into account: the established model of an academic load differentiation, distribution of the Faculty number for the positions and the optimal time sharing «the second half of the day» for the university lecturers of the department.Examples are given of the analysis results. The practical application of the research: the developed models can be used when planning the working time of an individual professor in the preparation of the work plan of the university department for the academic year, as well as to conduct a comprehensive analysis of the administrative decisions in the development of local university regulations.

  9. Data sharing in international transboundary contexts: The Vietnamese perspective on data sharing in the Lower Mekong Basin

    Science.gov (United States)

    Thu, Hang Ngo; Wehn, Uta

    2016-05-01

    Transboundary data sharing is widely recognised as a necessary element in the successful handling of water-related climate change issues, as it is a means towards integrated water resources management (IWRM). However, in practice it is often a challenge to achieve it. The Mekong River Commission (MRC), an inter-governmental agency established by Cambodia, Lao PDR, Thailand and Vietnam, has adopted IWRM in its water strategy plan in order to properly manage the transboundary waters of the Mekong River. In this context, data sharing procedures were institutionalised and have been officially implemented by the four member countries since 2001. This paper uses a systematic approach to identify the extent of data sharing and the factors influencing the willingness of key individuals in the Vietnam National Mekong Committee and its Primary Custodians to share data. We find that the initial objectives of the Procedures for Data and Information Exchange and Sharing (PDIES) have not been fully achieved and, further, that Vietnam has much to gain and little to lose by engaging in data sharing in the MRC context. The primary motivation for data sharing stems from the desire to protect national benefits and to prevent upstream countries from overexploiting the shared water resources. However, data sharing is hindered by a lack of national regulations in the Vietnam context concerning data sharing between state agencies and outdated information management systems.

  10. 'An Arena for Sharing'

    DEFF Research Database (Denmark)

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  11. Beginning SharePoint Designer 2010

    CERN Document Server

    Windischman, Woodrow W; Rehmani, Asif

    2010-01-01

    Teaching Web designers, developers, and IT professionals how to use the new version of SharePoint Designer. Covering both the design and business applications of SharePoint Designer, this complete Wrox guide brings readers thoroughly up to speed on how to use SharePoint Designer in an enterprise. You'll learn to create and modify web pages, use CSS editing tools to modify themes, use Data View to create interactivity with SharePoint and other data, and much more. Coverage includes integration points with Visual Studio, Visio, and InfoPath.: Shows web designers, developers, and IT professionals

  12. Computational Approach to Annotating Variants of Unknown Significance in Clinical Next Generation Sequencing.

    Science.gov (United States)

    Schulz, Wade L; Tormey, Christopher A; Torres, Richard

    2015-01-01

    Next generation sequencing (NGS) has become a common technology in the clinical laboratory, particularly for the analysis of malignant neoplasms. However, most mutations identified by NGS are variants of unknown clinical significance (VOUS). Although the approach to define these variants differs by institution, software algorithms that predict variant effect on protein function may be used. However, these algorithms commonly generate conflicting results, potentially adding uncertainty to interpretation. In this review, we examine several computational tools used to predict whether a variant has clinical significance. In addition to describing the role of these tools in clinical diagnostics, we assess their efficacy in analyzing known pathogenic and benign variants in hematologic malignancies. Copyright© by the American Society for Clinical Pathology (ASCP).

  13. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  14. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  15. Co-altered functional networks and brain structure in unmedicated patients with bipolar and major depressive disorders.

    Science.gov (United States)

    He, Hao; Sui, Jing; Du, Yuhui; Yu, Qingbao; Lin, Dongdong; Drevets, Wayne C; Savitz, Jonathan B; Yang, Jian; Victor, Teresa A; Calhoun, Vince D

    2017-12-01

    Bipolar disorder (BD) and major depressive disorder (MDD) share similar clinical characteristics that often obscure the diagnostic distinctions between their depressive conditions. Both functional and structural brain abnormalities have been reported in these two disorders. However, the direct link between altered functioning and structure in these two diseases is unknown. To elucidate this relationship, we conducted a multimodal fusion analysis on the functional network connectivity (FNC) and gray matter density from MRI data from 13 BD, 40 MDD, and 33 matched healthy controls (HC). A data-driven fusion method called mCCA+jICA was used to identify the co-altered FNC and gray matter components. Comparing to HC, BD exhibited reduced gray matter density in the parietal and occipital cortices, which correlated with attenuated functional connectivity within sensory and motor networks, as well as hyper-connectivity in regions that are putatively engaged in cognitive control. In addition, lower gray matter density was found in MDD in the amygdala and cerebellum. High accuracy in discriminating across groups was also achieved by trained classification models, implying that features extracted from the fusion analysis hold the potential to ultimately serve as diagnostic biomarkers for mood disorders.

  16. Why share knowledge? The influence of ICT on the motivation for knowledge sharing

    NARCIS (Netherlands)

    Hendriks, P.H.J.

    1999-01-01

    Information and communication technology (ICT) can enhance knowledge sharing by lowering temporal and spatial barriers between knowledge workers, and improving access to information about knowledge. Looking at ICT for knowledge sharing in this light, however, has limited value, because it ignores

  17. Improving emergency management through shared information processing - considerations in Emergency Operations Center design

    International Nuclear Information System (INIS)

    DeBusk, R.E.; Walker, J.A.

    1987-01-01

    An Emergency Operations Center (EOC) is a shared information processing facility. Although seemingly obvious, many EOCs are designed and operated based on other criteria. The results, measured in terms of response effectiveness, are difficult to determine. A review of some recent disasters reveals a pattern of poor performance for the EOCs involved. These conclusions are tentative because so little research has been done on the design, operation, or evaluation of emergency operations centers. The EOC is not an onsite response command post but a facility removed from the response where tactical and strategic decisions are made based on information from the response site and elsewhere. The EOC is therefore the central focus of emergency information processing and higher-level decision making. Examining existing EOCs, several common functions emerge. These functions can be described in terms of shared information processing. However, many factors impact the design and operation of EOCs. Politics, budgets, and personal ambition are only a few such factors. Examining EOC design and operation in terms of shared information processing operationalized in the seven principal functions within the EOC provides a framework for establishing principles of EOC design and operation. In the response to emergencies such as Bhopal or Chernobyl the stakes are high. Applying new techniques and technologies of management systems can improve the probability of success. This research is a beginning step - to understand how EOCs function, to define the system. Predictive or prescriptive analysis must wait until sufficient empirical data is available to complete a descriptive model for EOC operations

  18. SharePoint Office Pocket Guide

    CERN Document Server

    Webb, Jeff

    2009-01-01

    With this handy reference as your guide, you can reap all the benefits of SharePoint--Microsoft's amazing information-sharing tool. It shows you, in plain language, how to construct a web site where individuals from all over can capture and share ideas. Learn how to upload documents, edit content, send alerts, track work items, add new team members, and much more.

  19. Report endorses data sharing

    Science.gov (United States)

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  20. One Share-One Vote

    DEFF Research Database (Denmark)

    Poulsen, Thomas; Eklund, Johan E.

    Shares with more voting rights than cash flow rights provide their owners with a disproportional influence that is often found to destroy the value of outside equity. This is taken as evidence of discretionary use of power. However, concentration of power does not necessarily result from control...... enhancing mechanisms; it could also be that some shareholders retain a large block in a one share-one vote structure. In this paper, we develop a methodology to disentangle disproportionality, which allows us to test the effect of deviations from one share-one vote more precisely. Our empirical findings add...

  1. Cross-Jurisdictional Resource Sharing in Changing Public Health Landscape: Contributory Factors and Theoretical Explanations.

    Science.gov (United States)

    Shah, Gulzar H; Badana, Adrian N S; Robb, Claire; Livingood, William C

    2016-01-01

    Local health departments (LHDs) are striving to meet public health needs within their jurisdictions, amidst fiscal restraints and complex dynamic environment. Resource sharing across jurisdictions is a critical opportunity for LHDs to continue to enhance effectiveness and increase efficiency. This research examines the extent of cross-jurisdictional resource sharing among LHDs, the programmatic areas and organizational functions for which LHDs share resources, and LHD characteristics associated with resource sharing. Data from the National Association of County & City Health Officials' 2013 National Profile of LHDs were used. Descriptive statistics and multinomial logistic regression were performed for the 5 implementation-oriented outcome variables of interest, with 3 levels of implementation. More than 54% of LHDs shared resources such as funding, staff, or equipment with 1 or more other LHDs on a continuous, recurring basis. Results from the multinomial regression analysis indicate that economies of scale (population size and metropolitan status) had significant positive influences (at P ≤ .05) on resource sharing. Engagement in accreditation, community health assessment, community health improvement planning, quality improvement, and use of the Community Guide were associated with lower levels of engagement in resource sharing. Doctoral degree of the top executive and having 1 or more local boards of health carried a positive influence on resource sharing. Cross-jurisdictional resource sharing is a viable and commonly used process to overcome the challenges of new and emerging public health problems within the constraints of restricted budgets. LHDs, particularly smaller LHDs with limited resources, should consider increased resource sharing to address emerging challenges.

  2. The interplay between sharing behavior and beliefs about others in children during dictator games.

    Science.gov (United States)

    Santamaría-García, Hernando; González-Gadea, María Luz; Di Tella, Rafael; Ibáñez, Agustín; Sigman, Mariano

    2018-02-01

    Previous studies in adults demonstrated that beliefs and sharing decisions in social scenarios are closely related. However, to date, little is known about the development of this relationship in children. By using a modified dictator game, we assessed sharing behavior and beliefs about others in children between 3 and 12 years old. We performed four studies (N = 376) aimed to assess whether decisions were related to beliefs (Studies 1 and 2) and whether information about the recipient's forced sharing behavior would shape decisions and beliefs (Studies 3 and 4). Results of Studies 1 and 2 showed that beliefs about others' generosity were related to children's sharing behavior. In Studies 3 and 4, we found that only children older than 9 years shared more pieces of candy when they knew that the recipient would be forced to share (cooperative context) than when they knew that the recipient would be forced not to share (noncooperative context). Besides, children older than 6 years did not modify their beliefs about others' generosity according to these social contexts. These results suggest that normative or preconceived beliefs about the functioning of the social world may guide social behavior in children. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Cognitive and clinical predictors of functional capacity in patients with first episode schizophrenia

    DEFF Research Database (Denmark)

    Vesterager, Lone; Christensen, Torben Ø; Olsen, Birthe B

    2012-01-01

    The predictors of functional capacity in first episode schizophrenia among seven separable cognitive domains and clinical variables are unknown.......The predictors of functional capacity in first episode schizophrenia among seven separable cognitive domains and clinical variables are unknown....

  4. Design of a DNA chip for detection of unknown genetically modified organisms (GMOs).

    Science.gov (United States)

    Nesvold, Håvard; Kristoffersen, Anja Bråthen; Holst-Jensen, Arne; Berdal, Knut G

    2005-05-01

    Unknown genetically modified organisms (GMOs) have not undergone a risk evaluation, and hence might pose a danger to health and environment. There are, today, no methods for detecting unknown GMOs. In this paper we propose a novel method intended as a first step in an approach for detecting unknown genetically modified (GM) material in a single plant. A model is designed where biological and combinatorial reduction rules are applied to a set of DNA chip probes containing all possible sequences of uniform length n, creating probes capable of detecting unknown GMOs. The model is theoretically tested for Arabidopsis thaliana Columbia, and the probabilities for detecting inserts and receiving false positives are assessed for various parameters for this organism. From a theoretical standpoint, the model looks very promising but should be tested further in the laboratory. The model and algorithms will be available upon request to the corresponding author.

  5. The Effect of Known-and-Unknown Word Combinations on Intentional Vocabulary Learning

    Science.gov (United States)

    Kasahara, Kiwamu

    2011-01-01

    The purpose of this study is to examine whether learning a known-and-unknown word combination is superior in terms of retention and retrieval of meaning to learning a single unknown word. The term "combination" in this study means a two-word collocation of a familiar word and a word that is new to the participants. Following the results of…

  6. High Precision Fast Projective Synchronization for Chaotic Systems with Unknown Parameters

    Science.gov (United States)

    Nian, Fuzhong; Wang, Xingyuan; Lin, Da; Niu, Yujun

    2013-08-01

    A high precision fast projective synchronization method for chaotic systems with unknown parameters was proposed by introducing optimal matrix. Numerical simulations indicate that the precision be improved about three orders compared with other common methods under the same condition of software and hardware. Moreover, when average error is less than 10-3, the synchronization speed is 6500 times than common methods, the iteration needs only 4 times. The unknown parameters also were identified rapidly. The theoretical analysis and proof also were given.

  7. Postponement of Senescence: Results From the Survey of Health, Ageing and Retirement in Europe (SHARE)

    DEFF Research Database (Denmark)

    Juel Ahrenfeldt, Linda; Lindahl-Jacobsen, Rune; Rizzi, Silvia

    Old age mortality has been postponed to higher ages. However, the consequences of longer lives will depend on whether poor health is also being postponed. The objective of this study was to investigate secular changes in different health measures using data from the Survey of Health, Ageing and R...... in cognitive function during the last decade among middle aged and elderly Europeans....... and Retirement in Europe (SHARE), representing nine European countries. SHARE is an ongoing multi-national longitudinal survey of persons aged 50 and older. SHARE started in 2004-2005 and the latest wave was collected in 2013. Comparing individuals from countries who participated in the first wave (n=24......,192) and the latest wave (n=46,762), we found a significant improvement in cognitive function over the 8-9 year period. However, there was no difference in the proportion of limitations with activities of daily living (ADL) and instrumental activities of daily living (IADL). This study confirms improvements...

  8. Functional dyspepsia

    NARCIS (Netherlands)

    Kleibeuker, JH; Thijs, JC

    2004-01-01

    Purpose of review Functional dyspepsia is a common disorder, most of the time of unknown etiology and with variable pathophysiology. Therapy has been and still is largely empirical. Data from recent studies provide new clues for targeted therapy based on knowledge of etiology and pathophysiologic

  9. The shift in US oil demand and its impact on OPEC's market share

    International Nuclear Information System (INIS)

    Jabir, I.

    2001-01-01

    Tremendous political pressure is being exerted on the US government by different political parties to diversify its sources of foreign oil supplies by switching from the reliance on OPEC's oil to that originating from non-OPEC nations. Without a doubt, such a shift would adversely impact the market share of some OPEC members, particularly Saudi Arabia, Venezuela and Nigeria. These countries should therefore consider seriously the negative impact of this scenario and consequently formulate individual or joint production policies aiming at protecting their oil market share. To help OPEC achieve this objective, there is a need to estimate the demand function of US oil imports. This paper proffers an estimate of such a function, taking into account, among other variables, the impact of US Strategic Petroleum Reserve (SPR)

  10. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Wang, Shu-Hong; Song, Ma-Lin

    2014-01-01

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  11. SharePoint governance

    OpenAIRE

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  12. Mapping of unknown industrial plant using ROS-based navigation mobile robot

    Science.gov (United States)

    Priyandoko, G.; Ming, T. Y.; Achmad, M. S. H.

    2017-10-01

    This research examines how humans work with teleoperated unmanned mobile robot inspection in industrial plant area resulting 2D/3D map for further critical evaluation. This experiment focuses on two parts, the way human-robot doing remote interactions using robust method and the way robot perceives the environment surround as a 2D/3D perspective map. ROS (robot operating system) as a tool was utilized in the development and implementation during the research which comes up with robust data communication method in the form of messages and topics. RGBD SLAM performs the visual mapping function to construct 2D/3D map using Kinect sensor. The results showed that the mobile robot-based teleoperated system are successful to extend human perspective in term of remote surveillance in large area of industrial plant. It was concluded that the proposed work is robust solution for large mapping within an unknown construction building.

  13. SCSODC: Integrating Ocean Data for Visualization Sharing and Application

    Science.gov (United States)

    Xu, C.; Li, S.; Wang, D.; Xie, Q.

    2014-02-01

    The South China Sea Ocean Data Center (SCSODC) was founded in 2010 in order to improve collecting and managing of ocean data of the South China Sea Institute of Oceanology (SCSIO). The mission of SCSODC is to ensure the long term scientific stewardship of ocean data, information and products - collected through research groups, monitoring stations and observation cruises - and to facilitate the efficient use and distribution to possible users. However, data sharing and applications were limited due to the characteristics of distribution and heterogeneity that made it difficult to integrate the data. To surmount those difficulties, the Data Sharing System has been developed by the SCSODC using the most appropriate information management and information technology. The Data Sharing System uses open standards and tools to promote the capability to integrate ocean data and to interact with other data portals or users and includes a full range of processes such as data discovery, evaluation and access combining C/S and B/S mode. It provides a visualized management interface for the data managers and a transparent and seamless data access and application environment for users. Users are allowed to access data using the client software and to access interactive visualization application interface via a web browser. The architecture, key technologies and functionality of the system are discussed briefly in this paper. It is shown that the system of SCSODC is able to implement web visualization sharing and seamless access to ocean data in a distributed and heterogeneous environment.

  14. Solidarity through shared disadvantage: Highlighting shared experiences of discrimination improves relations between stigmatized groups.

    Science.gov (United States)

    Cortland, Clarissa I; Craig, Maureen A; Shapiro, Jenessa R; Richeson, Jennifer A; Neel, Rebecca; Goldstein, Noah J

    2017-10-01

    Intergroup relations research has largely focused on relations between members of dominant groups and members of disadvantaged groups. The small body of work examining intraminority intergroup relations, or relations between members of different disadvantaged groups, reveals that salient experiences of ingroup discrimination promote positive relations between groups that share a dimension of identity (e.g., 2 different racial minority groups) and negative relations between groups that do not share a dimension of identity (e.g., a racial minority group and a sexual minority group). In the present work, we propose that shared experiences of discrimination between groups that do not share an identity dimension can be used as a lever to facilitate positive intraminority intergroup relations. Five experiments examining relations among 4 different disadvantaged groups supported this hypothesis. Both blatant (Experiments 1 and 3) and subtle (Experiments 2, 3, and 4) connections to shared experiences of discrimination, or inducing a similarity-seeking mindset in the context of discrimination faced by one's ingroup (Experiment 5), increased support for policies benefiting the outgroup (Experiments 1, 2, and 4) and reduced intergroup bias (Experiments 3, 4, and 5). Taken together, these experiments provide converging evidence that highlighting shared experiences of discrimination can improve intergroup outcomes between stigmatized groups across dimensions of social identity. Implications of these findings for intraminority intergroup relations are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Revenue-Sharing Contract Models for Logistics Service Supply Chains with Mass Customization Service

    Directory of Open Access Journals (Sweden)

    Weihua Liu

    2015-01-01

    Full Text Available The revenue-sharing contract is one of the most important supply chain coordination contracts; it has been applied in various supply chains. However, studies related to service supply chains with mass customization (MC are lacking. Considering the equity of benefit distribution between the members of service supply chains, in this paper, we designed two revenue-sharing contracts. The first contract for the maximum equity of a single logistics service integrator (LSI and single functional logistics service provider (FLSP in a two-echelon logistics service supply chain was designed by introducing the fair entropy function (“one to one” model. Furthermore, the method is extended to a more complex supply chain, which consists of a single LSI and multiple FLSPs. A new contract was designed not only for considering the equity of an LSI and each FLSP but also for the equity between each FLSP (“one to N” model. The “one to one” model in three-echelon LSSC is also provided. The result exemplifies that, whether in the “one to one” model or “one to N” model, there exists a best interval of customized level when the revenue-sharing coefficient reaches its maximum.

  16. More powerful haplotype sharing by accounting for the mode of inheritance.

    Science.gov (United States)

    Ziegler, Andreas; Ewhida, Adel; Brendel, Michael; Kleensang, André

    2009-04-01

    The concept of haplotype sharing (HS) has received considerable attention recently, and several haplotype association methods have been proposed. Here, we extend the work of Beckmann and colleagues [2005 Hum. Hered. 59:67-78] who derived an HS statistic (BHS) as special case of Mantel's space-time clustering approach. The Mantel-type HS statistic correlates genetic similarity with phenotypic similarity across pairs of individuals. While phenotypic similarity is measured as the mean-corrected cross product of phenotypes, we propose to incorporate information of the underlying genetic model in the measurement of the genetic similarity. Specifically, for the recessive and dominant modes of inheritance we suggest the use of the minimum and maximum of shared length of haplotypes around a marker locus for pairs of individuals. If the underlying genetic model is unknown, we propose a model-free HS Mantel statistic using the max-test approach. We compare our novel HS statistics to BHS using simulated case-control data and illustrate its use by re-analyzing data from a candidate region of chromosome 18q from the Rheumatoid Arthritis (RA) Consortium. We demonstrate that our approach is point-wise valid and superior to BHS. In the re-analysis of the RA data, we identified three regions with point-wise P-values<0.005 containing six known genes (PMIP1, MC4R, PIGN, KIAA1468, TNFRSF11A and ZCCHC2) which might be worth follow-up.

  17. Improvement of the Torque-Speed Performance and Drive Efficiency in an SRM Using an Optimal Torque Sharing Function

    Directory of Open Access Journals (Sweden)

    Wei Ye

    2018-05-01

    Full Text Available In this paper, by evaluating the extreme value of the qth-power current, a torque sharing function (TSF family for reducing the torque ripples in the switched reluctance motor (SRM is proposed. The optimization criteria of the TSF has two secondary objectives, including the maximization of the torque-speed range and the minimization of copper loss. The evaluation indices in terms of the peak phase current, the rms (root mean square phase current, and the torque ripple factor are compared between the proposed TSF family and four conventional TSFs including linear, sinusoidal, exponential, and cubic TSFs. An optimization objective function that combines the maximum absolute value of the rate-of-change of the flux linkage (MAV-RCFL and the qth-power of current is proposed and a weighting factor is used to balance the influence of the two optimization objectives. An optimal TSF can be easily obtained by solving the optimization problem from the TSF family. The proposed TSF is validated by using simulations and experiments with a three-phase 6/4 SRM with 7.5 kW, 3000 rpm, and 270 V DC-link voltage. The dynamic simulation model is implemented in Matlab/Simulink. The results demonstrate the validity and superiority of the proposed control method; the optimal TSF provides better torque-speed performance, and a better reduction in copper loss and torque ripples at high speed, as compared to conventional TSFs.

  18. Sharing for people, planet or profit? Analysing motivations for intended sharing economy participation

    NARCIS (Netherlands)

    Böcker, L.; Meelen, A.A.H.

    2016-01-01

    The sharing economy is a fast-growing and heavily debated phenomenon. This study provides an overview of motivations of people willing to participate in different forms of the sharing economy. A survey was held amongst 1,330 respondents from Amsterdam, the Netherlands. Using stated preference data,

  19. Informatics methods to enable sharing of quantitative imaging research data.

    Science.gov (United States)

    Levy, Mia A; Freymann, John B; Kirby, Justin S; Fedorov, Andriy; Fennessy, Fiona M; Eschrich, Steven A; Berglund, Anders E; Fenstermacher, David A; Tan, Yongqiang; Guo, Xiaotao; Casavant, Thomas L; Brown, Bartley J; Braun, Terry A; Dekker, Andre; Roelofs, Erik; Mountz, James M; Boada, Fernando; Laymon, Charles; Oborski, Matt; Rubin, Daniel L

    2012-11-01

    The National Cancer Institute Quantitative Research Network (QIN) is a collaborative research network whose goal is to share data, algorithms and research tools to accelerate quantitative imaging research. A challenge is the variability in tools and analysis platforms used in quantitative imaging. Our goal was to understand the extent of this variation and to develop an approach to enable sharing data and to promote reuse of quantitative imaging data in the community. We performed a survey of the current tools in use by the QIN member sites for representation and storage of their QIN research data including images, image meta-data and clinical data. We identified existing systems and standards for data sharing and their gaps for the QIN use case. We then proposed a system architecture to enable data sharing and collaborative experimentation within the QIN. There are a variety of tools currently used by each QIN institution. We developed a general information system architecture to support the QIN goals. We also describe the remaining architecture gaps we are developing to enable members to share research images and image meta-data across the network. As a research network, the QIN will stimulate quantitative imaging research by pooling data, algorithms and research tools. However, there are gaps in current functional requirements that will need to be met by future informatics development. Special attention must be given to the technical requirements needed to translate these methods into the clinical research workflow to enable validation and qualification of these novel imaging biomarkers. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. Akuisisi dan Budaya Knowledge Sharing

    Directory of Open Access Journals (Sweden)

    Nuril Kusumawardhani Soeprapto Putri

    2011-06-01

    Full Text Available Large companies which are experiencing barriers in innovation often take a radical step to acquire knowledge, namely acquisition. Though innovation is not the only reason, acquisition will result in the company wishes to achieve competitive advantage affected by the creation of ideas, creativity and innovation. The three points can be achieved more easily when the knowledge sharing within the organization / company runs well. However, the acquisition maybe impacts as a counter-attack for the knowledge sharing culture both in the acquisitor and and company which obtains the acquisition. Therefore, a key to succeed the acquisition is a sharing culture among individuals within a company that runs well or even better. Individuals from the acquisitor and those of the company that obtains the acquisition can adapt to each other and have confidence in order not to hinder them to share knowledge. This study discusses in detail the potential impacts of an acquisition upon a knowledge sharing culture in a company. 

  1. Intrathecal immunoglobulin synthesis in patients with symptomatic epilepsy and epilepsy of unknown etiology ('cryptogenic').

    Science.gov (United States)

    Fauser, S; Soellner, C; Bien, C G; Tumani, H

    2017-09-01

    To compare the frequency of intrathecal immunoglobulin (Ig) synthesis in patients with symptomatic epilepsy and epilepsy of unknown etiology ('cryptogenic'). Patients with epileptic (n = 301) and non-epileptic (n = 10) seizures were retrospectively screened for autochthonous intrathecal Ig synthesis and oligoclonal bands (OCBs) in the cerebrospinal fluid. Intrathecal IgG/OCBs were detected in 8% of patients with epilepsies of unknown etiology, 5% of patients with first seizures of unknown cause and 0-4% of patients with epilepsy due to brain tumors, cerebrovascular disease or other etiologies. Intrathecal IgG/OCBs were not seen in patients with psychogenic seizures. Identical OCBs in serum and cerebrospinal fluid were more common in all patient groups (10-40% depending on underlying etiology). Intrathecal IgG synthesis/OCBs were observed slightly more frequently in patients with 'cryptogenic' epilepsy and with first seizures of unknown etiology than in other patient groups. However, this remained an infrequent finding and thus we could not confirm humoral immunity as a leading disease mechanism in patients with epilepsy in general or with unknown etiology in particular. © 2017 EAN.

  2. RBF neural network based H∞ synchronization for unknown chaotic ...

    Indian Academy of Sciences (India)

    , 172 ... the effect of disturbance to an H∞ norm constraint. It is shown that ... unknown chaotic systems; linear matrix inequality (LMI); learning law. 1. Introduction .... (9) is RBFNN H∞ synchronized if the synchronization error e(t) satisfies. ∫ ∞.

  3. Shared governance in a clinic system.

    Science.gov (United States)

    Meyers, Michelle M; Costanzo, Cindy

    2015-01-01

    Shared governance in health care empowers nurses to share in the decision-making process, which results in decentralized management and collective accountability. Share governance practices have been present in hospitals since the late 1970s. However, shared governance in ambulatory care clinics has not been well established. The subjects of this quality project included staff and administrative nurses in a clinic system. The stakeholder committee chose what model of shared governance to implement and educated clinic staff. The Index of Professional Nursing Governance measured a shared governance score pre- and postimplementation of the Clinic Nursing Council. The Clinic Nursing Council met bimonthly for 3 months during this project to discuss issues and make decisions related to nursing staff. The Index of Professional Nursing Governance scores indicated traditional governance pre- and postimplementation of the Clinic Nursing Council, which is to be expected. The stakeholder committee was beneficial to the initial implementation process and facilitated staff nurse involvement. Shared governance is an evolutionary process that develops empowered nurses and nurse leaders.

  4. Knowledge sharing at the World Bank

    International Nuclear Information System (INIS)

    Denning, S.

    2004-01-01

    The World Bank is thus one of many organizations that have recognized that knowledge sharing is a central driver of the 21st century economy. The World Bank experience replicates what has been learned in many organizations that have attempted to implement an organization-wide program over the last eight years. Here are ten main features of that experience. 1. Knowledge sharing requires seven basic elements: strategy of knowledge management; organizing for knowledge management; budget of knowledge management; incentives for knowledge management; communities of practice; technology of knowledge management; measurement of KM strategy. 2. Communities of practice are the key to knowledge sharing. 3. Virtual community members also need physical interactions. 4. Passion is the driving force behind communities of practice. 5. Tacit knowledge can be at least partially captured. 6. Knowledge sharing has an inside-out and outside-in dynamic. 7. Storytelling is needed to ignite knowledge sharing. 8. Knowledge sharing is at some point confused with IT. 9. Vibrant communities of practice attract new talents. 10. Organizations are in different stages of knowledge sharing

  5. Testing knowledge sharing effectiveness: trust, motivation, leadership style, workplace spirituality and social network embedded model

    Directory of Open Access Journals (Sweden)

    Rahman Muhammad Sabbir

    2015-12-01

    Full Text Available The aim of this inquiry is to investigate the relationships among the antecedents of knowledge sharing effectiveness under the position of non-academic staff of higher learning institutions through an empirical test of a conceptual model consisting of trust, extrinsic and intrinsic motivation, leadership style, workplace spirituality and online social network. This study used the respondents from the non-academic staff of higher learning institutions in Malaysia (n = 200, utilizing a self-administered survey questionnaire. The structural equation modeling approach was used to test the proposed hypotheses. The outcomes indicate that all the antecedents play a substantial function in knowledge sharing effectiveness. In addition, perceived risk plays a mediating role between trust and knowledge sharing effectiveness. On the other hand, this research also proved the communication skill also plays a mediating role between leadership style and knowledge sharing effectiveness. This study contributes to pioneering empirical findings on knowledge sharing literature under the scope of the non-academic staff perspective.

  6. Space Sharing i teori og praksis

    DEFF Research Database (Denmark)

    Brinkø, Rikke

    2016-01-01

    Dette er den anden artikel i FM Update, der præsenterer resultater fra Ph.d. studiet ”Sharing Space in the Knowledge City” fra DTU. Den første artikel med titlen ”Shared Space – mellem vision og realitet” (FM-Update, nr. 1, 2015) præsenterede en ny typologi for shared space, som delekoncept. Denne...... artikel er en fortsættelse, med fire dybdegående studier af eksempler på bygge- og renoveringsprojekter, som afspejler de fire typer at shared space, som beskrives i typologien. Formålet med denne artikel er dels at eksemplificere de fire typer af shared space, og dels at formidle erfaringer fra...

  7. Content-Based Multimedia Retrieval in the Presence of Unknown User Preferences

    DEFF Research Database (Denmark)

    Beecks, Christian; Assent, Ira; Seidl, Thomas

    2011-01-01

    Content-based multimedia retrieval requires an appropriate similarity model which reflects user preferences. When these preferences are unknown or when the structure of the data collection is unclear, retrieving the most preferable objects the user has in mind is challenging, as the notion...... address the problem of content-based multimedia retrieval in the presence of unknown user preferences. Our idea consists in performing content-based retrieval by considering all possibilities in a family of similarity models simultaneously. To this end, we propose a novel content-based retrieval approach...

  8. Plug-and-play control and consensus algorithms for current sharing in DC microgrids

    DEFF Research Database (Denmark)

    Tucci, Michele; Meng, Lexuan; Guerrero, Josep M.

    2017-01-01

    In this paper, we propose a secondary consensus-based control layer for current sharing and voltage balancing in DC microGrids (mGs). Differently from existing approaches based on droop control, we assume decentralized Plug-and-Play (PnP) regulators at the primary level, as they provide voltage...... functions (Tucci et al., 2016a). Besides showing stability, current sharing, and voltage balancing in the asymptotic régime, we describe how to design secondary controllers in a PnP fashion when Distributed Generation Units (DGUs) are added or removed. Theoretical results are complemented by simulations...

  9. Display Sharing: An Alternative Paradigm

    Science.gov (United States)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  10. Partial covariance based functional connectivity computation using Ledoit-Wolf covariance regularization.

    Science.gov (United States)

    Brier, Matthew R; Mitra, Anish; McCarthy, John E; Ances, Beau M; Snyder, Abraham Z

    2015-11-01

    Functional connectivity refers to shared signals among brain regions and is typically assessed in a task free state. Functional connectivity commonly is quantified between signal pairs using Pearson correlation. However, resting-state fMRI is a multivariate process exhibiting a complicated covariance structure. Partial covariance assesses the unique variance shared between two brain regions excluding any widely shared variance, hence is appropriate for the analysis of multivariate fMRI datasets. However, calculation of partial covariance requires inversion of the covariance matrix, which, in most functional connectivity studies, is not invertible owing to rank deficiency. Here we apply Ledoit-Wolf shrinkage (L2 regularization) to invert the high dimensional BOLD covariance matrix. We investigate the network organization and brain-state dependence of partial covariance-based functional connectivity. Although RSNs are conventionally defined in terms of shared variance, removal of widely shared variance, surprisingly, improved the separation of RSNs in a spring embedded graphical model. This result suggests that pair-wise unique shared variance plays a heretofore unrecognized role in RSN covariance organization. In addition, application of partial correlation to fMRI data acquired in the eyes open vs. eyes closed states revealed focal changes in uniquely shared variance between the thalamus and visual cortices. This result suggests that partial correlation of resting state BOLD time series reflect functional processes in addition to structural connectivity. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Assessing Knowledge Sharing Among Academics: A Validation of the Knowledge Sharing Behavior Scale (KSBS).

    Science.gov (United States)

    Ramayah, T; Yeap, Jasmine A L; Ignatius, Joshua

    2014-04-01

    There is a belief that academics tend to hold on tightly to their knowledge and intellectual resources. However, not much effort has been put into the creation of a valid and reliable instrument to measure knowledge sharing behavior among the academics. To apply and validate the Knowledge Sharing Behavior Scale (KSBS) as a measure of knowledge sharing behavior within the academic community. Respondents (N = 447) were academics from arts and science streams in 10 local, public universities in Malaysia. Data were collected using the 28-item KSBS that assessed four dimensions of knowledge sharing behavior namely written contributions, organizational communications, personal interactions, and communities of practice. The exploratory factor analysis showed that the items loaded on the dimension constructs that they were supposed to represent, thus proving construct validity. A within-factor analysis revealed that each set of items representing their intended dimension loaded on only one construct, therefore establishing convergent validity. All four dimensions were not perfectly correlated with each other or organizational citizenship behavior, thereby proving discriminant validity. However, all four dimensions correlated with organizational commitment, thus confirming predictive validity. Furthermore, all four factors correlated with both tacit and explicit sharing, which confirmed their concurrent validity. All measures also possessed sufficient reliability (α > .70). The KSBS is a valid and reliable instrument that can be used to formally assess the types of knowledge artifacts residing among academics and the degree of knowledge sharing in relation to those artifacts. © The Author(s) 2014.

  12. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  13. Sharing is caring: The potential of the sharing economy to support aging in place.

    Science.gov (United States)

    Miller, Julie; Ward, Carley; Lee, Chaiwoo; D'Ambrosio, Lisa; Coughlin, Joseph

    2018-01-24

    This article explores innovative applications of sharing economy services that have the potential to support a population aging in place, especially the "oldest old," aged 85 and older, and their caregivers. A mixed-methods study conducted by the MIT AgeLab examined perceptions of and experiences with sharing economy services, ultimately finding opportunities and barriers to use. Thus, although sharing economy services have potential to support aging in place, to do so successfully will require reconstructing how older adults, family caregivers, aging service professionals, gerontology educators, and gerontology students conceptualize and deliver care to an aging population. We suggest examples for gerontology educators to integrate into their classrooms to further cultivate an appreciation among students of multiple approaches to intervention, including those that leverage sharing economy and technology-enabled platforms to support older adults and their caregivers.

  14. Radiological bile acid absorption test {sup 75}SeHCAT in patients with diarrhoea of unknown cause

    Energy Technology Data Exchange (ETDEWEB)

    Rudberg, U. [St. Goeran`s Hospital, Stockholm (Sweden). Dept. of Diagnostic Radiology; Nylander, B. [St. Goeran`s Hospital, Stockholm (Sweden). Dept. of Internal Medicine

    1996-09-01

    Purpose: The purpose with this study was to investigate the usefulness of the {sup 75}SeHCAT test in patients suffering from `functional` diarrhoea and to disclose earlier radiological investigations performed in the course of disease. Material and Methods: Twenty patients with chronic diarrhoea of unknown cause were investigated with the {sup 75}SeHCAT test. The cholestyramine test and an estimation of oro-caecal transit time (OCTT) were also performed in 13 and 10 patients respectively. Results: Ten patients had low 7-day retention ({<=}15%). Nine of these were tested with cholestyramine and 8 showed complete relief from the diarrhoea. The cholestyramine test had no effect on the 4 patients with normal bile acid retention. No correlation was found between the retention of {sup 75}SeHCAT and OCCT. A total of 80 inconclusive gastrointestinal barium examinations were performed during the course of disease. Conclusion: Pathological bile acid retention, studied with the radiological {sup 75}SeHCAT test, is common in patients with diarrhoea of unknown cause. The test should be performed earlier in the course of disease in order to prevent unnecessary radiological investigations and to reduce patient suffering and distress. (orig.).

  15. DataSync - sharing data via filesystem

    Science.gov (United States)

    Ulbricht, Damian; Klump, Jens

    2014-05-01

    Datasync's major task is to distribute directory trees, we complement its functionality with the PHP-based application panMetaDocs [3]. panMetaDocs is the successor to panMetaWorks [4] and inherits most of its functionality. Through an internet browser PanMetaDocs provides a web-based overview of the datasets inside the eSciDoc-infrastructure. The software allows to upload further data, to add and edit metadata using the metadata editor, and it disseminates metadata through various channels. In addition, previous versions of a file can be downloaded and access rights can be defined on files and folders to control visibility of files for users of both panMetaDocs and Datasync. panMetaDocs serves as a publication agent for datasets and it serves as a registration agent for dataset DOIs. The application stack presented here allows sharing, versioning, and central storage of data from the very beginning of project activities by using the file synchronization service Datasync. The web-application panMetaDocs complements the functionality of DataSync by providing a dataset publication agent and other tools to handle administrative tasks on the data. [1] http://github.com/ulbricht/datasync [2] http://github.com/escidoc [3] http://panmetadocs.sf.net [4] http://metaworks.pangaea.de

  16. Power-sharing: concepts, debates and gaps

    Directory of Open Access Journals (Sweden)

    Alexandre de Sousa Carvalho

    2016-05-01

    Full Text Available Academic literature tends to reflect the two main objectives of power-sharing: promoting the construction of sustainable peace and serving to structure the foundations for growth and development of democracy in divided societies. reflecting this, two dimensions and discourses of analysis and evaluation stand out: a classical dimension centred on power-sharing as theory and a normative proposal for democracy in divided societies, and another focused mainly on power-sharing as a meachanism of conflict management. This article aims to introduce the reader to discussions about power-sharing, reviewing and critically analysing power-sharing literature to show its gaps and tensions, as well as suggesting some points where one can continue the debate.

  17. How to share tacit nuclear knowledge?

    International Nuclear Information System (INIS)

    Rintala, N.; Kuronen, T.

    2006-01-01

    Nuclear organisations are struggling to preserve their expertise and knowledge despite the widespread retirement of nuclear experts in the near future. Already, NPPs have noticed that the retiring experts have tacit knowledge, which is difficult to codify and/or share during formal training. Tacit knowledge sharing requires methods that are based on social interaction, either in one-on-one situations or in groups. This paper describes 23 methods for sharing tacit knowledge. Critical tacit knowledge should be identified at individual level, sub-unit level and NPP level. Different methods for sharing the tacit knowledge can be implemented, as employees and organisational units may have different preferences in terms of how they want to share expertise. (author)

  18. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  19. Liability for Unknown Risks: A Law and Economics Perspective

    NARCIS (Netherlands)

    M.G. Faure (Michael); L.T. Visscher (Louis); F. Weber (Franziska)

    2017-01-01

    textabstractIn the law and economics literature liability is generally regarded as an instrument which provides potential tortfeasors with incentives for optimal care taking. The question, however, arises whether liability can still provide those incentives when risks are unknown. That is the

  20. Teleportation of Unknown Superpositions of Collective Atomic Coherent States

    Institute of Scientific and Technical Information of China (English)

    ZHENG ShiBiao

    2001-01-01

    We propose a scheme to teleport an unknown superposition of two atomic coherent states with different phases. Our scheme is based on resonant and dispersive atom-field interaction. Our scheme provides a possibility of teleporting macroscopic superposition states of many atoms first time.``

  1. Team learning: building shared mental models

    NARCIS (Netherlands)

    Bossche, van den P.; Gijselaers, W.; Segers, M.; Woltjer, G.B.; Kirschner, P.

    2011-01-01

    To gain insight in the social processes that underlie knowledge sharing in teams, this article questions which team learning behaviors lead to the construction of a shared mental model. Additionally, it explores how the development of shared mental models mediates the relation between team learning

  2. Multilevel processor-sharing algorithm for M/G/1 systems with priorities

    Energy Technology Data Exchange (ETDEWEB)

    Yassouridis, A.; Koller, R.

    1983-01-01

    The well-known multilevel processor-sharing algorithm for M/G/1 systems without priorities is extended to M/G/1 systems with priority classes. The average response time t/sub j/(x) and the average waiting time w/sub j/(x) for a j-class job, which requires a total service of x sec, are analytically calculated. Some figures demonstrate how the priority classes and the total number of different levels affect the behaviour of the functions t/sub j/(x) and w/sub j/(x). In addition, the foreground-background algorithm with priorities, which is not yet covered in the literature, is treated as a special case of the multilevel processor-sharing algorithm. 8 references.

  3. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    OpenAIRE

    Serge Gruzinski

    2005-01-01

    Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown) le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d'...

  4. Adaptive Tracking and Obstacle Avoidance Control for Mobile Robots with Unknown Sliding

    Directory of Open Access Journals (Sweden)

    Mingyue Cui

    2012-11-01

    Full Text Available An adaptive control approach is proposed for trajectory tracking and obstacle avoidance for mobile robots with consideration given to unknown sliding. A kinematic model of mobile robots is established in this paper, in which both longitudinal and lateral sliding are considered and processed as three time-varying parameters. A sliding model observer is introduced to estimate the sliding parameters online. A stable tracking control law for this nonholonomic system is proposed to compensate the unknown sliding effect. From Lyapunov-stability analysis, it is proved, regardless of unknown sliding, that tracking errors of the controlled closed-loop system are asymptotically stable, the tracking errors converge to zero outside the obstacle detection region and obstacle avoidance is guaranteed inside the obstacle detection region. The efficiency and robustness of the proposed control system are verified by simulation results.

  5. The ultimate SharePoint performance guide ! configuring SharePoint, SQL and Office 365 for maximum performance

    CERN Document Server

    Catrinescu, Vlad

    2017-01-01

    This is an ultimate guidance on performance for SharePoint Server 2013, 2016 and SharePoint Online inspired both by Microsoft’s best practices and real life experiences from countless deployments on the field.This book was Tech Reviewed by Microsoft MVP & RD Jussi Roine and includes an awesome foreword by SharePoint MVP Christian Buckley.

  6. Networks of Food Sharing Reveal the Functional Significance of Multilevel Sociality in Two Hunter-Gatherer Groups.

    Science.gov (United States)

    Dyble, Mark; Thompson, James; Smith, Daniel; Salali, Gul Deniz; Chaudhary, Nikhil; Page, Abigail E; Vinicuis, Lucio; Mace, Ruth; Migliano, Andrea Bamberg

    2016-08-08

    Like many other mammalian and primate societies [1-4], humans are said to live in multilevel social groups, with individuals situated in a series of hierarchically structured sub-groups [5, 6]. Although this multilevel social organization has been described among contemporary hunter-gatherers [5], questions remain as to the benefits that individuals derive from living in such groups. Here, we show that food sharing among two populations of contemporary hunter-gatherers-the Palanan Agta (Philippines) and Mbendjele BaYaka (Republic of Congo)-reveals similar multilevel social structures, with individuals situated in households, within sharing clusters of 3-4 households, within the wider residential camps, which vary in size. We suggest that these groupings serve to facilitate inter-sexual provisioning, kin provisioning, and risk reduction reciprocity, three levels of cooperation argued to be fundamental in human societies [7, 8]. Humans have a suite of derived life history characteristics including a long childhood and short inter-birth intervals that make offspring energetically demanding [9] and have moved to a dietary niche that often involves the exploitation of difficult to acquire foods with highly variable return rates [10-12]. This means that human foragers face both day-to-day and more long-term energetic deficits that conspire to make humans energetically interdependent. We suggest that a multilevel social organization allows individuals access to both the food sharing partners required to buffer themselves against energetic shortfalls and the cooperative partners required for skill-based tasks such as cooperative foraging. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  8. VHA Data Sharing Agreement Repository

    Data.gov (United States)

    Department of Veterans Affairs — The VHA Data Sharing Agreement Repository serves as a centralized location to collect and report on agreements that share VHA data with entities outside of VA. It...

  9. Multiple analysis of an unknown optical multilayer coating

    International Nuclear Information System (INIS)

    Dobrowolski, J.A.; Ho, F.C.; Waldorf, A.

    1985-01-01

    Results are given of the analysis at five different laboratories of an unknown optical multilayer coating. In all, eleven different analytical and laboratory techniques were applied to the problem. The multilayer nominally consisted of three dielectric and two metallic layers. It was demonstrated convincingly that with present day techniques it is possible to determine the basic structure of such a coating

  10. Distributed Optimization Design of Continuous-Time Multiagent Systems With Unknown-Frequency Disturbances.

    Science.gov (United States)

    Wang, Xinghu; Hong, Yiguang; Yi, Peng; Ji, Haibo; Kang, Yu

    2017-05-24

    In this paper, a distributed optimization problem is studied for continuous-time multiagent systems with unknown-frequency disturbances. A distributed gradient-based control is proposed for the agents to achieve the optimal consensus with estimating unknown frequencies and rejecting the bounded disturbance in the semi-global sense. Based on convex optimization analysis and adaptive internal model approach, the exact optimization solution can be obtained for the multiagent system disturbed by exogenous disturbances with uncertain parameters.

  11. Estimation of the false discovery proportion with unknown dependence.

    Science.gov (United States)

    Fan, Jianqing; Han, Xu

    2017-09-01

    Large-scale multiple testing with correlated test statistics arises frequently in many scientific research. Incorporating correlation information in approximating false discovery proportion has attracted increasing attention in recent years. When the covariance matrix of test statistics is known, Fan, Han & Gu (2012) provided an accurate approximation of False Discovery Proportion (FDP) under arbitrary dependence structure and some sparsity assumption. However, the covariance matrix is often unknown in many applications and such dependence information has to be estimated before approximating FDP. The estimation accuracy can greatly affect FDP approximation. In the current paper, we aim to theoretically study the impact of unknown dependence on the testing procedure and establish a general framework such that FDP can be well approximated. The impacts of unknown dependence on approximating FDP are in the following two major aspects: through estimating eigenvalues/eigenvectors and through estimating marginal variances. To address the challenges in these two aspects, we firstly develop general requirements on estimates of eigenvalues and eigenvectors for a good approximation of FDP. We then give conditions on the structures of covariance matrices that satisfy such requirements. Such dependence structures include banded/sparse covariance matrices and (conditional) sparse precision matrices. Within this framework, we also consider a special example to illustrate our method where data are sampled from an approximate factor model, which encompasses most practical situations. We provide a good approximation of FDP via exploiting this specific dependence structure. The results are further generalized to the situation where the multivariate normality assumption is relaxed. Our results are demonstrated by simulation studies and some real data applications.

  12. Shared decision-making and patient autonomy.

    Science.gov (United States)

    Sandman, Lars; Munthe, Christian

    2009-01-01

    In patient-centred care, shared decision-making is advocated as the preferred form of medical decision-making. Shared decision-making is supported with reference to patient autonomy without abandoning the patient or giving up the possibility of influencing how the patient is benefited. It is, however, not transparent how shared decision-making is related to autonomy and, in effect, what support autonomy can give shared decision-making. In the article, different forms of shared decision-making are analysed in relation to five different aspects of autonomy: (1) self-realisation; (2) preference satisfaction; (3) self-direction; (4) binary autonomy of the person; (5) gradual autonomy of the person. It is argued that both individually and jointly these aspects will support the models called shared rational deliberative patient choice and joint decision as the preferred versions from an autonomy perspective. Acknowledging that both of these models may fail, the professionally driven best interest compromise model is held out as a satisfactory second-best choice.

  13. Cancer of unknown primitive metastatic. About two clinical cases

    International Nuclear Information System (INIS)

    Cawen, L; Cordoba, A.

    2010-01-01

    This work is about the two clinical cases about the unknown primitive metastatic cancer. The main techniques used for the diagnosis, treatment and monitoring of different s carcinomas are: Electronic microscope, molecular biology and genetics, especially histopathological study, topographic survey, ultrasound, radiography, chemotherapy, radiotherapy

  14. High-order sliding mode observer for fractional commensurate linear systems with unknown input

    KAUST Repository

    Belkhatir, Zehor; Laleg-Kirati, Taous-Meriem

    2017-01-01

    In this paper, a high-order sliding mode observer (HOSMO) is proposed for the joint estimation of the pseudo-state and the unknown input of fractional commensurate linear systems with single unknown input and a single output. The convergence of the proposed observer is proved using a Lyapunov-based approach. In addition, an enhanced variant of the proposed fractional-HOSMO is introduced to avoid the peaking phenomenon and thus to improve the estimation results in the transient phase. Simulation results are provided to illustrate the performance of the proposed fractional observer in both noise-free and noisy cases. The effect of the observer’s gains on the estimated pseudo-state and unknown input is also discussed.

  15. High-order sliding mode observer for fractional commensurate linear systems with unknown input

    KAUST Repository

    Belkhatir, Zehor

    2017-05-20

    In this paper, a high-order sliding mode observer (HOSMO) is proposed for the joint estimation of the pseudo-state and the unknown input of fractional commensurate linear systems with single unknown input and a single output. The convergence of the proposed observer is proved using a Lyapunov-based approach. In addition, an enhanced variant of the proposed fractional-HOSMO is introduced to avoid the peaking phenomenon and thus to improve the estimation results in the transient phase. Simulation results are provided to illustrate the performance of the proposed fractional observer in both noise-free and noisy cases. The effect of the observer’s gains on the estimated pseudo-state and unknown input is also discussed.

  16. On reconstruction of an unknown polygonal cavity in a linearized elasticity with one measurement

    International Nuclear Information System (INIS)

    Ikehata, M; Itou, H

    2011-01-01

    In this paper we consider a reconstruction problem of an unknown polygonal cavity in a linearized elastic body. For this problem, an extraction formula of the convex hull of the unknown polygonal cavity is established by means of the enclosure method introduced by Ikehata. The advantages of our method are that it needs only a single set of boundary data and we do not require any a priori assumptions for the unknown polygonal cavity and any constraints on boundary data. The theoretical formula may have possibility of application in nondestructive evaluation.

  17. Mastering Microsoft SharePoint Foundation 2010

    CERN Document Server

    Callahan, C A

    2011-01-01

    Everything IT professionals need to create collaborative solutions. SharePoint Foundation 2010 is the newest version of a powerful collaboration tool used in many Exchange-enabled organizations. This book gets network professionals and business application administrators up to speed on the updates, features, and installation procedures, preparing them to create powerful collaboration structures for their companies.: Microsoft SharePoint Foundation 2010 is the successor to Windows SharePoint Services 3.0 and is used with Microsoft Office SharePoint Server to enable collaboration; this guide pre

  18. 24 CFR 266.15 - Risk-Sharing Agreement.

    Science.gov (United States)

    2010-04-01

    ... HOUSING FINANCE AGENCY RISK-SHARING PROGRAM FOR INSURED AFFORDABLE MULTIFAMILY PROJECT LOANS General Provisions § 266.15 Risk-Sharing Agreement. Execution of a Risk-Sharing Agreement is a prerequisite to... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Risk-Sharing Agreement. 266.15...

  19. Proposing a Model for Successful Application of Knowledge Sharing II (Social Knowledge Sharing) within Organizations

    OpenAIRE

    Mehdi Shamizanjani; Seyed Mohammad Ghasemtabar Shahri

    2014-01-01

    The main purpose of this research is the development of a success model of Knowledge Sharing 2.0 (social knowledge sharing) through organizations. A three-step strategy is used in this research as stated below: In the first step, identification of social software and extraction of factors effective on success of each for knowledge sharing were obtained from literature review. Execution of Delphi method and identification of critical factors were done in the second step. At l...

  20. Shared probe design and existing microarray reanalysis using PICKY

    Directory of Open Access Journals (Sweden)

    Chou Hui-Hsien

    2010-04-01

    Full Text Available Abstract Background Large genomes contain families of highly similar genes that cannot be individually identified by microarray probes. This limitation is due to thermodynamic restrictions and cannot be resolved by any computational method. Since gene annotations are updated more frequently than microarrays, another common issue facing microarray users is that existing microarrays must be routinely reanalyzed to determine probes that are still useful with respect to the updated annotations. Results PICKY 2.0 can design shared probes for sets of genes that cannot be individually identified using unique probes. PICKY 2.0 uses novel algorithms to track sharable regions among genes and to strictly distinguish them from other highly similar but nontarget regions during thermodynamic comparisons. Therefore, PICKY does not sacrifice the quality of shared probes when choosing them. The latest PICKY 2.1 includes the new capability to reanalyze existing microarray probes against updated gene sets to determine probes that are still valid to use. In addition, more precise nonlinear salt effect estimates and other improvements are added, making PICKY 2.1 more versatile to microarray users. Conclusions Shared probes allow expressed gene family members to be detected; this capability is generally more desirable than not knowing anything about these genes. Shared probes also enable the design of cross-genome microarrays, which facilitate multiple species identification in environmental samples. The new nonlinear salt effect calculation significantly increases the precision of probes at a lower buffer salt concentration, and the probe reanalysis function improves existing microarray result interpretations.