Sample records for unknown function shares

  1. Function analysis of unknown genes

    Rogowska-Wrzesinska, A.


      This thesis entitled "Function analysis of unknown genes" presents the use of proteome analysis for the characterisation of yeast (Saccharomyces cerevisiae) genes and their products (proteins especially those of unknown function). This study illustrates that proteome analysis can be used...... to describe different aspects of molecular biology of the cell, to study changes that occur in the cell due to overexpression or deletion of a gene and to identify various protein modifications. The biological questions and the results of the described studies show the diversity of the information that can...... genes and proteins. It reports the first global proteome database collecting 36 yeast single gene deletion mutants and selecting over 650 differences between analysed mutants and the wild type strain. The obtained results show that two-dimensional gel electrophoresis and mass spectrometry based proteome...

  2. Heuristic method for searching global maximum of multimodal unknown function

    Kamei, K; Araki, Y; Inoue, K


    The method is composed of three kinds of searches. They are called g (grasping)-mode search, f (finding)-mode search and c (confirming)-mode search. In the g-mode search and the c-mode search, a heuristic method is used which was extracted from search behaviors of human subjects. In f-mode search, the simplex method is used which is well known as a search method for unimodal unknown function. Each mode search and its transitions are shown in the form of flowchart. The numerical results for one-dimensional through six-dimensional multimodal functions prove the proposed search method to be an effective one. 11 references.

  3. Vestibular Function in Adults With Epilepsy of Unknown Etiology.

    Hamed, Sherifa A; Tohamy, Amal M; Oseilly, Amira M


    This study aimed to evaluate vestibular function in adults with chronic epilepsy of unknown etiology in the inter-ictal period. Epilepsy is a chronic medical disorder. Life-long therapy may be required in one-third of patients. Epilepsy is associated with comorbid somatic conditions which impairs patients' quality of life. This cross-sectional study included 28 with generalized tonic clonic (GTC) convulsions and 14 and 3 with temporal (TLE) and frontal lobe (FLE) epilepsies with secondary generalization (all were on regular carbamazepine therapy) and 40 healthy control subjects. The patients' mean age was 34.97 ± 7.35 years and the duration of illness was 18.75 ± 7.99 years. All underwent videonystagmography (VNG). Compared with controls, patients had frequent vestibular symptoms including dizziness (62.22%) (p = 0.0001) and sense of imbalance (44.44%) (p = 0.0001). Eleven patients (24.44%) had central vestibular dysfunction (p = 0.0001); 9 (20%) had mixed vestibular dysfunction and one (2.22%) had peripheral vestibular dysfunction (p = 0.0001). Abnormalities were observed in saccadic (44.4%) and pursuit (42.2%) eye movements, optokinetic nystagmus (42.2%) and positioning/positional (11.11%) and caloric (13.33%) testing. TLE and FLE were associated with more VNG abnormalities than GTC. No significant differences were observed in the demographic and clinical characteristics between patients with and without VNG abnormalities. Vestibular manifestations are frequent in patients with epilepsy. This may be a result of the permanent damaging effect of chronic epilepsy on the vestibular cortical areas and/or a toxic effect from prolonged carbamazepine therapy on the peripheral and central vestibular systems.

  4. Adaptive Incentive Controls for Stackelberg Games with Unknown Cost Functionals.



  5. Describing functional requirements for knowledge sharing communities

    Garrett, Sandra; Caldwell, Barrett


    Human collaboration in distributed knowledge sharing groups depends on the functionality of information and communication technologies (ICT) to support performance. Since many of these dynamic environments are constrained by time limits, knowledge must be shared efficiently by adapting the level of information detail to the specific situation. This paper focuses on the process of knowledge and context sharing with and without mediation by ICT, as well as issues to be resolved when determining appropriate ICT channels. Both technology-rich and non-technology examples are discussed.

  6. Functional connectivity change as shared signal dynamics

    Cole, Michael W.; Yang, Genevieve J.; Murray, John D.; Repovš, Grega; Anticevic, Alan


    Background An increasing number of neuroscientific studies gain insights by focusing on differences in functional connectivity – between groups, individuals, temporal windows, or task conditions. We found using simulations that additional insights into such differences can be gained by forgoing variance normalization, a procedure used by most functional connectivity measures. Simulations indicated that these functional connectivity measures are sensitive to increases in independent fluctuations (unshared signal) in time series, consistently reducing functional connectivity estimates (e.g., correlations) even though such changes are unrelated to corresponding fluctuations (shared signal) between those time series. This is inconsistent with the common notion of functional connectivity as the amount of inter-region interaction. New Method Simulations revealed that a version of correlation without variance normalization – covariance – was able to isolate differences in shared signal, increasing interpretability of observed functional connectivity change. Simulations also revealed cases problematic for non-normalized methods, leading to a “covariance conjunction” method combining the benefits of both normalized and non-normalized approaches. Results We found that covariance and covariance conjunction methods can detect functional connectivity changes across a variety of tasks and rest in both clinical and non-clinical functional MRI datasets. Comparison with Existing Method(s) We verified using a variety of tasks and rest in both clinical and non-clinical functional MRI datasets that it matters in practice whether correlation, covariance, or covariance conjunction methods are used. Conclusions These results demonstrate the practical and theoretical utility of isolating changes in shared signal, improving the ability to interpret observed functional connectivity change. PMID:26642966

  7. Structure-based inference of molecular functions of proteins of unknown function from Berkeley Structural Genomics Center

    Kim, Sung-Hou; Shin, Dong Hae; Hou, Jingtong; Chandonia, John-Marc; Das, Debanu; Choi, In-Geol; Kim, Rosalind; Kim, Sung-Hou


    Advances in sequence genomics have resulted in an accumulation of a huge number of protein sequences derived from genome sequences. However, the functions of a large portion of them cannot be inferred based on the current methods of sequence homology detection to proteins of known functions. Three-dimensional structure can have an important impact in providing inference of molecular function (physical and chemical function) of a protein of unknown function. Structural genomics centers worldwide have been determining many 3-D structures of the proteins of unknown functions, and possible molecular functions of them have been inferred based on their structures. Combined with bioinformatics and enzymatic assay tools, the successful acceleration of the process of protein structure determination through high throughput pipelines enables the rapid functional annotation of a large fraction of hypothetical proteins. We present a brief summary of the process we used at the Berkeley Structural Genomics Center to infer molecular functions of proteins of unknown function.

  8. Testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form

    Péguin-Feissolle, Anne; Strikholm, Birgit; Teräsvirta, Timo

    In this paper we propose a general method for testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form. These tests are based on a Taylor expansion of the nonlinear model around a given point in the sample space. We study the performance of our tests b...

  9. Combining sync&share functionality with filesystem-like access

    CERN. Geneva


    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  10. Identifying an unknown function in a parabolic equation with overspecified data via He's variational iteration method

    Dehghan, Mehdi; Tatari, Mehdi


    In this research, the He's variational iteration technique is used for computing an unknown time-dependent parameter in an inverse quasilinear parabolic partial differential equation. Parabolic partial differential equations with overspecified data play a crucial role in applied mathematics and physics, as they appear in various engineering models. The He's variational iteration method is an analytical procedure for finding solutions of differential equations, is based on the use of Lagrange multipliers for identification of an optimal value of a parameter in a functional. To show the efficiency of the new approach, several test problems are presented for one-, two- and three-dimensional cases

  11. Locally optimal control under unknown dynamics with learnt cost function: application to industrial robot positioning

    Guérin, Joris; Gibaru, Olivier; Thiery, Stéphane; Nyiri, Eric


    Recent methods of Reinforcement Learning have enabled to solve difficult, high dimensional, robotic tasks under unknown dynamics using iterative Linear Quadratic Gaussian control theory. These algorithms are based on building a local time-varying linear model of the dynamics from data gathered through interaction with the environment. In such tasks, the cost function is often expressed directly in terms of the state and control variables so that it can be locally quadratized to run the algorithm. If the cost is expressed in terms of other variables, a model is required to compute the cost function from the variables manipulated. We propose a method to learn the cost function directly from the data, in the same way as for the dynamics. This way, the cost function can be defined in terms of any measurable quantity and thus can be chosen more appropriately for the task to be carried out. With our method, any sensor information can be used to design the cost function. We demonstrate the efficiency of this method through simulating, with the V-REP software, the learning of a Cartesian positioning task on several industrial robots with different characteristics. The robots are controlled in joint space and no model is provided a priori. Our results are compared with another model free technique, consisting in writing the cost function as a state variable.

  12. Three-Party Quantum State Sharing of an Arbitrary Unknown Two-Qubit State Based on Entanglement Swapping and Bell-State Measurements

    Yuan Hao; Song Jun; Hou Kui; Hu Xiaoyuan; Shi Shouhua; Han Lianfang


    We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitary operation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique.

  13. A chromatographic objective function to characterise chromatograms with unknown compounds or without standards available.

    Alvarez-Segura, T; Gómez-Díaz, A; Ortiz-Bolsico, C; Torres-Lapasió, J R; García-Alvarez-Coque, M C


    Getting useful chemical information from samples containing many compounds is still a challenge to analysts in liquid chromatography. The highest complexity corresponds to samples for which there is no prior knowledge about their chemical composition. Computer-based methodologies are currently considered as the most efficient tools to optimise the chromatographic resolution, and further finding the optimal separation conditions. However, most chromatographic objective functions (COFs) described in the literature to measure the resolution are based on mathematical models fitted with the information obtained from standards, and cannot be applied to samples with unknown compounds. In this work, a new COF based on the automatic measurement of the protruding part of the chromatographic peaks (or peak prominences) that indicates the number of perceptible peaks and global resolution, without the need of standards, is developed. The proposed COF was found satisfactory with regard to the peak purity criterion when applied to artificial peaks and simulated chromatograms of mixtures built using the information of standards. The approach was applied to mixtures of drugs containing unknown impurities and degradation products and to extracts of medicinal herbs, eluted with acetonitrile-water mixtures using isocratic and gradient elution. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Structure of a Trypanosoma brucei α/β-hydrolase fold protein with unknown function

    Merritt, Ethan A.; Holmes, Margaret; Buckner, Frederick S.; Van Voorhis, Wesley C.; Quartly, Erin; Phizicky, Eric M.; Lauricella, Angela; Luft, Joseph; DeTitta, George; Neely, Helen; Zucker, Frank; Hol, Wim G. J.


    T. brucei gene Tb10.6k15.0140 codes for an α/β-hydrolase fold protein of unknown function. The 2.2 Å crystal structure shows that members of this sequence family retain a conserved Ser residue at the expected site of a catalytic nucleophile, but that trypanosomatid sequences lack structural homologs for the other expected residues of the catalytic triad. The structure of a structural genomics target protein, Tbru020260AAA from Trypanosoma brucei, has been determined to a resolution of 2.2 Å using multiple-wavelength anomalous diffraction at the Se K edge. This protein belongs to Pfam sequence family PF08538 and is only distantly related to previously studied members of the α/β-hydrolase fold family. Structural superposition onto representative α/β-hydrolase fold proteins of known function indicates that a possible catalytic nucleophile, Ser116 in the T. brucei protein, lies at the expected location. However, the present structure and by extension the other trypanosomatid members of this sequence family have neither sequence nor structural similarity at the location of other active-site residues typical for proteins with this fold. Together with the presence of an additional domain between strands β6 and β7 that is conserved in trypanosomatid genomes, this suggests that the function of these homologs has diverged from other members of the fold family

  15. Assembly of Robust Bacterial Microcompartment Shells Using Building Blocks from an Organelle of Unknown Function

    Lassila, JK; Bernstein, SL; Kinney, JN; Axen, SD; Kerfeld, CA


    Bacterial microconnpartnnents (BMCs) sequester enzymes from the cytoplasmic environment by encapsulation inside a selectively permeable protein shell. Bioinformatic analyses indicate that many bacteria encode BMC clusters of unknown function and with diverse combinations of shell proteins. The genome of the halophilic myxobacterium Haliangium ochraceum encodes one of the most atypical sets of shell proteins in terms of composition and primary structure. We found that microconnpartnnent shells could be purified in high yield when all seven H. ochraceum BMC shell genes were expressed from a synthetic operon in Escherichia coll. These shells differ substantially from previously isolated shell systems in that they are considerably smaller and more homogeneous, with measured diameters of 39 2 nm. The size and nearly uniform geometry allowed the development of a structural model for the shells composed of 260 hexagonal units and 13 hexagons per icosahedral face. We found that new proteins could be recruited to the shells by fusion to a predicted targeting peptide sequence, setting the stage for the use of these remarkably homogeneous shells for applications such as three-dimensional scaffolding and the construction of synthetic BMCs. Our results demonstrate the value of selecting from the diversity of BMC shell building blocks found in genomic sequence data for the construction of novel compartments. (C) 2014 Elsevier Ltd. All rights reserved.

  16. Meniscofibular Ligament: Morphology and Functional Significance of a Relatively Unknown Anatomical Structure

    K. Natsis


    Full Text Available Purpose. A relatively unknown ligamentous structure of the posterolateral corner of the knee joint, the so-called meniscofibular ligament (MFL, was investigated as regards its macroscopic morphology, its histological features, and its reaction to knee movements. Material and Methods. MFL was exposed on 21 fresh-frozen unpaired knee joints. Its microscopic morphology was examined utilizing for comparison the fibular collateral and the popliteofibular ligament. Results. MFL was encountered in 100% of the specimens as a thin striplike fibrous band extending between the lower border of the lateral meniscus and the head of the fibula. MFL was tense during knee extension and external rotation of the tibia, whereas its histological features were similar to those of fibular collateral and popliteofibular ligament. Discussion. Its precise histological nature is studied as well as its tension alterations during knee movements. The potential functional significance of the MFL with respect to its role in avoidance of lateral meniscus and lateral coronary ligament tears is discussed. Conclusions. MFL presumably provides an additional protection to the lateral meniscus during the last stages of knee extension, as well as to the lateral coronary ligament reducing the possibility of a potential rupture.

  17. An Approach to Function Annotation for Proteins of Unknown Function (PUFs in the Transcriptome of Indian Mulberry.

    K H Dhanyalakshmi

    Full Text Available The modern sequencing technologies are generating large volumes of information at the transcriptome and genome level. Translation of this information into a biological meaning is far behind the race due to which a significant portion of proteins discovered remain as proteins of unknown function (PUFs. Attempts to uncover the functional significance of PUFs are limited due to lack of easy and high throughput functional annotation tools. Here, we report an approach to assign putative functions to PUFs, identified in the transcriptome of mulberry, a perennial tree commonly cultivated as host of silkworm. We utilized the mulberry PUFs generated from leaf tissues exposed to drought stress at whole plant level. A sequence and structure based computational analysis predicted the probable function of the PUFs. For rapid and easy annotation of PUFs, we developed an automated pipeline by integrating diverse bioinformatics tools, designated as PUFs Annotation Server (PUFAS, which also provides a web service API (Application Programming Interface for a large-scale analysis up to a genome. The expression analysis of three selected PUFs annotated by the pipeline revealed abiotic stress responsiveness of the genes, and hence their potential role in stress acclimation pathways. The automated pipeline developed here could be extended to assign functions to PUFs from any organism in general. PUFAS web server is available at and the web service is accessible at

  18. Entire functions sharing one polynomial with their derivatives

    restriction of the hyper order less than 1/2, and obtain some uniqueness theorems of a nonconstant entire function and its derivative sharing a finite nonzero complex number. CM. The results in this paper also improve some known results. Some examples are provided to show that the results in this paper are best possible.

  19. Rampant adaptive evolution in regions of proteins with unknown function in Drosophila simulans.

    Alisha K Holloway


    Full Text Available Adaptive protein evolution is pervasive in Drosophila. Genomic studies, thus far, have analyzed each protein as a single entity. However, the targets of adaptive events may be localized to particular parts of proteins, such as protein domains or regions involved in protein folding. We compared the population genetic mechanisms driving sequence polymorphism and divergence in defined protein domains and non-domain regions. Interestingly, we find that non-domain regions of proteins are more frequent targets of directional selection. Protein domains are also evolving under directional selection, but appear to be under stronger purifying selection than non-domain regions. Non-domain regions of proteins clearly play a major role in adaptive protein evolution on a genomic scale and merit future investigations of their functional properties.

  20. Known structure, unknown function: An inquiry‐based undergraduate biochemistry laboratory course

    Gray, Cynthia; Price, Carol W.; Lee, Christopher T.; Dewald, Alison H.; Cline, Matthew A.; McAnany, Charles E.


    Abstract Undergraduate biochemistry laboratory courses often do not provide students with an authentic research experience, particularly when the express purpose of the laboratory is purely instructional. However, an instructional laboratory course that is inquiry‐ and research‐based could simultaneously impart scientific knowledge and foster a student's research expertise and confidence. We have developed a year‐long undergraduate biochemistry laboratory curriculum wherein students determine, via experiment and computation, the function of a protein of known three‐dimensional structure. The first half of the course is inquiry‐based and modular in design; students learn general biochemical techniques while gaining preparation for research experiments in the second semester. Having learned standard biochemical methods in the first semester, students independently pursue their own (original) research projects in the second semester. This new curriculum has yielded an improvement in student performance and confidence as assessed by various metrics. To disseminate teaching resources to students and instructors alike, a freely accessible Biochemistry Laboratory Education resource is available at © 2015 The Authors Biochemistry and Molecular Biology Education published by Wiley Periodicals, Inc. on behalf of International Union of Biochemistry and Molecular Biology, 43(4):245–262, 2015. PMID:26148241

  1. Known structure, unknown function: An inquiry-based undergraduate biochemistry laboratory course.

    Gray, Cynthia; Price, Carol W; Lee, Christopher T; Dewald, Alison H; Cline, Matthew A; McAnany, Charles E; Columbus, Linda; Mura, Cameron


    Undergraduate biochemistry laboratory courses often do not provide students with an authentic research experience, particularly when the express purpose of the laboratory is purely instructional. However, an instructional laboratory course that is inquiry- and research-based could simultaneously impart scientific knowledge and foster a student's research expertise and confidence. We have developed a year-long undergraduate biochemistry laboratory curriculum wherein students determine, via experiment and computation, the function of a protein of known three-dimensional structure. The first half of the course is inquiry-based and modular in design; students learn general biochemical techniques while gaining preparation for research experiments in the second semester. Having learned standard biochemical methods in the first semester, students independently pursue their own (original) research projects in the second semester. This new curriculum has yielded an improvement in student performance and confidence as assessed by various metrics. To disseminate teaching resources to students and instructors alike, a freely accessible Biochemistry Laboratory Education resource is available at © 2015 The Authors Biochemistry and Molecular Biology Education published by Wiley Periodicals, Inc. on behalf of International Union of Biochemistry and Molecular Biology.

  2. Robust Adaptive Sliding Mode Control for Generalized Function Projective Synchronization of Different Chaotic Systems with Unknown Parameters

    Xiuchun Li


    Full Text Available When the parameters of both drive and response systems are all unknown, an adaptive sliding mode controller, strongly robust to exotic perturbations, is designed for realizing generalized function projective synchronization. Sliding mode surface is given and the controlled system is asymptotically stable on this surface with the passage of time. Based on the adaptation laws and Lyapunov stability theory, an adaptive sliding controller is designed to ensure the occurrence of the sliding motion. Finally, numerical simulations are presented to verify the effectiveness and robustness of the proposed method even when both drive and response systems are perturbed with external disturbances.

  3. Functional outcome and survival after radiotherapy of metastatic spinal cord compression in patients with cancer of unknown primary

    Rades, Dirk; Fehlauer, Fabian; Veninga, Theo; Stalpers, Lukas J.A.; Basic, Hiba; Hoskin, Peter J.; Rudat, Volker; Karstens, Johann H.; Schild, Steven E.; Dunst, Juergen


    Purpose: Patients with cancer of unknown primary (CUP) account for about 10% of patients with metastatic spinal cord compression (MSCC). This study aims to define the appropriate radiation regimen for these patients. Methods and Materials: Data of 143 CUP patients irradiated for MSCC were retrospectively evaluated. Short-course radiotherapy (RT) (1x8 Gy, 5x4 Gy, n = 68) and long-course RT (10x3 Gy, 15x2.5 Gy, 20x2 Gy, n = 75) plus 8 further potential prognostic factors (age, gender, performance status, visceral metastases, other bone metastases, number of involved vertebrae, ambulatory status, time of developing motor deficits before RT) were compared for functional outcome and survival. Results: Improvement of motor function occurred in 10% of patients, no further progression of motor deficits in 57%, and deterioration in 33%. On multivariate analysis, functional outcome was positively associated with slower development of motor deficits (p < 0.001), absence of visceral metastases (p = 0.008) and other bone metastases (p = 0.027), and ambulatory status (p = 0.054), not with the radiation regimen (p = 0.74). Recurrence of MSCC in the irradiated region occurred in 7 patients after median 6 months. Median survival was 4 months. On multivariate analysis, better survival was significantly associated with absence of visceral metastases (p < 0.001), absence of other bone metastases (p = 0.005), ambulatory status (p = 0.001), and slower development of motor deficits (p = 0.030). Conclusions: For MSCC treatment in patients with CUP, no significant difference was observed between short-course and long-course RT regarding functional outcome and survival. Short-course RT appears preferable, at least for patients with a poor predicted survival, as it is more patient convenient and more cost-effective

  4. Exploiting fine-scale genetic and physiological variation of closely related microbes to reveal unknown enzyme functions.

    Badur, Ahmet H; Plutz, Matthew J; Yalamanchili, Geethika; Jagtap, Sujit Sadashiv; Schweder, Thomas; Unfried, Frank; Markert, Stephanie; Polz, Martin F; Hehemann, Jan-Hendrik; Rao, Christopher V


    Polysaccharide degradation by marine microbes represents one of the largest and most rapid heterotrophic transformations of organic matter in the environment. Microbes employ systems of complementary carbohydrate-specific enzymes to deconstruct algal or plant polysaccharides (glycans) into monosaccharides. Because of the high diversity of glycan substrates, the functions of these enzymes are often difficult to establish. One solution to this problem may lie within naturally occurring microdiversity; varying numbers of enzymes, due to gene loss, duplication, or transfer, among closely related environmental microbes create metabolic differences akin to those generated by knock-out strains engineered in the laboratory used to establish the functions of unknown genes. Inspired by this natural fine-scale microbial diversity, we show here that it can be used to develop hypotheses guiding biochemical experiments for establishing the role of these enzymes in nature. In this work, we investigated alginate degradation among closely related strains of the marine bacterium Vibrio splendidus One strain, V. splendidus 13B01, exhibited high extracellular alginate lyase activity compared with other V. splendidus strains. To identify the enzymes responsible for this high extracellular activity, we compared V. splendidus 13B01 with the previously characterized V. splendidus 12B01, which has low extracellular activity and lacks two alginate lyase genes present in V. splendidus 13B01. Using a combination of genomics, proteomics, biochemical, and functional screening, we identified a polysaccharide lyase family 7 enzyme that is unique to V. splendidus 13B01, secreted, and responsible for the rapid digestion of extracellular alginate. These results demonstrate the value of querying the enzymatic repertoires of closely related microbes to rapidly pinpoint key proteins with beneficial functions. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  5. Proteins of unknown function in the Protein Data Bank (PDB): an inventory of true uncharacterized proteins and computational tools for their analysis.

    Nadzirin, Nurul; Firdaus-Raih, Mohd


    Proteins of uncharacterized functions form a large part of many of the currently available biological databases and this situation exists even in the Protein Data Bank (PDB). Our analysis of recent PDB data revealed that only 42.53% of PDB entries (1084 coordinate files) that were categorized under "unknown function" are true examples of proteins of unknown function at this point in time. The remainder 1465 entries also annotated as such appear to be able to have their annotations re-assessed, based on the availability of direct functional characterization experiments for the protein itself, or for homologous sequences or structures thus enabling computational function inference.

  6. Proteins of Unknown Function in the Protein Data Bank (PDB: An Inventory of True Uncharacterized Proteins and Computational Tools for Their Analysis

    Nurul Nadzirin


    Full Text Available Proteins of uncharacterized functions form a large part of many of the currently available biological databases and this situation exists even in the Protein Data Bank (PDB. Our analysis of recent PDB data revealed that only 42.53% of PDB entries (1084 coordinate files that were categorized under “unknown function” are true examples of proteins of unknown function at this point in time. The remainder 1465 entries also annotated as such appear to be able to have their annotations re-assessed, based on the availability of direct functional characterization experiments for the protein itself, or for homologous sequences or structures thus enabling computational function inference.

  7. Distributed Sharing of Functionalities and Resources in Survivable GMPLS-controlled WSONs

    Fagertun, Anna Manolova; Cerutti, I.; Muñoz, R.


    Sharing of functionalities and sharing of network resources are effective solutions for improving the cost-effectiveness of wavelength-switched optical networks (WSONs). Such cost-effectiveness should be pursued together with the objective of ensuring the requested level of performance at the phy...

  8. Shared function knowledge: infants' attention to function information in communicative contexts.

    Träuble, Birgit; Bätz, Johannes


    Humans are specifically adapted to knowledge acquisition and transfer by social communication. According to natural pedagogy theory, infants are highly sensitive to signals that indicate a teacher's communicative intention and are biased to interpret communicative contexts as conveying relevant and generalizable knowledge that is also shared by other conspecifics. We investigated whether infants as young as 12 months interpret ostensively communicated object-directed emotion expressions as generalizable and shareable with others. Given that young infants pay particular attention to information about objects' functions, we were interested in whether the shareability assumption also holds for emotional attitudes toward functional features of unfamiliar objects. The results suggest that 12-month-olds (N=80) flexibly interpret another person's emotion displays toward unfamiliar artifacts either as object-centered and generalizable attitudes or as person-centered subjective attitudes, depending on the communicative characteristics of the learning context. Furthermore, the transfer of ostensively communicated information about the artifacts depended on their functional usability, which is consistent with infants' early sensitivity to function information in various areas of cognitive development. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Organochlorine pesticide level in patients with chronic kidney disease of unknown etiology and its association with renal function.

    Ghosh, Rishila; Siddarth, Manushi; Singh, Neeru; Tyagi, Vipin; Kare, Pawan Kumar; Banerjee, Basu Dev; Kalra, Om Prakash; Tripathi, Ashok Kumar


    Involvement of agrochemicals have been suggested in the development of chronic kidney disease of unknown etiology (CKDu). The association between CKDu and blood level of organochlorine pesticides (OCPs) in CKDu patients has been examined in the present study. All the recruited study subjects (n = 300) were divided in three groups, namely, healthy control (n = 100), patients with chronic kidney disease of unknown etiology (n = 100), and patients with chronic kidney disease of known etiology (CKDk) (n = 100). Blood OCP levels of all three study groups were analyzed by gas chromatography. Increased level of OCPs, namely α-HCH, aldrin, and β-endosulfan, were observed in CKDu patients as compared to healthy control and CKD patients of known etiology. The levels of these pesticides significantly correlated negatively with the estimated glomerular filtration rate (eGFR) and positively with urinary albumin of CKD patients. Logistic regression analysis revealed association of γ-HCH, p, p'-DDE, and β-endosulfan with CKDu on adjustment of age, sex, BMI, and total lipid content. Increased blood level of certain organochlorine pesticides is associated with the development of chronic kidney disease of unknown etiology.

  10. Functions of Memory Sharing and Mother-Child Reminiscing Behaviors: Individual and Cultural Variations

    Kulkofsky, Sarah; Wang, Qi; Koh, Jessie Bee Kim


    This study examined maternal beliefs about the functions of memory sharing and the relations between these beliefs and mother-child reminiscing behaviors in a cross-cultural context. Sixty-three European American and 47 Chinese mothers completed an open-ended questionnaire concerning their beliefs about the functions of parent-child memory…

  11. Share capital in stock corporations under Polish law. Nature – functions – perspectives

    Zdzisław Gordon


    Full Text Available Share capital of stock corporations is a monetary value whose equivalent shareholders are obliged to contribute to a company, and which cannot be paid back by a company to shareholders throughout its duration. Share capital exercises three functions: legal, economic and security-enforcing. From a traditional perspective the security (guarantee function is the most important and it entails that share capital constitutes a guarantee of protecting a company’s creditors. In the literature, however, the ability of share capital to perform this function has been more and more often undermined and consequently proposals are put forward to resign from the construction of share capital. The decision to reform share capital of a limited liability company in Polish law, too, seems already to have been decided upon. It is, however, unacceptable to completely resign from the protection of creditors’ interests since the law must provide protection for weaker participants of trading such as small entrepreneurs in relation to stock companies. A serious alternative to share capital, however, seems to be the protection of creditors through the so-called solvency test, which subjects the payments for the benefit of shareholders to the condition that a company’s assets at least balance its liabilities after such a payment. The protection of creditors based on the solvency test is not, however, free from faults. If the construction of share capital was to be resigned from and the solvency test was to be adopted to serve the function of a means of protecting creditors, it seems necessary to develop a characteristic buffer which would prevent using the construction of a limited liability company in high risk ventures and shifting a considerable amount of this risk on to the company’s business partners, not to mention defending against making use of it for common fraud. The role of such a buffer might be played by an obligatory reserve capital based on the

  12. Software bots -The next frontier for shared services and functional excellence

    Suri, Vipin K.; Elia, Marianne; van Hillegersberg, Jos


    A Software Bot is a fundamental element of Robotics Process Automation (RPA). RPA can be deployed to automate repeatable, mundane, rules-based work-flowed process tasks across multiple functions in an organization, including Shared Services. While RPA holds high promise, using Software Bots for

  13. Stress tolerances of nullmutants of function-unknown genes encoding menadione stress-responsive proteins in Aspergillus nidulans.

    Leiter, Éva; Bálint, Mihály; Miskei, Márton; Orosz, Erzsébet; Szabó, Zsuzsa; Pócsi, István


    A group of menadione stress-responsive function-unkown genes of Aspergillus nidulans (Locus IDs ANID_03987.1, ANID_06058.1, ANID_10219.1, and ANID_10260.1) was deleted and phenotypically characterized. Importantly, comparative and phylogenetic analyses of the tested A. nidulans genes and their orthologs shed light only on the presence of a TANGO2 domain with NRDE protein motif in the translated ANID_06058.1 gene but did not reveal any recognizable protein-encoding domains in other protein sequences. The gene deletion strains were subjected to oxidative, osmotic, and metal ion stress and, surprisingly, only the ΔANID_10219.1 mutant showed an increased sensitivity to 0.12 mmol l(-1) menadione sodium bisulfite. The gene deletions affected the stress sensitivities (tolerances) irregularly, for example, some strains grew more slowly when exposed to various oxidants and/or osmotic stress generating agents, meanwhile the ΔANID_10260.1 mutant possessed a wild-type tolerance to all stressors tested. Our results are in line with earlier studies demonstrating that the deletions of stress-responsive genes do not confer necessarily any stress-sensitivity phenotypes, which can be attributed to compensatory mechanisms based on other elements of the stress response system with overlapping functions. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. An Empirical Study of Financial Shared Services: Understanding of an organization moves towards establishing financial shared service as a strategic finance function

    Nik Mustaffa, Nik Azah Karimah


    This paper is prepared to understand an organization moves towards establishing financial shared service as a strategic finance function. The research is conducted by selected few multinational organizations from oil and gas industry to analyze the purpose of the move, how organizations are restructure and values generated from the financial shared services. The research also will extend towards identifying various challenges faced by the organizations during the restructuring process. The is...

  15. Improving the success and impact of the metabolic engineering design, build, test, learn cycle by addressing proteins of unknown function.

    Jarboe, Laura R


    Rational, predictive metabolic engineering of organisms requires an ability to associate biological activity to the corresponding gene(s). Despite extensive advances in the 20 years since the Escherichia coli genome was published, there are still gaps in our knowledge of protein function. The substantial amount of data that has been published, such as: omics-level characterization in a myriad of conditions; genome-scale libraries; and evolution and genome sequencing, provide means of identifying and prioritizing proteins for characterization. This review describes the scale of this knowledge gap, demonstrates the benefit of addressing the knowledge gap, and demonstrates the availability of interesting candidates for characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Determining firms׳ utility functions and competitive roles from data on market shares using Lotka–Volterra models

    A. Marasco


    Full Text Available In this article, we include data on historical and estimated market shares of two markets. In particular, we include annual data on the market shares of the Japanese beer market (1963–2000 and biannual data on the market shares of the mobile phones market in Greece (1998–2007. In addition, we estimate monthly data on market shares for both markets. We show how this data can be used to derive firms’ utility functions and their competitive roles.

  17. Unique and shared roles of the posterior parietal and dorsolateral prefrontal cortex in cognitive functions

    Fumi eKatsuki


    Full Text Available The dorsolateral prefrontal and posterior parietal cortex are two parts of a broader brain network involved in the control of cognitive functions such as working memory, spatial attention, and decision making. The two areas share many functional properties and exhibit similar patterns of activation during the execution of mental operations. However, neurophysiological experiments in non-human primates have also documented subtle differences, revealing functional specialization within the fronto-parietal network. These differences include the ability of the dorsolateral prefrontal cortex to influence memory performance, attention allocation and motor responses to a greater extent, and to resist interference by distracting stimuli. In recent years, distinct cellular and anatomical differences have been identified, offering insights into how functional specialization is achieved. This article reviews the common functions and functional differences between the dorsolateral prefrontal and posterior parietal cortex, and their underlying mechanisms.

  18. A Practical Framework for Sharing and Rendering Real-World Bidirectional Scattering Distribution Functions

    Ward, Greg [Anywhere Software, Albany, CA (United States); Kurt, Murat [International Computer Institute, Ege University (Turkey); Bonneel, Nicolas [Harvard Univ., Cambridge, MA (United States)


    The utilization of real-world materials has been hindered by a lack of standards for sharing and interpreting measured data. This paper presents an XML representation and an Open Source C library to support bidirectional scattering distribution functions (BSDFs) in data-driven lighting simulation and rendering applications.The library provides for the efficient representation, query, and Monte Carlo sampling of arbitrary BSDFs in amodel-free framework. Currently, we support two BSDF data representations: one using a fixed subdivision of thehemisphere, and one with adaptive density. The fixed type has advantages for certain matrix operations, while theadaptive type can more accurately represent highly peaked data. We discuss advanced methods for data-drivenBSDF rendering for both types, including the proxy of detailed geometry to enhance appearance and accuracy.We also present an advanced interpolation method to reduce measured data into these standard representations.We end with our plan for future extensions and sharing of BSDF data.

  19. Ancient Origin of the CARD–Coiled Coil/Bcl10/MALT1-Like Paracaspase Signaling Complex Indicates Unknown Critical Functions

    Jens Staal


    Full Text Available The CARD–coiled coil (CC/Bcl10/MALT1-like paracaspase (CBM signaling complexes composed of a CARD–CC family member (CARD-9, -10, -11, or -14, Bcl10, and the type 1 paracaspase MALT1 (PCASP1 play a pivotal role in immunity, inflammation, and cancer. Targeting MALT1 proteolytic activity is of potential therapeutic interest. However, little is known about the evolutionary origin and the original functions of the CBM complex. Type 1 paracaspases originated before the last common ancestor of planulozoa (bilaterians and cnidarians. Notably in bilaterians, Ecdysozoa (e.g., nematodes and insects lacks Bcl10, whereas other lineages have a Bcl10 homolog. A survey of invertebrate CARD–CC homologs revealed such homologs only in species with Bcl10, indicating an ancient common origin of the entire CBM complex. Furthermore, vertebrate-like Syk/Zap70 tyrosine kinase homologs with the ITAM-binding SH2 domain were only found in invertebrate organisms with CARD–CC/Bcl10, indicating that this pathway might be related to the original function of the CBM complex. Moreover, the type 1 paracaspase sequences from invertebrate organisms that have CARD–CC/Bcl10 are more similar to vertebrate paracaspases. Functional analysis of protein–protein interactions, NF-κB signaling, and CYLD cleavage for selected invertebrate type 1 paracaspase and Bcl10 homologs supports this scenario and indicates an ancient origin of the CARD–CC/Bcl10/paracaspase signaling complex. By contrast, many of the known MALT1-associated activities evolved fairly recently, indicating that unknown functions are at the basis of the protein conservation. As a proof-of-concept, we provide initial evidence for a CBM- and NF-κB-independent neuronal function of the Caenorhabditis elegans type 1 paracaspase malt-1. In conclusion, this study shows how evolutionary insights may point at alternative functions of MALT1.

  20. Known knowns, known unknowns and unknown unknowns in prokaryotic transposition.

    Siguier, Patricia; Gourbeyre, Edith; Chandler, Michael


    Although the phenomenon of transposition has been known for over 60 years, its overarching importance in modifying and streamlining genomes took some time to recognize. In spite of a robust understanding of transposition of some TE, there remain a number of important TE groups with potential high genome impact and unknown transposition mechanisms and yet others, only recently identified by bioinformatics, yet to be formally confirmed as mobile. Here, we point to some areas of limited understanding concerning well established important TE groups with DDE Tpases, to address central gaps in our knowledge of characterised Tn with other types of Tpases and finally, to highlight new potentially mobile DNA species. It is not exhaustive. Examples have been chosen to provide encouragement in the continued exploration of the considerable prokaryotic mobilome especially in light of the current threat to public health posed by the spread of multiple Ab R . Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Shared atypical default mode and salience network functional connectivity between autism and schizophrenia.

    Chen, Heng; Uddin, Lucina Q; Duan, Xujun; Zheng, Junjie; Long, Zhiliang; Zhang, Youxue; Guo, Xiaonan; Zhang, Yan; Zhao, Jingping; Chen, Huafu


    Schizophrenia and autism spectrum disorder (ASD) are two prevalent neurodevelopmental disorders sharing some similar genetic basis and clinical features. The extent to which they share common neural substrates remains unclear. Resting-state fMRI data were collected from 35 drug-naïve adolescent participants with first-episode schizophrenia (15.6 ± 1.8 years old) and 31 healthy controls (15.4 ± 1.6 years old). Data from 22 participants with ASD (13.1 ± 3.1 years old) and 21 healthy controls (12.9 ± 2.9 years old) were downloaded from the Autism Brain Imaging Data Exchange. Resting-state functional networks were constructed using predefined regions of interest. Multivariate pattern analysis combined with multi-task regression feature selection methods were conducted in two datasets separately. Classification between individuals with disorders and controls was achieved with high accuracy (schizophrenia dataset: accuracy = 83%; ASD dataset: accuracy = 80%). Shared atypical brain connections contributing to classification were mostly present in the default mode network (DMN) and salience network (SN). These functional connections were further related to severity of social deficits in ASD (p = 0.002). Distinct atypical connections were also more related to the DMN and SN, but showed different atypical connectivity patterns between the two disorders. These results suggest some common neural mechanisms contributing to schizophrenia and ASD, and may aid in understanding the pathology of these two neurodevelopmental disorders. Autism Res 2017, 10: 1776-1786. © 2017 International Society for Autism Research, Wiley Periodicals, Inc. Autism spectrum disorder (ASD) and schizophrenia are two common neurodevelopmental disorders which share several genetic and behavioral features. The present study identified common neural mechanisms contributing to ASD and schizophrenia using resting-state functional MRI data. The results may help to understand

  2. Universal failure model for multi-unit systems with shared functionality

    Volovoi, Vitali


    A Universal Failure Model (UFM) is proposed for complex systems that rely on a large number of entities for performing a common function. Economy of scale or other considerations may dictate the need to pool resources for common purpose, but the resulting strong coupling precludes the grouping of those components into modules. Existing system-level failure models rely on modularity for reducing modeling complexity, so the UFM will fill an important gap in constructing efficient system-level models. Conceptually, the UFM resembles cellular automata (CA) infused with realistic failure mechanisms. Components’ behavior is determined based on the balance between their strength (capacity) and their load (demand) share. If the load exceeds the components’ capacity, the component fails and its load share is distributed among its neighbors (possibly with a time delay and load losses). The strength of components can degrade with time if the load exceeds an elastic threshold. The global load (demand) carried by the system can vary over time, with the peak values providing shocks to the system (e.g., wind loads in civil structures, electricity demand, stressful activities to human bodies, or drought in an ecosystem). Unlike the models traditionally studied by CA, the focus of the presented model is on the system reliability, and specifically on the study of time-to-failure distributions, rather than steady-state patterns and average time-to-failure characteristics. In this context, the relationships between the types of failure distributions and the parameters of the failure model are discussed

  3. UCLA's Molecular Screening Shared Resource: enhancing small molecule discovery with functional genomics and new technology.

    Damoiseaux, Robert


    The Molecular Screening Shared Resource (MSSR) offers a comprehensive range of leading-edge high throughput screening (HTS) services including drug discovery, chemical and functional genomics, and novel methods for nano and environmental toxicology. The MSSR is an open access environment with investigators from UCLA as well as from the entire globe. Industrial clients are equally welcome as are non-profit entities. The MSSR is a fee-for-service entity and does not retain intellectual property. In conjunction with the Center for Environmental Implications of Nanotechnology, the MSSR is unique in its dedicated and ongoing efforts towards high throughput toxicity testing of nanomaterials. In addition, the MSSR engages in technology development eliminating bottlenecks from the HTS workflow and enabling novel assays and readouts currently not available.

  4. Control of thumb force using surface functional electrical stimulation and muscle load sharing


    Background Stroke survivors often have difficulties in manipulating objects with their affected hand. Thumb control plays an important role in object manipulation. Surface functional electrical stimulation (FES) can assist movement. We aim to control the 2D thumb force by predicting the sum of individual muscle forces, described by a sigmoidal muscle recruitment curve and a single force direction. Methods Five able bodied subjects and five stroke subjects were strapped in a custom built setup. The forces perpendicular to the thumb in response to FES applied to three thumb muscles were measured. We evaluated the feasibility of using recruitment curve based force vector maps in predicting output forces. In addition, we developed a closed loop force controller. Load sharing between the three muscles was used to solve the redundancy problem having three actuators to control forces in two dimensions. The thumb force was controlled towards target forces of 0.5 N and 1.0 N in multiple directions within the individual’s thumb work space. Hereby, the possibilities to use these force vector maps and the load sharing approach in feed forward and feedback force control were explored. Results The force vector prediction of the obtained model had small RMS errors with respect to the actual measured force vectors (0.22±0.17 N for the healthy subjects; 0.17±0.13 N for the stroke subjects). The stroke subjects showed a limited work range due to limited force production of the individual muscles. Performance of feed forward control without feedback, was better in healthy subjects than in stroke subjects. However, when feedback control was added performances were similar between the two groups. Feedback force control lead, especially for the stroke subjects, to a reduction in stationary errors, which improved performance. Conclusions Thumb muscle responses to FES can be described by a single force direction and a sigmoidal recruitment curve. Force in desired direction can be

  5. Protocol for counterfactually transporting an unknown qubit

    Hatim eSalih


    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  6. Designing towards the unknown

    Wilde, Danielle; Underwood, Jenny


    the research potential to far-ranging possibilities. In this article we unpack the motivations driving the PKI project. We present our mixed-methodology, which entangles textile crafts, design interactions and materiality to shape an embodied enquiry. Our research outcomes are procedural and methodological......New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation—where outcomes remain unknown long enough that new discoveries become possible—is not easy in technology design where complex......, to design towards unknown outcomes, using unknown materials. The impossibility of this task is proving as useful as it is disruptive. At its most potent, it is destabilising expectations, aesthetics and processes. Keeping the researchers, collaborators and participants in a state of unknowing, is opening...

  7. The use of copula functions for modeling the risk of investment in shares traded on the Warsaw Stock Exchange

    Domino, Krzysztof; Błachowicz, Tomasz


    In our work copula functions and the Hurst exponent calculated using the local Detrended Fluctuation Analysis (DFA) were used to investigate the risk of investment made in shares traded on the Warsaw Stock Exchange. The combination of copula functions and the Hurst exponent calculated using local DFA is a new approach. For copula function analysis bivariate variables composed of shares prices of the PEKAO bank (a big bank with high capitalization) and other banks (PKOBP, BZ WBK, MBANK and HANDLOWY in decreasing capitalization order) and companies from other branches (KGHM-mining industry, PKNORLEN-petrol industry as well as ASSECO-software industry) were used. Hurst exponents were calculated for daily shares prices and used to predict high drops of those prices. It appeared to be a valuable indicator in the copula selection procedure, since Hurst exponent’s low values were pointing on heavily tailed copulas e.g. the Clayton one.

  8. Fever of unknown origin

    Misaki, Takashi; Matsui, Akira; Tanaka, Fumiko; Okuno, Yoshishige; Mitsumori, Michihide; Torizuka, Tatsurou; Dokoh, Shigeharu; Hayakawa, Katsumi; Shimbo, Shin-ichirou


    Gallium-67 scintigraphy is a commonly performed imaging modality in deteting pyrogenic lesions in cases of long-standing inexplainable fever. To re-evaluate the significance of gallium imaging in such cases, a retrospective review was made of 56 scans performed in febrile patients in whom sufficient clinical and laboratory findings were obtained. Gallium scans were true positive in 30 patients, false positive in 3, true negative in 19, and false negative in 4. In the group of true positive, local inflammatory lesions were detected in 23 patients with a final diagnosis of lung tuberculosis, urinary tract infection, and inflammatory joint disease. Abnormal gallium accumulation, as shown in the other 7 patients, provided clues to the diagnosis of generalized disorders, such as hematological malignancies (n=3), systemic autoimmune diseases (n=3), and severe infectious mononucleosis (n=one). In the group of false positive, gallium imaging revealed intestinal excretion of gallium in 2 patients and physiological pulmonary hilar accumulation in one. In the true negative group of 19 patients, fever of unknown origin was resolved spontaneously in 12 patients, and with antibiotics and corticosteroids in 2 and 5 patients, respectively. Four patients having false negative scans were finally diagnosed as having urinary tract infection (n=2), bacterial meningitis (n=one), and polyarteritis (n=one). Gallium imaging would remain the technique of choice in searching for origin of unknown fever. It may also be useful for early diagnosis of systemic disease, as well as focal inflammation. (N.K.)

  9. Study of excitation energy sharing in heavy ion collisions as a function of their inelasticity

    Lott, B.


    The excitation energy sharing between the fragments of a heavy ion collision has been studied for quasi-elastic and deep inelastic mechanisms. A 32 S beam of 232 MeV incident energy has been used to bombard several targets (S, 58 Ni, 93 Nb). The evaporated charged particle multiplicities have been measured by inclusive measurements of the projectile-like nuclei and exclusive measurements of the two final nuclei. Evaporation calculations using the Hauser-Feshbach formalism allows us to deduce from the multiplicity measurements the projectile-like excitation energy. These results are compatible with the assumption of an equal sharing of excitation energies for quasi-elastic reaction products, and with the assumption of a mass ratio sharing for fully relaxed reaction products. Limiting values for the relaxation time of this mode have been deduced and are in agreement with predictions from the model developed by Randrup [fr

  10. [Badminton--unknown sport].

    Zekan-Petrinović, Lidija


    For a long time, badminton was considered to be only a slow and light game for children, a game that is played outdoors and is structurally undemanding.Today, it is not an unknown and unrecognised sport, especially after it was included into the Olympics Games in 1992. Badminton is one of the oldest sports in the world. It is suitable for all ages (for children and elderly equally), women and men and even handicapped persons. Beginners can start playing badminton matches early because the basics are learned quickly. As a recreational activity, badminton is very popular in Zagreb. In the last 10 years, a number of halls specialized for badminton or offering badminton as one of available sports activities have been opened in Zagreb. At present, there are over 70 professional playgrounds for training of top contestants but also for the citizens who can play recreational badminton.

  11. High-functioning autism patients share similar but more severe impairments in verbal theory of mind than schizophrenia patients.

    Tin, L N W; Lui, S S Y; Ho, K K Y; Hung, K S Y; Wang, Y; Yeung, H K H; Wong, T Y; Lam, S M; Chan, R C K; Cheung, E F C


    Evidence suggests that autism and schizophrenia share similarities in genetic, neuropsychological and behavioural aspects. Although both disorders are associated with theory of mind (ToM) impairments, a few studies have directly compared ToM between autism patients and schizophrenia patients. This study aimed to investigate to what extent high-functioning autism patients and schizophrenia patients share and differ in ToM performance. Thirty high-functioning autism patients, 30 schizophrenia patients and 30 healthy individuals were recruited. Participants were matched in age, gender and estimated intelligence quotient. The verbal-based Faux Pas Task and the visual-based Yoni Task were utilised to examine first- and higher-order, affective and cognitive ToM. The task/item difficulty of two paradigms was examined using mixed model analyses of variance (ANOVAs). Multiple ANOVAs and mixed model ANOVAs were used to examine group differences in ToM. The Faux Pas Task was more difficult than the Yoni Task. High-functioning autism patients showed more severely impaired verbal-based ToM in the Faux Pas Task, but shared similar visual-based ToM impairments in the Yoni Task with schizophrenia patients. The findings that individuals with high-functioning autism shared similar but more severe impairments in verbal ToM than individuals with schizophrenia support the autism-schizophrenia continuum. The finding that verbal-based but not visual-based ToM was more impaired in high-functioning autism patients than schizophrenia patients could be attributable to the varied task/item difficulty between the two paradigms.

  12. A study of an arbiter function in the structures of a shared bus

    Seck, J.-P.

    The results of a comparative study of synchronous and asynchronous arbiters for managing user access to a shared bus is presented. The best available method is determined to be modular arbiter structures attached only to the decision module. Linear and circular arbitration strategies are examined for suitability for automatic decision-making. A multiple strategies arbiter scheme is devised, involving the superposition of various strategies of one sequential machine into another. It is then possible to modify the strategy on-line if the current strategy is ineffective. The utilization of a multiple structure of cascading arbiter devices is noted to be effective if response time is not a critical matter. Finally, attention is given to automatic circuit testing and fault detection. An example is furnished in terms of a management system for a shared memory in a multimicroprocessor structure.

  13. A Karaoke System with Real-Time Media Merging and Sharing Functions for a Cloud-Computing-Integrated Mobile Device

    Her-Tyan Yeh


    Full Text Available Mobile devices such as personal digital assistants (PDAs, smartphones, and tablets have increased in popularity and are extremely efficient for work-related, social, and entertainment uses. Popular entertainment services have also attracted substantial attention. Thus, relevant industries have exerted considerable efforts in establishing a method by which mobile devices can be used to develop excellent and convenient entertainment services. Because cloud-computing technology is mature and possesses a strong computing processing capacity, integrating this technology into the entertainment service function in mobile devices can reduce the data load on a system and maintain mobile device performances. This study combines cloud computing with a mobile device to design a karaoke system that contains real-time media merging and sharing functions. This system enables users to download music videos (MVs from their mobile device and sing and record their singing by using the device. They can upload the recorded song to the cloud server where it is merged with real-time media. Subsequently, by employing a media streaming technology, users can store their personal MVs in their mobile device or computer and instantaneously share these videos with others on the Internet. Through this process, people can instantly watch shared videos, enjoy the leisure and entertainment effects of mobile devices, and satisfy their desire for singing.

  14. Functional MRI examination of empathy for pain in people with schizophrenia reveals abnormal activation related to cognitive perspective-taking but typical activation linked to affective sharing

    Vistoli, Damien; Lavoie, Marie-Audrey; Sutliff, Stephanie; Jackson, Philip L.; Achim, Amélie M.


    Background Schizophrenia is associated with important disturbances in empathy that are related to everyday functioning. Empathy is classically defined as including affective (sharing others’ emotions) and cognitive (taking others’ cognitive perspectives) processes. In healthy individuals, studies on empathy for pain revealed specific brain systems associated with these sets of processes, notably the anterior middle cingulate (aMCC) and anterior insula (AI) for affective sharing and the bilateral temporoparietal junction (TPJ) for the cognitive processes, but the integrity of these systems in patients with schizophrenia remains uncertain. Methods Patients with schizophrenia and healthy controls performed a pain empathy task while undergoing fMRI scanning. Participants observed pictures of hands in either painful or nonpainful situations and rated the level of pain while imagining either themselves (self) or an unknown person (other) in these situations. Results We included 27 patients with schizophrenia and 21 healthy controls in our analyses. For the pain versus no pain contrast, patients showed overall typical activation patterns in the aMCC and AI, with only a small part of the aMCC showing reduced activation compared with controls. For the other versus self contrast, patients showed an abnormal modulation of activation in the TPJ bilaterally (extending to the posterior superior temporal sulcus, referred to as the TPJ/pSTS). Limitations The design included an unnecessary manipulation of the visual perspective that reduced the number of trials for analysis. The sample size may not account for the heterogeneity of schizophrenia. Conclusion People with schizophrenia showed relatively intact brain activation when observing others’ pain, but showed abnormalities when asked to take the cognitive perspectives of others. PMID:28556774

  15. Recension: Mao - The Unknown Story

    Clausen, Søren


    Anmeldelse - kritisk! - til Sveriges førende Kinatidsskrift af Jung Chang & Jon Halliday's sensationelle "Mao - the Unknown Story".......Anmeldelse - kritisk! - til Sveriges førende Kinatidsskrift af Jung Chang & Jon Halliday's sensationelle "Mao - the Unknown Story"....

  16. 4-O-methylation of glucuronic acid in Arabidopsis glucuronoxylan is catalyzed by a domain of unknown function family 579 protein

    Urbanowicz, Breeanna R.; Peña, Maria J.; Ratnaparkhe, Supriya; Avci, Utku; Backe, Jason; Steet, Heather F.; Foston, Marcus; Li, Hongjia; O’Neill, Malcolm A.; Ragauskas, Arthur J.; Darvill, Alan G.; Wyman, Charles; Gilbert, Harry J.; York, William S.


    The hemicellulose 4-O-methyl glucuronoxylan is one of the principle components present in the secondary cell walls of eudicotyledonous plants. However, the biochemical mechanisms leading to the formation of this polysaccharide and the effects of modulating its structure on the physical properties of the cell wall are poorly understood. We have identified and functionally characterized an Arabidopsis glucuronoxylan methyltransferase (GXMT) that catalyzes 4-O-methylation of the glucuronic acid ...

  17. Shared and Unique Proteins in Human, Mouse and Rat Saliva Proteomes: Footprints of Functional Adaptation

    Robert C. Karn


    Full Text Available The overall goal of our study was to compare the proteins found in the saliva proteomes of three mammals: human, mouse and rat. Our first objective was to compare two human proteomes with very different analysis depths. The 89 shared proteins in this comparison apparently represent a core of highly-expressed human salivary proteins. Of the proteins unique to each proteome, one-half to 2/3 lack signal peptides and probably are contaminants instead of less highly-represented salivary proteins. We recently published the first rodent saliva proteomes with saliva collected from the genome mouse (C57BL/6 and the genome rat (BN/SsNHsd/Mcwi. Our second objective was to compare the proteins in the human proteome with those we identified in the genome mouse and rat to determine those common to all three mammals, as well as the specialized rodent subset. We also identified proteins unique to each of the three mammals, because differences in the secreted protein constitutions can provide clues to differences in the evolutionary adaptation of the secretions in the three different mammals.

  18. A modular design of incremental Lyapunov functions for microgrid control with power sharing

    Persis, Claudio De; Monshizadeh, Nima


    In this paper we contribute a theoretical framework that sheds a new light on the problem of microgrid analysis and control. The starting point is an energy function comprising the kinetic energy associated with the elements that emulate the rotating machinery and terms taking into account the

  19. Shared genetic aetiology between cognitive functions and physical and mental health in UK Biobank (N=112 151) and 24 GWAS consortia

    Hagenaars, S P; Harris, S E; Davies, G; Hill, W D; Liewald, D C M; Ritchie, S J; Marioni, R E; Fawns-Ritchie, C; Cullen, B; Malik, R; Worrall, B B; Sudlow, C L M; Wardlaw, J M; Gallacher, J; Pell, J; McIntosh, A M; Smith, D J; Gale, C R; Deary, I J


    Causes of the well-documented association between low levels of cognitive functioning and many adverse neuropsychiatric outcomes, poorer physical health and earlier death remain unknown. We used linkage disequilibrium regression and polygenic profile scoring to test for shared genetic aetiology between cognitive functions and neuropsychiatric disorders and physical health. Using information provided by many published genome-wide association study consortia, we created polygenic profile scores for 24 vascular–metabolic, neuropsychiatric, physiological–anthropometric and cognitive traits in the participants of UK Biobank, a very large population-based sample (N=112 151). Pleiotropy between cognitive and health traits was quantified by deriving genetic correlations using summary genome-wide association study statistics and to the method of linkage disequilibrium score regression. Substantial and significant genetic correlations were observed between cognitive test scores in the UK Biobank sample and many of the mental and physical health-related traits and disorders assessed here. In addition, highly significant associations were observed between the cognitive test scores in the UK Biobank sample and many polygenic profile scores, including coronary artery disease, stroke, Alzheimer's disease, schizophrenia, autism, major depressive disorder, body mass index, intracranial volume, infant head circumference and childhood cognitive ability. Where disease diagnosis was available for UK Biobank participants, we were able to show that these results were not confounded by those who had the relevant disease. These findings indicate that a substantial level of pleiotropy exists between cognitive abilities and many human mental and physical health disorders and traits and that it can be used to predict phenotypic variance across samples. PMID:26809841

  20. Heterozygous carriers of a Parkin or PINK1 mutation share a common functional endophenotype

    van Nuenen, BF; Siebner, Hartwig; Weiss, MM


    inherited Parkinson disease alters the cortical control of sequential finger movements. METHODS: Nonmanifesting individuals carrying a single heterozygous Parkin (n = 13) or PINK1 (n = 9) mutation and 23 healthy controls without these mutations were studied with functional MRI (fMRI). During f...... rostral dorsal premotor cortex in mutation carriers but not in controls. Task-related activation of these premotor areas was similar in carriers of a Parkin or PINK1 mutation. CONCLUSION: Mutations in different genes linked to recessively inherited Parkinson disease are associated with an additional...... recruitment of rostral supplementary motor area and rostral dorsal premotor cortex during a simple motor sequence task. These premotor areas were recruited independently of the underlying genotype. The observed activation most likely reflects a "generic" compensatory mechanism to maintain motor function...

  1. Sharing Structure and Function in Biological Design with SBOL 2.0.

    Roehner, Nicholas; Beal, Jacob; Clancy, Kevin; Bartley, Bryan; Misirli, Goksel; Grünberg, Raik; Oberortner, Ernst; Pocock, Matthew; Bissell, Michael; Madsen, Curtis; Nguyen, Tramy; Zhang, Michael; Zhang, Zhen; Zundel, Zach; Densmore, Douglas; Gennari, John H; Wipat, Anil; Sauro, Herbert M; Myers, Chris J


    The Synthetic Biology Open Language (SBOL) is a standard that enables collaborative engineering of biological systems across different institutions and tools. SBOL is developed through careful consideration of recent synthetic biology trends, real use cases, and consensus among leading researchers in the field and members of commercial biotechnology enterprises. We demonstrate and discuss how a set of SBOL-enabled software tools can form an integrated, cross-organizational workflow to recapitulate the design of one of the largest published genetic circuits to date, a 4-input AND sensor. This design encompasses the structural components of the system, such as its DNA, RNA, small molecules, and proteins, as well as the interactions between these components that determine the system's behavior/function. The demonstrated workflow and resulting circuit design illustrate the utility of SBOL 2.0 in automating the exchange of structural and functional specifications for genetic parts, devices, and the biological systems in which they operate.

  2. Unique and shared areas of cognitive function in children with intractable frontal or temporal lobe epilepsy.

    Law, Nicole; Widjaja, Elysa; Smith, Mary Lou


    Previous findings have been mixed in terms of identifying a distinct pattern of neuropsychological deficits in children with frontal lobe epilepsy (FLE) and in those with temporal lobe epilepsy (TLE). The current study investigated the neuropsychological similarities and differences across these two pediatric medically intractable localization-related epilepsies. Thirty-eight children with FLE, 20 children with TLE, and 40 healthy children (HC) participated in this study. A comprehensive battery of standardized tests assessed five neuropsychological domains including intelligence, language, memory, executive function, and motor function. A principal component analysis (PCA) was used to distill our neuropsychological measures into latent components to compare between groups. Principal component analysis extracted 5 latent components: executive function (F1), verbal semantics (F2), motor (F3), nonverbal cognition/impulsivity (F4), and verbal cognition/attention (F5). The group with FLE differed from the HC group on F1, F2, F4, and F5, and had worse performance than the group with TLE on F1; the group with TLE had lower performance relative to the HC group on F2. Our findings suggest that, in comparison with neurotypically developing children, children with medically intractable FLE have more widespread neuropsychological impairments than do children with TLE. The differences between the two patient groups were greatest for the factor score most clearly related to executive function. The results provide mixed support for the concept of specificity in neuropsychological dysfunction among different subtypes of localization-related medically intractable childhood epilepsies. Copyright © 2018 Elsevier Inc. All rights reserved.

  3. Plant vegetative and animal cytoplasmic actins share functional competence for spatial development with protists.

    Kandasamy, Muthugapatti K; McKinney, Elizabeth C; Roy, Eileen; Meagher, Richard B


    Actin is an essential multifunctional protein encoded by two distinct ancient classes of genes in animals (cytoplasmic and muscle) and plants (vegetative and reproductive). The prevailing view is that each class of actin variants is functionally distinct. However, we propose that the vegetative plant and cytoplasmic animal variants have conserved functional competence for spatial development inherited from an ancestral protist actin sequence. To test this idea, we ectopically expressed animal and protist actins in Arabidopsis thaliana double vegetative actin mutants that are dramatically altered in cell and organ morphologies. We found that expression of cytoplasmic actins from humans and even a highly divergent invertebrate Ciona intestinalis qualitatively and quantitatively suppressed the root cell polarity and organ defects of act8 act7 mutants and moderately suppressed the root-hairless phenotype of act2 act8 mutants. By contrast, human muscle actins were unable to support prominently any aspect of plant development. Furthermore, actins from three protists representing Choanozoa, Archamoeba, and green algae efficiently suppressed all the phenotypes of both the plant mutants. Remarkably, these data imply that actin's competence to carry out a complex suite of processes essential for multicellular development was already fully developed in single-celled protists and evolved nonprogressively from protists to plants and animals.

  4. Shared Action Spaces: a basis function framework for social re-calibration of sensorimotor representations supporting joint action

    Giovanni ePezzulo


    Full Text Available The article explores the possibilities of formalizing and explaining the mechanisms that support spatial and social perspective alignment sustained over the duration of a social interaction. The basic proposed principle is that in social contexts the mechanisms for sensorimotor transformations and multisensory integration (learn to incorporate information relative to the other actor(s, similar to the "re-calibration" of visual receptive fields in response to repeated tool use. This process aligns or merges the co-actors' spatial representations and creates a "Shared Action Space" supporting key computations of social interactions and joint actions; for example, the remapping between the coordinate systems and frames of reference of the co-actors, including perspective taking, the sensorimotor transformations required for lifting jointly an object, and the predictions of the sensory effects of such joint action. The social re-calibration is proposed to be based on common basis function maps and could constitute an optimal solution to sensorimotor transformation and multisensory integration in joint action or more in general social interaction contexts. However, certain situations such as discrepant postural and viewpoint alignment and associated differences in perspectives between the co-actors could constrain the process quite differently. We discuss how alignment is achieved in the first place, and how it is maintained over time, providing a taxonomy of various forms and mechanisms of space alignment and overlap based, for instance, on automaticity vs. control of the transformations between the two agents. Finally, we discuss the link between low-level mechanisms for the sharing of space and high-level mechanisms for the sharing of cognitive representations.

  5. Distinct and shared cognitive functions mediate event- and time-based prospective memory impairment in normal ageing

    Gonneaud, Julie; Kalpouzos, Grégoria; Bon, Laetitia; Viader, Fausto; Eustache, Francis; Desgranges, Béatrice


    Prospective memory (PM) is the ability to remember to perform an action at a specific point in the future. Regarded as multidimensional, PM involves several cognitive functions that are known to be impaired in normal aging. In the present study, we set out to investigate the cognitive correlates of PM impairment in normal aging. Manipulating cognitive load, we assessed event- and time-based PM, as well as several cognitive functions, including executive functions, working memory and retrospective episodic memory, in healthy subjects covering the entire adulthood. We found that normal aging was characterized by PM decline in all conditions and that event-based PM was more sensitive to the effects of aging than time-based PM. Whatever the conditions, PM was linked to inhibition and processing speed. However, while event-based PM was mainly mediated by binding and retrospective memory processes, time-based PM was mainly related to inhibition. The only distinction between high- and low-load PM cognitive correlates lays in an additional, but marginal, correlation between updating and the high-load PM condition. The association of distinct cognitive functions, as well as shared mechanisms with event- and time-based PM confirms that each type of PM relies on a different set of processes. PMID:21678154

  6. Thymidine kinases share a conserved function for nucleotide salvage and play an essential role in Arabidopsis thaliana growth and development.

    Xu, Jing; Zhang, Lin; Yang, Dong-Lei; Li, Qun; He, Zuhua


    Thymidine kinases (TKs) are important components in the nucleotide salvage pathway. However, knowledge about plant TKs is quite limited. In this study, the molecular function of TKs in Arabidopsis thaliana was investigated. Two TKs were identified and named AtTK1 and AtTK2. Expression of both genes was ubiquitous, but AtTK1 was strongly expressed in high-proliferation tissues. AtTK1 was localized to the cytosol, whereas AtTK2 was localized to the mitochondria. Mutant analysis indicated that the two genes function coordinately to sustain normal plant development. Enzymatic assays showed that the two TK proteins shared similar catalytic specificity for pyrimidine nucleosides. They were able to complement an Escherichia coli strain lacking TK activity. 5'-Fluorodeoxyuridine (FdU) resistance and 5-ethynyl 2'-deoxyuridine (EdU) incorporation assays confirmed their activity in vivo. Furthermore, the tk mutant phenotype could be alleviated by nucleotide feeding, establishing that the biosynthesis of pyrimidine nucleotides was disrupted by the TK deficiency. Finally, both human and rice (Oryza sativa) TKs were able to rescue the tk mutants, demonstrating the functional conservation of TKs across organisms. Taken together, our findings clarify the specialized function of two TKs in A. thaliana and establish that the salvage pathway mediated by the kinases is essential for plant growth and development. © 2015 Institute of Plant Physiology and Ecology, SIBS, CAS New Phytologist © 2015 New Phytologist Trust.

  7. The effects of shared situational awareness on functional and hospital outcomes of hospitalized older adults with heart failure

    Lee JH


    Full Text Available Joo H Lee,1 Sun J Kim,2,3 Julia Lam,4 Sulgi Kim,5 Shunichi Nakagawa,6 Ji W Yoo7,8 1Department of Media and Communication, Hanyang University College of Social Sciences, Seoul, Korea; 2Department of Public Health, 3Institute of Health Services Research, Yonsei University College of Medicine, Seoul, Korea; 4University of Wisconsin School of Medicine and Public Health, Madison, WI, USA; 5Department of Epidemiology and Biostatistics, Case Western Reserve University, Cleveland, OH, USA; 6Department of Medicine, Columbia University College of Physicians and Surgeons, New York, NY, USA; 7Center for Senior Health and Longevity, Aurora Health Care, 8Department of Medicine, University of Wisconsin School of Medicine and Public Health, Milwaukee, WI, USA Background: Functional decline of hospitalized older adults is common and triggers health care expenditures. Physical therapy can retard the functional decline that occurs during hospitalization. This study aims to examine whether shared situational awareness (SSA intervention may enhance the benefits of physical therapy for hospitalized older persons with a common diagnosis, heart failure. Method: An SSA intervention that involved daily multidisciplinary meetings was applied to the care of functionally declining older adults admitted to the medicine floor for heart failure. Covariates were matched between the intervention group (n=473 and control group (n=475. Both intervention and control groups received physical therapy for ≥0.5 hours per day. The following three outcomes were compared between groups: 1 disability, 2 transition to skilled nursing facility (SNF, post-acute care setting, and 3 30-day readmission rate. Results: Disability was lower in the intervention group (28% than in the control group (37% (relative risk [RR] =0.74; 95% confidence interval [CI], 0.35–0.97; P=0.026, and transition to SNF was lower in the intervention group (22% than in the control group (30% (RR =0.77; 95% CI, 0.39

  8. The POU proteins Brn-2 and Oct-6 share important functions in Schwann cell development.

    Jaegle, Martine; Ghazvini, Mehrnaz; Mandemakers, Wim; Piirsoo, Marko; Driegen, Siska; Levavasseur, Francoise; Raghoenath, Smiriti; Grosveld, Frank; Meijer, Dies


    The genetic hierarchy that controls myelination of peripheral nerves by Schwann cells includes the POU domain Oct-6/Scip/Tst-1and the zinc-finger Krox-20/Egr2 transcription factors. These pivotal transcription factors act to control the onset of myelination during development and tissue regeneration in adults following damage. In this report we demonstrate the involvement of a third transcription factor, the POU domain factor Brn-2. We show that Schwann cells express Brn-2 in a developmental profile similar to that of Oct-6 and that Brn-2 gene activation does not depend on Oct-6. Overexpression of Brn-2 in Oct-6-deficient Schwann cells, under control of the Oct-6 Schwann cell enhancer (SCE), results in partial rescue of the developmental delay phenotype, whereas compound disruption of both Brn-2 and Oct-6 results in a much more severe phenotype. Together these data strongly indicate that Brn-2 function largely overlaps with that of Oct-6 in driving the transition from promyelinating to myelinating Schwann cells.

  9. Executive functioning in schizophrenia: Unique and shared variance with measures of fluid intelligence.

    Martin, A K; Mowry, B; Reutens, D; Robinson, G A


    Patients with schizophrenia often display deficits on tasks thought to measure "executive" processes. Recently, it has been suggested that reductions in fluid intelligence test performance entirely explain deficits reported for patients with focal frontal lesions on classical executive tasks. For patients with schizophrenia, it is unclear whether deficits on executive tasks are entirely accountable by fluid intelligence and representative of a common general process or best accounted for by distinct contributions to the cognitive profile of schizophrenia. In the current study, 50 patients with schizophrenia and 50 age, sex and premorbid intelligence matched controls were assessed using a broad neuropsychological battery, including tasks considered sensitive to executive abilities, namely the Hayling Sentence Completion Test (HSCT), word fluency, Stroop test, digit-span backwards, and spatial working memory. Fluid intelligence was measured using both the Matrix reasoning subtest from the Weschler Abbreviated Scale of Intelligence (WASI) and a composite score derived from a number of cognitive tests. Patients with schizophrenia were impaired on all cognitive measures compared with controls, except smell identification and the optimal betting and risk-taking measures from the Cambridge Gambling Task. After introducing fluid intelligence as a covariate, significant differences remained for HSCT suppression errors, and classical executive function tests such as the Stroop test and semantic/phonemic word fluency, regardless of which fluid intelligence measure was included. Fluid intelligence does not entirely explain impaired performance on all tests considered as reflecting "executive" processes. For schizophrenia, these measures should remain part of a comprehensive neuropsychological assessment alongside a measure of fluid intelligence. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. Determining firms' utility functions and competitive roles from data on market shares using Lotka-Volterra models

    A. Marasco; A. Picucci; A. Romano (Alessandro)


    textabstractIn this article, we include data on historical and estimated market shares of two markets. In particular, we include annual data on the market shares of the Japanese beer market (1963-2000) and biannual data on the market shares of the mobile phones market in Greece (1998-2007). In

  11. Measurement of cardiovascular function using a novel view-sharing PET reconstruction method and tracer kinetic analysis

    Paul R. Territo


    Full Text Available Abstract Recent advancements in PET instrumentation have made the non-invasive assessment of cardiovascular function in small animals a reality. The majority of small animal PET systems use stationary detector gantries, thus affording high temporal resolution imaging of cardiac function. Systems designed to maximize spatial resolution and detection sensitivity employing rotating gantry designs are suboptimal when high temporal resolution imaging is needed. To overcome this limitation, the current work developed a novel view-sharing data analysis scheme suitable for dynamic cardiac PET imaging using 18F-NaF as the tracer and tracer kinetic model analysis. This scheme was tested in a rat model of cardiovascular function where the relationship between direct transonic flow measures of cardiac output were highly correlated (f(x = 1.0216x − 24.233, R = 0.9158, p < 0.001 with the new model. Similarly, derived measures of stroke volume were also highly correlated (f(x = 0.9655x − 0.0428, R = 0.9453, p < 0.001 with the current approach. Administration of xylazine caused a statistically significant increase in stroke volume (0.32 ± 0.07 ml, p = 0.003, n = 4 and a significant decrease in both heart rate (−155 ± 7.1 beats/min, p < 0.001, n = 4 and cardiac output (−75.9 ± 23.0 ml/kg min, p = 0.01, n = 4. These findings suggest that the new sinogram binning and kinetic modeling methods produce reliable cardiac function measures suitable for longitudinal monitoring of cardiovascular function.

  12. Unknown foundation determination for scour.


    Unknown foundations affect about 9,000 bridges in Texas. For bridges over rivers, this creates a problem : regarding scour decisions as the calculated scour depth cannot be compared to the foundation depth, and a : very conservative costly approach m...

  13. Improvement of the Torque-Speed Performance and Drive Efficiency in an SRM Using an Optimal Torque Sharing Function

    Wei Ye


    Full Text Available In this paper, by evaluating the extreme value of the qth-power current, a torque sharing function (TSF family for reducing the torque ripples in the switched reluctance motor (SRM is proposed. The optimization criteria of the TSF has two secondary objectives, including the maximization of the torque-speed range and the minimization of copper loss. The evaluation indices in terms of the peak phase current, the rms (root mean square phase current, and the torque ripple factor are compared between the proposed TSF family and four conventional TSFs including linear, sinusoidal, exponential, and cubic TSFs. An optimization objective function that combines the maximum absolute value of the rate-of-change of the flux linkage (MAV-RCFL and the qth-power of current is proposed and a weighting factor is used to balance the influence of the two optimization objectives. An optimal TSF can be easily obtained by solving the optimization problem from the TSF family. The proposed TSF is validated by using simulations and experiments with a three-phase 6/4 SRM with 7.5 kW, 3000 rpm, and 270 V DC-link voltage. The dynamic simulation model is implemented in Matlab/Simulink. The results demonstrate the validity and superiority of the proposed control method; the optimal TSF provides better torque-speed performance, and a better reduction in copper loss and torque ripples at high speed, as compared to conventional TSFs.

  14. Understanding the cognitive and genetic underpinnings of procrastination: Evidence for shared genetic influences with goal management and executive function abilities.

    Gustavson, Daniel E; Miyake, Akira; Hewitt, John K; Friedman, Naomi P


    Previous research has suggested that individual differences in procrastination are tied to everyday goal-management abilities, but little research has been conducted on specific cognitive abilities that may underlie tendencies for procrastination, such as executive functions (EFs). In this study, we used behavioral genetics methodology to investigate 2 hypotheses about the relationships between procrastination and EF ability: (a) that procrastination is negatively correlated with general EF ability, and (b) that this relationship is due to the genetic components of procrastination that are most related to other everyday goal-management abilities. The results confirmed both of these hypotheses. Procrastination was related to worse general EF ability at both the phenotypic and genetic levels, and this relationship was due to the component of procrastination shared with self-report measures of everyday goal-management failures. These results were observed even after controlling for potential self-report biases stemming from the urge to respond in a socially desirable manner. Together, these findings provide strong evidence for growing theories of procrastination emphasizing the importance of goal-related cognitive abilities and further highlight important genetic influences that underlie procrastination. (c) 2015 APA, all rights reserved).

  15. Allocating monitoring effort in the face of unknown unknowns

    Wintle, B.A.; Runge, M.C.; Bekessy, S.A.


    There is a growing view that to make efficient use of resources, ecological monitoring should be hypothesis-driven and targeted to address specific management questions. 'Targeted' monitoring has been contrasted with other approaches in which a range of quantities are monitored in case they exhibit an alarming trend or provide ad hoc ecological insights. The second form of monitoring, described as surveillance, has been criticized because it does not usually aim to discern between competing hypotheses, and its benefits are harder to identify a priori. The alternative view is that the existence of surveillance data may enable rapid corroboration of emerging hypotheses or help to detect important 'unknown unknowns' that, if undetected, could lead to catastrophic outcomes or missed opportunities. We derive a model to evaluate and compare the efficiency of investments in surveillance and targeted monitoring. We find that a decision to invest in surveillance monitoring may be defensible if: (1) the surveillance design is more likely to discover or corroborate previously unknown phenomena than a targeted design and (2) the expected benefits (or avoided costs) arising from discovery are substantially higher than those arising from a well-planned targeted design. Our examination highlights the importance of being explicit about the objectives, costs and expected benefits of monitoring in a decision analytic framework. ?? 2010 Blackwell Publishing Ltd/CNRS.

  16. Shared pledge shared vision

    Boussaha, Ali; Diatta, Christian Sina


    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  17. Shared genetic origins of allergy and autoimmune diseases

    Waage, J. E.; Kreiner-Møller, E.; Standl, M.


    Parallel increases in allergy and autoimmune disease prevalence in recent time suggest shared, but yet unknown, etiologies. Here, we investigated shared genetic loci and molecular pathways to identify possible shared disease mechanisms between allergy and autoimmune diseases.......Parallel increases in allergy and autoimmune disease prevalence in recent time suggest shared, but yet unknown, etiologies. Here, we investigated shared genetic loci and molecular pathways to identify possible shared disease mechanisms between allergy and autoimmune diseases....

  18. Citrus psorosis virus RNA 1 is of negative polarity and potentially encodes in its complementary strand a 24K protein of unknown function and 280K putative RNA dependent RNA polymerase.

    Naum-Onganía, Gabriela; Gago-Zachert, Selma; Peña, Eduardo; Grau, Oscar; Garcia, Maria Laura


    Citrus psorosis virus (CPsV), the type member of genus Ophiovirus, has three genomic RNAs. Complete sequencing of CPsV RNA 1 revealed a size of 8184 nucleotides and Northern blot hybridization with chain specific probes showed that its non-coding strand is preferentially encapsidated. The complementary strand of RNA 1 contains two open reading frames (ORFs) separated by a 109-nt intergenic region, one located near the 5'-end potentially encoding a 24K protein of unknown function, and another of 280K containing the core polymerase motifs characteristic of viral RNA-dependent RNA polymerases (RdRp). Comparison of the core RdRp motifs of negative-stranded RNA viruses, supports grouping CPsV, Ranunculus white mottle virus (RWMV) and Mirafiori lettuce virus (MiLV) within the same genus (Ophiovirus), constituting a monophyletic group separated from all other negative-stranded RNA viruses. Furthermore, RNAs 1 of MiLV, CPsV and RWMV are similar in size and those of MiLV and CPsV also in genomic organization and sequence.

  19. Homegrown terrorism; the known unknown

    Hinkkainen, Kaisa


    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  20. Financial Development and Economic Growth: Known Knowns, Known Unknowns, and Unknown Unknowns

    Ugo Panizza


    This paper summarizes the main findings of the literature on the relationship between financial and economic development (the known knowns), points to directions for future research (the known unknowns), and then speculates on the third Rumsfeldian category. The known knowns section organizes the empirical literature on finance and growth into three strands: (i) the traditional literature which established the link between finance and growth; (ii) the new literature which qualified some of th...

  1. To share and be shared

    Winther, Ida Wentzel


    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  2. Intraabdominal abscessus of unknown etiology

    Čolović Radoje


    Full Text Available Introduction. Intraabdominal abscesses are in 98-99% cases the result of secondary and only in 1-2% of primary peritonitis. They are easy and successfully diagnosed. Abdominal abscesses of unknown cause are extremely rare. Case Outline. The authors present a 68-year-old man, without significant data in past history, who suddenly developed epigastric pain, nausea, vomiting and leukocytosis which was treated with antibiotics resulting in the alleviation of complaints and reduction of white blood cells count. After five days ultrasonography showed incapsulated collection of dense fluid in the epigastrium confirmed by CT scan two days later. Upper endoscopy excluded ulcer and/or perforation of the stomach and duodenum. Under local anesthesia, through the upper part of the left rectal muscle, puncture followed by incision was done, and about 50 ml of dense pus was removed. Finger exploration of the cavity showed no foreign body within the cavity. Using drainage, the recovery was quick and uneventful. By preoperative and postoperative abdominal investigations no cause of the abscess was found. Two and a half years after surgery the patient remained symptom-free with normal clinical, laboratory and ultrasonographic findings. Conclusion. The authors presented an intraabdominal abscess of unknown cause that was successfully treated with antibiotics, percutaneous puncture and drainage under local anaesthesia. In spite of all diagnostic methods the cause of the abscess could not be found. Thus, such a possibility, although being rare, should be taken into account.

  3. Sharing City

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  4. [Focal myositis: An unknown disease].

    Gallay, L; Streichenberger, N; Benveniste, O; Allenbach, Y


    Focal myositis are inflammatory muscle diseases of unknown origin. At the opposite from the other idiopathic inflammatory myopathies, they are restricted to a single muscle or to a muscle group. They are not associated with extramuscular manifestations, and they have a good prognosis without any treatment. They are characterized by a localized swelling affecting mostly lower limbs. The pseudo-tumor can be painful, but is not associated with a muscle weakness. Creatine kinase level is normal. Muscle MRI shows an inflammation restricted to a muscle or a muscle group. Muscle biopsy and pathological analysis remain necessary for the diagnosis, showing inflammatory infiltrates composed by macrophages and lymphocytes without any specific distribution within the muscle. Focal overexpression of HLA-1 by the muscle fibers is frequently observed. The muscle biopsy permits to rule out differential diagnosis such a malignancy (sarcoma). Spontaneous remission occurs within weeks or months after the first symptoms, relapse is unusual. Copyright © 2017. Published by Elsevier SAS.

  5. Previously unknown species of Aspergillus.

    Gautier, M; Normand, A-C; Ranque, S


    The use of multi-locus DNA sequence analysis has led to the description of previously unknown 'cryptic' Aspergillus species, whereas classical morphology-based identification of Aspergillus remains limited to the section or species-complex level. The current literature highlights two main features concerning these 'cryptic' Aspergillus species. First, the prevalence of such species in clinical samples is relatively high compared with emergent filamentous fungal taxa such as Mucorales, Scedosporium or Fusarium. Second, it is clearly important to identify these species in the clinical laboratory because of the high frequency of antifungal drug-resistant isolates of such Aspergillus species. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry (MALDI-TOF MS) has recently been shown to enable the identification of filamentous fungi with an accuracy similar to that of DNA sequence-based methods. As MALDI-TOF MS is well suited to the routine clinical laboratory workflow, it facilitates the identification of these 'cryptic' Aspergillus species at the routine mycology bench. The rapid establishment of enhanced filamentous fungi identification facilities will lead to a better understanding of the epidemiology and clinical importance of these emerging Aspergillus species. Based on routine MALDI-TOF MS-based identification results, we provide original insights into the key interpretation issues of a positive Aspergillus culture from a clinical sample. Which ubiquitous species that are frequently isolated from air samples are rarely involved in human invasive disease? Can both the species and the type of biological sample indicate Aspergillus carriage, colonization or infection in a patient? Highly accurate routine filamentous fungi identification is central to enhance the understanding of these previously unknown Aspergillus species, with a vital impact on further improved patient care. Copyright © 2016 European Society of Clinical Microbiology and

  6. File sharing

    van Eijk, N.


    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  7. Shared leadership

    Ulhøi, John Parm; Müller, Sabine


    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  8. Large scale fusion of gray matter and resting-state functional MRI reveals common and shared biological markers across the psychosis spectrum in the B-SNIP cohort

    Zheng eWang


    Full Text Available To investigate whether aberrant interactions between brain structure and function present similarly or differently across probands with psychotic illnesses (schizophrenia (SZ, schizoaffective disorder (SAD, and bipolar I disorder with psychosis (BP and whether these deficits are shared with their first-degree non-psychotic relatives. A total of 1199 subjects were assessed, including 220 SZ, 147 SAD, 180 psychotic BP, 150 first-degree relatives of SZ, 126 SAD relatives, 134 BP relatives and 242 healthy controls. All subjects underwent structural MRI (sMRI and resting-state functional MRI (rs-fMRI scanning. Joint independent analysis (jICA was used to fuse sMRI gray matter (GM and rs-fMRI amplitude of low frequency fluctuations (ALFF data to identify the relationship between the two modalities. Joint ICA revealed two significantly fused components. The association between functional brain alteration in a prefrontal-striatal-thalamic-cerebellar network and structural abnormalities in the default mode network (DMN was found to be common across psychotic diagnoses and correlated with cognitive function, social function and Schizo-Bipolar Scale (SBS scores. The fused alteration in the temporal lobe was unique to SZ and SAD. The above effects were not seen in any relative group (including those with cluster-A personality. Using a multivariate fused approach involving two widely used imaging markers we demonstrate both shared and distinct biological traits across the psychosis spectrum. Further, our results suggest that the above traits are psychosis biomarkers rather than endophenotypes.

  9. Networks of Food Sharing Reveal the Functional Significance of Multilevel Sociality in Two Hunter-Gatherer Groups.

    Dyble, Mark; Thompson, James; Smith, Daniel; Salali, Gul Deniz; Chaudhary, Nikhil; Page, Abigail E; Vinicuis, Lucio; Mace, Ruth; Migliano, Andrea Bamberg


    Like many other mammalian and primate societies [1-4], humans are said to live in multilevel social groups, with individuals situated in a series of hierarchically structured sub-groups [5, 6]. Although this multilevel social organization has been described among contemporary hunter-gatherers [5], questions remain as to the benefits that individuals derive from living in such groups. Here, we show that food sharing among two populations of contemporary hunter-gatherers-the Palanan Agta (Philippines) and Mbendjele BaYaka (Republic of Congo)-reveals similar multilevel social structures, with individuals situated in households, within sharing clusters of 3-4 households, within the wider residential camps, which vary in size. We suggest that these groupings serve to facilitate inter-sexual provisioning, kin provisioning, and risk reduction reciprocity, three levels of cooperation argued to be fundamental in human societies [7, 8]. Humans have a suite of derived life history characteristics including a long childhood and short inter-birth intervals that make offspring energetically demanding [9] and have moved to a dietary niche that often involves the exploitation of difficult to acquire foods with highly variable return rates [10-12]. This means that human foragers face both day-to-day and more long-term energetic deficits that conspire to make humans energetically interdependent. We suggest that a multilevel social organization allows individuals access to both the food sharing partners required to buffer themselves against energetic shortfalls and the cooperative partners required for skill-based tasks such as cooperative foraging. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Knowledge Sharing

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....




    Full Text Available The objective of the Functional Data Analysis techniques is to study such type of data which consist of observed functions or curves evaluated at a finite subset of some real interval.   Techniques in Functional Data Analysis can be used to study the variation in a random sample of real functions, xi(t, i=1, 2, …, N and their derivatives. In practice, these functions are often a consequence of a preliminary smoothing process applied to discrete data and in this work, Spline Smoothing Methods are used.  As the number of functions and the number of observation points increases, it would be difficult to handle the functions  altogether. In order to overcome this complexity, we utilize Functional and Regularized Functional Principal Component Analyses where a high percentage of total variation  could be accounted for with only a few component functions.  Finally, an application on the daily closing data for the share prices of the companies belonging to the ISE-30 index is also given.

  12. Functional variants in the LRRK2 gene confer shared effects on risk for Crohn's disease and Parkinson's disease.

    Hui, Ken Y; Fernandez-Hernandez, Heriberto; Hu, Jianzhong; Schaffner, Adam; Pankratz, Nathan; Hsu, Nai-Yun; Chuang, Ling-Shiang; Carmi, Shai; Villaverde, Nicole; Li, Xianting; Rivas, Manual; Levine, Adam P; Bao, Xiuliang; Labrias, Philippe R; Haritunians, Talin; Ruane, Darren; Gettler, Kyle; Chen, Ernie; Li, Dalin; Schiff, Elena R; Pontikos, Nikolas; Barzilai, Nir; Brant, Steven R; Bressman, Susan; Cheifetz, Adam S; Clark, Lorraine N; Daly, Mark J; Desnick, Robert J; Duerr, Richard H; Katz, Seymour; Lencz, Todd; Myers, Richard H; Ostrer, Harry; Ozelius, Laurie; Payami, Haydeh; Peter, Yakov; Rioux, John D; Segal, Anthony W; Scott, William K; Silverberg, Mark S; Vance, Jeffery M; Ubarretxena-Belandia, Iban; Foroud, Tatiana; Atzmon, Gil; Pe'er, Itsik; Ioannou, Yiannis; McGovern, Dermot P B; Yue, Zhenyu; Schadt, Eric E; Cho, Judy H; Peter, Inga


    Crohn's disease (CD), a form of inflammatory bowel disease, has a higher prevalence in Ashkenazi Jewish than in non-Jewish European populations. To define the role of nonsynonymous mutations, we performed exome sequencing of Ashkenazi Jewish patients with CD, followed by array-based genotyping and association analysis in 2066 CD cases and 3633 healthy controls. We detected association signals in the LRRK2 gene that conferred risk for CD (N2081D variant, P = 9.5 × 10 -10 ) or protection from CD (N551K variant, tagging R1398H-associated haplotype, P = 3.3 × 10 -8 ). These variants affected CD age of onset, disease location, LRRK2 activity, and autophagy. Bayesian network analysis of CD patient intestinal tissue further implicated LRRK2 in CD pathogenesis. Analysis of the extended LRRK2 locus in 24,570 CD cases, patients with Parkinson's disease (PD), and healthy controls revealed extensive pleiotropy, with shared genetic effects between CD and PD in both Ashkenazi Jewish and non-Jewish cohorts. The LRRK2 N2081D CD risk allele is located in the same kinase domain as G2019S, a mutation that is the major genetic cause of familial and sporadic PD. Like the G2019S mutation, the N2081D variant was associated with increased kinase activity, whereas neither N551K nor R1398H variants on the protective haplotype altered kinase activity. We also confirmed that R1398H, but not N551K, increased guanosine triphosphate binding and hydrolyzing enzyme (GTPase) activity, thereby deactivating LRRK2. The presence of shared LRRK2 alleles in CD and PD provides refined insight into disease mechanisms and may have major implications for the treatment of these two seemingly unrelated diseases. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  13. Phylogeny and phylogeography of functional genes shared among seven terrestrial subsurface metagenomes reveal N-cycling and microbial evolutionary relationships

    Maggie CY Lau


    Full Text Available Comparative studies on community phylogenetics and phylogeography of microorganisms living in extreme environments are rare. Terrestrial subsurface habitats are valuable for studying microbial biogeographical patterns due to their isolation and the restricted dispersal mechanisms. Since the taxonomic identity of a microorganism does not always correspond well with its functional role in a particular community, the use of taxonomic assignments or patterns may give limited inference on how microbial functions are affected by historical, geographical and environmental factors. With seven metagenomic libraries generated from fracture water samples collected from five South African mines, this study was carried out to (1 screen for ubiquitous functions or pathways of biogeochemical cycling of CH4, S and N; (2 to characterize the biodiversity represented by the common functional genes; (3 to investigate the subsurface biogeography as revealed by this subset of genes; and (4 to explore the possibility of using metagenomic data for evolutionary study. The ubiquitous functional genes are NarV, NPD, PAP reductase, NifH, NifD, NifK, NifE and NifN genes. Although these 8 common functional genes were taxonomically and phylogenetically diverse and distinct from each other, the dissimilarity between samples did not correlate strongly with either geographical, environmental or residence time of the water. Por genes homologous to those of Thermodesulfovibrio yellowstonii detected in all metagenomes were deep lineages of Nitrospirae, suggesting that subsurface habitats have preserved ancestral genetic signatures that inform the study of the origin and evolution of prokaryotes.

  14. Iterative Selection of Unknown Weights in Direct Weight Optimization Identification

    Xiao Xuan


    Full Text Available To the direct weight optimization identification of the nonlinear system, we add some linear terms about input sequences in the former linear affine function so as to approximate the nonlinear property. To choose the two classes of unknown weights in the more linear terms, this paper derives the detailed process on how to choose these unknown weights from theoretical analysis and engineering practice, respectively, and makes sure of their key roles between the unknown weights. From the theoretical analysis, the added unknown weights’ auxiliary role can be known in the whole process of approximating the nonlinear system. From the practical analysis, we learn how to transform one complex optimization problem to its corresponding common quadratic program problem. Then, the common quadratic program problem can be solved by the basic interior point method. Finally, the efficiency and possibility of the proposed strategies can be confirmed by the simulation results.

  15. Semantic aspects of the International Classification of Functioning, Disability and Health: towards sharing knowledge and unifying information.

    Andronache, Adrian Stefan; Simoncello, Andrea; Della Mea, Vincenzo; Daffara, Carlo; Francescutti, Carlo


    During the last decade, under the World Health Organization's direction, the International Classification of Functioning, Disability and Health (ICF) has become a reference tool for monitoring and developing various policies addressing people with disability. This article presents three steps to increase the semantic interoperability of ICF: first, the representation of ICF using ontology tools; second, the alignment to upper-level ontologies; and third, the use of these tools to implement semantic mappings between ICF and other tools, such as disability assessment instruments, health classifications, and at least partially formalized terminologies.

  16. Plant Vegetative and Animal Cytoplasmic Actins Share Functional Competence for Spatial Development with Protists[W][OA

    Kandasamy, Muthugapatti K.; McKinney, Elizabeth C.; Roy, Eileen; Meagher, Richard B.


    Actin is an essential multifunctional protein encoded by two distinct ancient classes of genes in animals (cytoplasmic and muscle) and plants (vegetative and reproductive). The prevailing view is that each class of actin variants is functionally distinct. However, we propose that the vegetative plant and cytoplasmic animal variants have conserved functional competence for spatial development inherited from an ancestral protist actin sequence. To test this idea, we ectopically expressed animal and protist actins in Arabidopsis thaliana double vegetative actin mutants that are dramatically altered in cell and organ morphologies. We found that expression of cytoplasmic actins from humans and even a highly divergent invertebrate Ciona intestinalis qualitatively and quantitatively suppressed the root cell polarity and organ defects of act8 act7 mutants and moderately suppressed the root-hairless phenotype of act2 act8 mutants. By contrast, human muscle actins were unable to support prominently any aspect of plant development. Furthermore, actins from three protists representing Choanozoa, Archamoeba, and green algae efficiently suppressed all the phenotypes of both the plant mutants. Remarkably, these data imply that actin’s competence to carry out a complex suite of processes essential for multicellular development was already fully developed in single-celled protists and evolved nonprogressively from protists to plants and animals. PMID:22589468

  17. TRPA1 channels in Drosophila and honey bee ectoparasitic mites share heat sensitivity and temperature-related physiological functions

    Guangda Peng


    Full Text Available The transient receptor potential cation channel, subfamily A, member 1 (TRPA1 is conserved between many arthropods, and in some has been shown to function as a chemosensor for noxious compounds. Activation of arthropod TRPA1 channels by temperature fluctuations has been tested in only a few insect species, and all of them were shown to be activated by heat. The recent identification of chemosensitive TRPA1 channels from two honey bee ectoparasitic mite species (VdTRPA1 and TmTRPA1 have provided an opportunity to study the temperature-dependent activation and the temperature-associated physiological functions of TRPA1 channels in non-insect arthropods. We found that both mite TRPA1 channels are heat sensitive and capable of rescuing the temperature-related behavioral defects of a Drosophila melanogaster trpA1 mutant. These results suggest that heat-sensitivity of TRPA1 could be conserved between many arthropods despite its amino acid sequence diversity. Nevertheless, the ankyrin repeats (ARs 6 and 7 are well-conserved between six heat-sensitive arthropod TRPA1 channels and have critical roles for the heat activation of VdTRPA1.

  18. Comprehensive identification and clustering of CLV3/ESR-related (CLE) genes in plants finds groups with potentially shared function.

    Goad, David M; Zhu, Chuanmei; Kellogg, Elizabeth A


    CLV3/ESR (CLE) proteins are important signaling peptides in plants. The short CLE peptide (12-13 amino acids) is cleaved from a larger pre-propeptide and functions as an extracellular ligand. The CLE family is large and has resisted attempts at classification because the CLE domain is too short for reliable phylogenetic analysis and the pre-propeptide is too variable. We used a model-based search for CLE domains from 57 plant genomes and used the entire pre-propeptide for comprehensive clustering analysis. In total, 1628 CLE genes were identified in land plants, with none recognizable from green algae. These CLEs form 12 groups within which CLE domains are largely conserved and pre-propeptides can be aligned. Most clusters contain sequences from monocots, eudicots and Amborella trichopoda, with sequences from Picea abies, Selaginella moellendorffii and Physcomitrella patens scattered in some clusters. We easily identified previously known clusters involved in vascular differentiation and nodulation. In addition, we found a number of discrete groups whose function remains poorly characterized. Available data indicate that CLE proteins within a cluster are likely to share function, whereas those from different clusters play at least partially different roles. Our analysis provides a foundation for future evolutionary and functional studies. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  19. HCMV gB shares structural and functional properties with gB proteins from other herpesviruses

    Sharma, Sapna [Department of Molecular Biology and Microbiology, Tufts University School of Medicine, 136 Harrison Avenue, Boston, MA 02111 (United States); Wisner, Todd W.; Johnson, David C. [Department of Molecular Microbiology and Immunology, Oregon Health and Sciences University, Portland, OR 97239 (United States); Heldwein, Ekaterina E., E-mail: [Department of Molecular Biology and Microbiology, Tufts University School of Medicine, 136 Harrison Avenue, Boston, MA 02111 (United States)


    Glycoprotein B (gB) facilitates HCMV entry into cells by binding receptors and mediating membrane fusion. The crystal structures of gB ectodomains from HSV-1 and EBV are available, but little is known about the HCMV gB structure. Using multiangle light scattering and electron microscopy, we show here that HCMV gB ectodomain is a trimer with the overall shape similar to HSV-1 and EBV gB ectodomains. HCMV gB ectodomain forms rosettes similar to rosettes formed by EBV gB and the postfusion forms of other viral fusogens. Substitution of several bulky hydrophobic residues within the putative fusion loops with more hydrophilic residues reduced rosette formation and abolished cell fusion. We propose that like gB proteins from HSV-1 and EBV, HCMV gB has two internal hydrophobic fusion loops that likely interact with target membranes. Our work establishes structural and functional similarities between gB proteins from three subfamilies of herpesviruses.

  20. Shared goals and development

    Blomberg, Olle


    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  1. Sharing knowledge


    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  2. Quantum circuits cannot control unknown operations

    Araújo, Mateus; Feix, Adrien; Costa, Fabio; Brukner, Časlav


    One of the essential building blocks of classical computer programs is the ‘if’ clause, which executes a subroutine depending on the value of a control variable. Similarly, several quantum algorithms rely on applying a unitary operation conditioned on the state of a control system. Here we show that this control cannot be performed by a quantum circuit if the unitary is completely unknown. The task remains impossible even if we allow the control to be done modulo a global phase. However, this no-go theorem does not prevent implementing quantum control of unknown unitaries in practice, as any physical implementation of an unknown unitary provides additional information that makes the control possible. We then argue that one should extend the quantum circuit formalism to capture this possibility in a straightforward way. This is done by allowing unknown unitaries to be applied to subspaces and not only to subsystems. (paper)

  3. Multifocal, chronic osteomyelitis of unknown etiology

    Kozlowski, K.; Beluffi, G.; Feltham, C.; James, M.; Nespoli, L.; Tamaela, L.; Pavia Univ.; Municipal Hospital, Nelson; Medical School, Jakarta


    Four cases of multifocal osteomyelitis of unknown origin in childhood are reported. The variable clinical and radiographic appearances of the disease are illustrated and the diagnostic difficulties in the early stages of the disease are stressed. (orig.) [de

  4. Known Unknowns in Judgment and Choice

    Walters, Daniel


    This dissertation investigates how people make inferences about missing information. Whereas most prior literature focuses on how people process known information, I show that the extent to which people make inferences about missing information impacts judgments and choices. Specifically, I investigate how (1) awareness of known unknowns affects overconfidence in judgment in Chapter 1, (2) beliefs about the knowability of unknowns impacts investment strategies in Chapter 2, and (3) inferences...

  5. Mobile assistant for unknown caller identification

    Hribernik, Andraž


    The main motivation of this diploma thesis is a development of Android application, which helps user of application to find out who is the owner of unknown phone number. Data source for finding unknown phone number are free available web sources. Through the development of prototype, data from different web sources were integrated. Result of this integration is shown in Android application. Data integration includes access to semi-structured data on web portal of Phone Directory of Slovenia, ...

  6. Uric Acid: The Unknown Uremic Toxin.

    Treviño-Becerra, Alejandro


    This review brings together concepts of uric acid metabolism affecting renal parenchyma and its function and the current therapies to reduce hyperuricemia (HyU) and avoid renal disease progression. High uric acid plays an important role in several chronic diseases including kidney diseases such as lithiasis, gout nephropathy, and preeclampsia. In the last 30 years, it has been shown that reducing HyU with low protein and low purine diets in addition to allopurinol creates physiopathological conditions that produce a slight increase in the glomerular filtration rate (GFR). In recent years, in a new era of research in clinical, genetics, pharmacological, and epidemiologic fields, they have been moving forward to support the idea that reduction in HyU could benefit the chronic renal failure (CRF) patients (stage III-IV), thereby avoiding the drop of GFR for undefined mechanisms. There are several clinical trials in progress that show the HyU reducing to very low values and an increased GFR. In a young population, when treating HyU there is a reduction in high blood pressure. There are some reports showing that HyU could play a role in the diabetic nephropathy. Therefore, there have been some speculations that HyU treatment could stop the progression of CRF modifying the natural history of the diseases. So there will be new clinical trials with old and new medication and metabolic procedure to maintain a very low blood levels in the unknown uremic toxin know as uric acid which seems to be the toxin to the damage kidney. © 2018 S. Karger AG, Basel.

  7. Shared Substance

    Gjerlufsen, Tony; Klokmose, Clemens Nylandsted; Eagan, James


    This paper presents a novel middleware for developing flexible interactive multi-surface applications. Using a scenario-based approach, we identify the requirements for this type of applications. We then introduce Substance, a data- oriented framework that decouples functionality from data, and S...

  8. Functional Outcome and Healing of Large and Massive Rotator Cuff Tears Repaired With a Load-Sharing Rip-Stop Construct.

    Noyes, Matthew P; Ladermann, Alexandre; Denard, Patrick J


    To prospectively review functional outcomes and healing rates of large and massive rotator cuff tears repaired with a load-sharing rip-stop (LSRS) technique. Twenty-one consecutive patients underwent arthroscopic rotator cuff repair with an LSRS construct between January and December 2014. Seventeen patients with a minimum of 2 years' follow-up were included. Four patients did not complete clinical evaluations and functional outcome scores at a minimum of 2 years' follow-up and were lost to follow-up. Ultrasound imaging was used to assess for rotator cuff healing at a minimum of 6 months postoperatively. Range of motion, strength, and functional outcome scores were evaluated at final follow-up. Mean active forward elevation improved from 109° preoperatively to 153° postoperatively, and mean supraspinatus strength improved by 1 strength grade, from 3.5 preoperatively to 4.4 postoperatively. When we compared preoperative and postoperative values, the American Shoulder and Elbow Surgeons score improved from 40.8 to 89.5, the Single Assessment Numeric Evaluation score improved from 32.8 to 83.1, the Simple Shoulder Test score improved from 3.8 to 10.3, and the pain score on a visual analog scale decreased from 4.8 to 0.8 (P rotator cuff tears. This construct may be an alternative for tears not amenable to double-row repair. Level IV, therapeutic case series. Copyright © 2017 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  9. Shared decision making

    ... page: // Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  10. Shared decision-making, stigma, and child mental health functioning among families referred for primary care-located mental health services.

    Butler, Ashley M


    There is growing emphasis on shared decision making (SDM) to promote family participation in care and improve the quality of child mental health care. Yet, little is known about the relationship of SDM with parental perceptions of child mental health treatment or child mental health functioning. The objectives of this preliminary study were to examine (a) the frequency of perceived SDM with providers among minority parents of children referred to colocated mental health care in a primary care clinic, (b) associations between parent-reported SDM and mental health treatment stigma and child mental health impairment, and (c) differences in SDM among parents of children with various levels of mental health problem severity. Participants were 36 Latino and African American parents of children (ages 2-7 years) who were referred to colocated mental health care for externalizing mental health problems (disruptive, hyperactive, and aggressive behaviors). Parents completed questions assessing their perceptions of SDM with providers, child mental health treatment stigma, child mental health severity, and level of child mental health impairment. Descriptive statistics demonstrated the majority of the sample reported frequent SDM with providers. Correlation coefficients indicated higher SDM was associated with lower stigma regarding mental health treatment and lower parent-perceived child mental health impairment. Analysis of variance showed no significant difference in SDM among parents of children with different parent-reported levels of child mental health severity. Future research should examine the potential of SDM for addressing child mental health treatment stigma and impairment among minority families.

  11. Calorie restriction and endurance exercise share potent anti-inflammatory function in adipose tissues in ameliorating diet-induced obesity and insulin resistance in mice

    Yan Zhen


    Full Text Available Abstract Background Calorie restriction (CR and endurance exercise are known to attenuate obesity and improve the metabolic syndrome. The aim of this study was to directly compare the effects of CR and endurance exercise in a mouse model of diet-induced obesity and insulin resistance. Methods Adult male C57BL/6N mice were randomly assigned and subjected to one of the six interventions for 8 weeks: low-fat diet (LC, 10% fat, low-fat diet with 30% calorie restriction (LR, high-fat diet (HC, 60% fat, high-fat diet with 30% calorie restriction (HR, high-fat diet with voluntary running exercise (HE, and high-fat diet with a combination of 30% calorie restriction and exercise (HRE. The impacts of the interventions were assessed by comprehensive metabolic analyses and pro-inflammatory cytokine gene expression. Results Endurance exercise significantly attenuated high-fat diet-induced obesity. CR dramatically prevented high-fat diet-induced metabolic abnormalities. A combination of CR and endurance exercise further reduced obesity and insulin resistance under the condition of high-fat diet. CR and endurance exercise each potently suppressed the expression of inflammatory cytokines in white adipose tissues with additive effects when combined, but the effects of diet and exercise interventions in the liver were moderate to minimal. Conclusions CR and endurance exercise share a potent anti-inflammatory function in adipose tissues in ameliorating diet-induced obesity and insulin resistance.

  12. Multifocal chronic osteomyelitis of unknown etiology

    Kozlowski, K.; Masel, J.; Harbison, S.; Yu, J.; Royal Brisbane Children Hospital; Regional Hospital Bowral


    Five cases of chronic, inflammatory, multifocal bone lesions of unknown etiology are reported. Although bone biopsy confirmed osteomyelitis in each case in none of them were organisms found inspite of an extensive work up. Different clinical course of the disease reflects different aetiology in respective cases. These cases present changing aspects of osteomyelitis emerging since introduction of antibiotics. (orig.)

  13. Multi-Attribute Vickrey Auctions when Utility Functions are Unknown

    Máhr, T.; De Weerdt, M.M.


    Multi-attribute auctions allow negotiations over multiple attributes besides price. For example in task allocation, service providers can define their service by means of multiple attributes, such as quality of service, deadlines, or delay penalties. Auction mechanisms assume that the players have

  14. Conditional scale function estimate in the presence of unknown ...

    Standard approach for modeling and understanding the variability of statistical data or, generally, dependant data, is often based on the mean variance regression models. However, the assumptions employed on standardized residuals may be too restrictive, in particular, when the data follows heavy-tailed distribution with ...

  15. Estimating Functions of Distributions Defined over Spaces of Unknown Size

    David H. Wolpert


    Full Text Available We consider Bayesian estimation of information-theoretic quantities from data, using a Dirichlet prior. Acknowledging the uncertainty of the event space size m and the Dirichlet prior’s concentration parameter c, we treat both as random variables set by a hyperprior. We show that the associated hyperprior, P(c, m, obeys a simple “Irrelevance of Unseen Variables” (IUV desideratum iff P(c, m = P(cP(m. Thus, requiring IUV greatly reduces the number of degrees of freedom of the hyperprior. Some information-theoretic quantities can be expressed multiple ways, in terms of different event spaces, e.g., mutual information. With all hyperpriors (implicitly used in earlier work, different choices of this event space lead to different posterior expected values of these information-theoretic quantities. We show that there is no such dependence on the choice of event space for a hyperprior that obeys IUV. We also derive a result that allows us to exploit IUV to greatly simplify calculations, like the posterior expected mutual information or posterior expected multi-information. We also use computer experiments to favorably compare an IUV-based estimator of entropy to three alternative methods in common use. We end by discussing how seemingly innocuous changes to the formalization of an estimation problem can substantially affect the resultant estimates of posterior expectations.

  16. Managing and sharing the escalating number of sponge "unknowns": the SpongeMaps project.

    Hooper, J N A; Hall, K A; Ekins, M; Erpenbeck, D; Wörheide, G; Jolley-Rogers, G


    Contemporary collections of sponges in the Indo-west Pacific have escalated substantially due to pharmaceutical discovery, national bioregional planning, and compliance with international conventions on the seabed and its marine genetic resources beyond national jurisdictions. These partially processed operational taxonomic unit (OTU) collections now vastly outweigh the expertise available to make them better "known" via complete taxonomy, yet for many bioregions they represent the most significant body of currently available knowledge. Increasing numbers of cryptic species, previously undetected morphologically, are now being discovered by molecular and chemical analyses. The uncoordinated and fragmented nature of many previous collections, however, means that knowledge and expertise gained from a particular project are often lost to future projects without a biodiversity informatics legacy. Integrating these diverse data (GIS; OTUs; images; molecular, chemical, and other datasets) required a two-way iterative process so far unavailable for sponges with existing biodiversity informatics tools. SpongeMaps arose from the initial need for online collaboration to integrate morphometric data with molecular barcodes, including the Porifera Tree of Life (PorTol) project. It provides interrogation of existing data to better process new collections; capacity to create new OTUs; publication of online pages for individual species, so as to interpret GIS and other data for online biodiversity databases and services; and automatic links to external datasets for taxonomic hierarchy, specimen GIS and mapping, DNA sequence data, chemical structures, and images.

  17. Melanoma of unknown origin: a case series.

    Kelly, J


    The natural history of metastatic melanoma involving lymph nodes, in the absence of a known primary site (cutaneous, ocular or mucosal) has, to date, been poorly defined; and the optimal management of this rare subtype of disease is therefore unclear. Melanomas of unknown primary site (MUP) are estimated to comprise between 3.7 and 6% of all melanomas (Anbari et al. in Cancer 79:1861-1821, 1997).

  18. Autonomous Flight in Unknown Indoor Environments

    Bachrach, Abraham Galton; He, Ruijie; Roy, Nicholas


    This paper presents our solution for enabling a quadrotor helicopter, equipped with a laser rangefinder sensor, to autonomously explore and map unstructured and unknown indoor environments. While these capabilities are already commodities on ground vehicles, air vehicles seeking the same performance face unique challenges. In this paper, we describe the difficulties in achieving fully autonomous helicopter flight, highlighting the differences between ground and helicopter robots that make it ...

  19. Multidimensional procurement auctions with unknown weights

    Greve, Thomas

    This paper studies the consequences of holding a procurement auction when the principal chooses not to show its preferences. My paper extends the procurement auction model of Che (1993) to a situation where both the principal and the agents have private information. Thus, unknown parameters of bo...... gives rise to an analysis of a principal that can not fully commit to the outcome induced by the scoring rule. Therefore, my result apply to contract theory and it’s problems with imperfect commitment....

  20. Unknown facets of Well-Known Scientists Series - Part II

    V S Dixit


    Full Text Available 1st in the series of articles on “Unknown Facets of well-known Scientists” was about Sir Frederick Grant Banting, co-discoverer of Insulin, who also researched in Aviation and Diving Medicines, results of which brought extraordinary benefits for Flight crew during the World War II. The article was published in the previous issue of the Journal Unknown facets could be celebrated attributes, talents or otherwise, but it is necessary that we get to know fully about the “great mind". THIS ARTICLE IS ABOUT DR WERNER THEODOR OTTO FORSSMANN, A CARDIOLOGIST, WHO BECAME A UROLOGIST! Does the name Dr Forssmann ring a bell? He shared the 1956 Nobel Prize in Physiology or Medicine with “Andre Cournand and Dickinson Richards". The trio was awarded for their “discoveries concerning heart catheterization and pathological changes in the circulatory system". Dr Forssmann was nominated for performing an experiment in which he introduced a catheter into a vein of his arm, further passing it onward into his heart It was risky. This was in the year 1929. Subject of this article is the self-experimentation he carried out and what happened later.

  1. Unknown quantum states: The quantum de Finetti representation

    Caves, Carlton M.; Fuchs, Christopher A.; Schack, Ruediger


    We present an elementary proof of the quantum de Finetti representation theorem, a quantum analog of de Finetti's classical theorem on exchangeable probability assignments. This contrasts with the original proof of Hudson and Moody [Z. Wahrschein. verw. Geb. 33, 343 (1976)], which relies on advanced mathematics and does not share the same potential for generalization. The classical de Finetti theorem provides an operational definition of the concept of an unknown probability in Bayesian probability theory, where probabilities are taken to be degrees of belief instead of objective states of nature. The quantum de Finetti theorem, in a closely analogous fashion, deals with exchangeable density-operator assignments and provides an operational definition of the concept of an ''unknown quantum state'' in quantum-state tomography. This result is especially important for information-based interpretations of quantum mechanics, where quantum states, like probabilities, are taken to be states of knowledge rather than states of nature. We further demonstrate that the theorem fails for real Hilbert spaces and discuss the significance of this point

  2. Towards high-speed autonomous navigation of unknown environments

    Richter, Charles; Roy, Nicholas


    In this paper, we summarize recent research enabling high-speed navigation in unknown environments for dynamic robots that perceive the world through onboard sensors. Many existing solutions to this problem guarantee safety by making the conservative assumption that any unknown portion of the map may contain an obstacle, and therefore constrain planned motions to lie entirely within known free space. In this work, we observe that safety constraints may significantly limit performance and that faster navigation is possible if the planner reasons about collision with unobserved obstacles probabilistically. Our overall approach is to use machine learning to approximate the expected costs of collision using the current state of the map and the planned trajectory. Our contribution is to demonstrate fast but safe planning using a learned function to predict future collision probabilities.

  3. Renal disease masquerading as pyrexia of unknown origin

    D Korivi


    Full Text Available Pyrexia of unknown origin is a challenging clinical problem. Infections, malignancies, and connective tissue diseases form the major etiologies for this condition. We report a case of a 57-year-old diabetic male who presented with fever of unknown origin for several months. The course of investigations led to a kidney biopsy which clinched the cause of his fever as well as the underlying diagnosis. The light microscopy findings of expansile storiform fibrosis with a dense inflammatory infiltrate suggested the diagnosis which was confirmed by positive staining of Immunoglobulin G4, the dense lympho-plasmacytic infiltrate and elevated serum IgG4 concentrations. A course of steroids followed by mycophenolate mofetil as maintenance immunosuppression rendered the patient afebrile with improvement of renal function.

  4. Professional SharePoint 2010 Administration

    Klindt, Todd; Caravajal, Steve


    Thorough coverage of the improvements and changes to SharePoint 2010. SharePoint 2010 boasts a variety of incredible new features that will challenge even the most experienced administrator who is upgrading from SharePoint 2007. Written by a team of SharePoint experts, this book places a takes aim at showing you how to make these new features work right for you. Offering an in-depth look at SharePoint 2010, the authors focus on how SharePoint functionality has changed from its earliest version to its newest, and they provide you with detailed coverage of all the new features and capabilities.:

  5. SharePoint 2010 Field Guide

    Mann, Steven; Gazmuri, Pablo; Caravajal, Steve; Wheeler, Christina


    Hands-on solutions for common SharePoint 2010 challenges Aimed at the more than 100 million licensed SharePoint 2010 users, this indispensable field guide addresses an abundance of common SharePoint 2010 problems and offers proven solutions. A team of authors encourages you to customize SharePoint beyond the out-of-the-box functionality so that you can build more complex solutions to these challenges. You?ll discover intricate details and specific full-scale solutions that you can then implement to your own SharePoint 2010 solutions.Tackles a variety of SharePoint 2010 problems ranging from si


    Fotache Lacramioara


    Full Text Available The paper is an effort to unknown areas identity affirmation, through collaborative development of advertising mix, with an emphasis on virtual platforms as admissible solution for increasing visibility. Based upon comparative effective analysis of categories of communication particularities, it is suggested a positioning strategic solution, via virtual advertising platform as unique, integrated, complex and very attractive tourism product promotion, fitted for the internal and international tourism circuit. The active promotion of the specified territorial identity will launch a brand with an impact among tourists by using marketing techniques and innovating technical means and prioritizing tourism as a principal vector of local and regional development.

  7. Metastasis to neck from unknown primary tumor

    Jose, B.; Bosch, A.; Caldwell, W.L.; Frias, Z.


    The records of 54 consecutive patients who were irradiated for metastatic disease in the neck from an unknown primary tumor were reviewed. The overall survival results are comparable to those of other reported series. Patients with high or posterior cervical lymph node involvement were irradiated with fields including the nasopharynx and oropharynx. Patients with high neck nodes had a better survival rate than those with low neck nodes. The size of the neck tumors and the local control after treatment also have prognostic significance. (Auth.)

  8. Employee share ownership in Germany

    Ortlieb, Renate; Matiaske, Wenzel; Fietze, Simon


    Politicians and scholars alike praise the significant benefits associated with employee share ownership (ESO). However, little is known about the concrete motives of firms to provide ESO to their employees. In particular, it is unknown how these motives correlate with firms’ contexts. Drawing...... on an institutional theoretical framework, this article examines what aims firms pursue through the provision of ESO. The data originate from a survey of firms in Germany. The cluster analytic findings indicate distinctive patterns of relationships between aims and firm characteristics. Aims related to employee...... performance are most important to foreign-owned firms, financial aims are most important to non-public small and medium-sized firms and aims related to corporate image are most important to big firms and to firms that do not provide profit sharing. Aims related to employee attraction and retention are almost...

  9. Numerical method of identification of an unknown source term in a heat equation

    Fatullayev Afet Golayo?lu


    Full Text Available A numerical procedure for an inverse problem of identification of an unknown source in a heat equation is presented. Approach of proposed method is to approximate unknown function by polygons linear pieces which are determined consecutively from the solution of minimization problem based on the overspecified data. Numerical examples are presented.

  10. Framework for Shared Drinking Water Risk Assessment.

    Lowry, Thomas Stephen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tidwell, Vincent C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Roger [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Binning, David [AEM Corp., Herndon, VA (United States); Meszaros, Jenny [AEM Corp., Herndon, VA (United States)


    Central to protecting our nation's critical infrastructure is the development of methodologies for prioritizing action and supporting resource allocation decisions associated with risk-reduction initiatives. Toward this need a web-based risk assessment framework that promotes the anonymous sharing of results among water utilities is demonstrated. Anonymous sharing of results offers a number of potential advantages such as assistance in recognizing and correcting bias, identification of 'unknown, unknowns', self-assessment and benchmarking for the local utility, treatment of shared assets and/or threats across multiple utilities, and prioritization of actions beyond the scale of a single utility. The constructed framework was demonstrated for three water utilities. Demonstration results were then compared to risk assessment results developed using a different risk assessment application by a different set of analysts.

  11. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    Serge Gruzinski


    Full Text Available Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d...

  12. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    Serge Gruzinski


    Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown) le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d'...

  13. The Unknown Component Problem Theory and Applications

    Villa, Tiziano; Brayton, Robert K; Mishchenko, Alan; Petrenko, Alexandre; Sangiovanni-Vincentelli, Alberto


    The Problem of the Unknown Component: Theory and Applications addresses the issue of designing a component that, combined with a known part of a system, conforms to an overall specification. The authors tackle this problem by solving abstract equations over a language. The most general solutions are studied when both synchronous and parallel composition operators are used. The abstract equations are specialized to languages associated with important classes of automata used for modeling systems. The book is a blend of theory and practice, which includes a description of a software package with applications to sequential synthesis of finite state machines. Specific topologies interconnecting the components, exact and heuristic techniques, and optimization scenarios are studied. Finally the scope is enlarged to domains like testing, supervisory control, game theory and synthesis for special omega languages. The authors present original results of the authors along with an overview of existing ones.

  14. Carcinomatous Meningitis from Unknown Primary Carcinoma

    L. Favier


    Full Text Available Carcinomatous meningitis (CM occurs in 3 to 8% of cancer patients. Patients present with a focal symptom, and multifocal signs are often found following neurological examination. The gold standard for diagnosis remains the demonstration of carcinomatous cells in the cerebrospinal fluid on cytopathological examination. Despite the poor prognosis, palliative treatment could improve quality of life and, in some cases, overall survival. We report on a patient who presented with vertigo, tinnitus and left-sided hearing loss followed by progressive diffuse facial nerve paralysis. Lumbar cerebrospinal fluid confirmed the diagnosis of CM. However, no primary tumor was discovered, even after multiple invasive investigations. This is the first reported case in the English-language medical literature of CM resulting from a carcinoma of unknown primary origin.

  15. Off-Policy Actor-Critic Structure for Optimal Control of Unknown Systems With Disturbances.

    Song, Ruizhuo; Lewis, Frank L; Wei, Qinglai; Zhang, Huaguang


    An optimal control method is developed for unknown continuous-time systems with unknown disturbances in this paper. The integral reinforcement learning (IRL) algorithm is presented to obtain the iterative control. Off-policy learning is used to allow the dynamics to be completely unknown. Neural networks are used to construct critic and action networks. It is shown that if there are unknown disturbances, off-policy IRL may not converge or may be biased. For reducing the influence of unknown disturbances, a disturbances compensation controller is added. It is proven that the weight errors are uniformly ultimately bounded based on Lyapunov techniques. Convergence of the Hamiltonian function is also proven. The simulation study demonstrates the effectiveness of the proposed optimal control method for unknown systems with disturbances.

  16. Education Through Exploration: Evaluating the Unknown

    Anbar, A. D.


    Mastery of the peculiar and powerful practices of science is increasingly important for the average citizen. With the rise of the Internet, most of human knowledge is at our fingertips. As content becomes a commodity, success and survival aren't about who knows the most, but who is better able to explore the unknown, actively applying and extending knowledge through critical thinking and hypothesis-driven problem-solving. This applies to the economic livelihoods of individuals and to society at large as we grapple with climate change and other science-infused challenges. Unfortunately, science is too often taught as an encyclopedic collection of settled facts to be mastered rather than as a process of exploration that embraces curiosity, inquiry, testing, and communication to reduce uncertainty about the unknown. This problem is exacerbated by the continued prevalence of teacher-centric pedagogy, which promotes learning-from-authority and passive learning. The initial wave of massively open online courses (MOOCs) generally mimic this teaching style in virtual form. It is hypothesized that emerging digital teaching technologies can help address this challenge at Internet scale in "next generation" MOOCs and flipped classroom experiences. Interactive simulations, immersive virtual field trips, gamified elements, rapid adaptive feedback, intelligent tutoring systems, and personalized pathways, should motivate and enhance learning. Through lab-like projects and tutorials, students should be able to construct knowledge from interactive experiences, modeling the authentic practice of science while mastering complex concepts. Freed from lecturing, teaching staff should be available for direct and intense student-teacher interactions. These claims are difficult to evaluate with traditional assessment instruments, but digital technologies provide powerful new ways to evaluate student learning and learn from student behaviors. We will describe ongoing experiences with such

  17. Chronic traumatic encephalopathy: The unknown disease.

    Martínez-Pérez, R; Paredes, I; Munarriz, P M; Paredes, B; Alén, J F


    Chronic traumatic encephalopathy is a neurodegenerative disease produced by accumulated minor traumatic brain injuries; no definitive premortem diagnosis and no treatments are available for chronic traumatic encephalopathy. Risk factors associated with chronic traumatic encephalopathy include playing contact sports, presence of the apolipoprotein E4, and old age. Although it shares certain histopathological findings with Alzheimer disease, chronic traumatic encephalopathy has a more specific presentation (hyperphosphorylated tau protein deposited as neurofibrillary tangles, associated with neuropil threads and sometimes with beta-amyloid plaques). Its clinical presentation is insidious; patients show mild cognitive and emotional symptoms before progressing to parkinsonian motor signs and finally dementia. Results from new experimental diagnostic tools are promising, but these tools are not yet available. The mainstay of managing this disease is prevention and early detection of its first symptoms. Copyright © 2014 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  18. High Valence, Normal Valence and Unknown Valence

    Morsing, Thorbjørn Juul

    the serendipitous synthesis of the nitrido-bridged [Rh(en)3]2- [(CN)5MnNMn(CN)5]. The complex anion have previously been studied in the form of the mixed Rb4Na2-salt. In this earlier study, the nitrido-bridge was found to be asymmetrical with the axial ligands in an eclipsed formation. The complex was described...... the [Rh(en)3]2-salt is best described as Mn3.5/Mn3.5. This means that the [(CN)5MnNMn(CN)5]6􀀀 ion displays crystal packing induced oxidation state isomerism, a rare phenomenon. Chapter 4 details the synthesis and characterisation of group 9 dithiolene complexes with focus on the hitherto unknown...... homoleptic iridium dithiolene complexes. When the complexes [M(mnt)3]3􀀀, M = Rh and Co are chemically oxidized, they decompose to yield dinuclear complexes with the metal still in oxidation state III. This is not the case for the corresponding Ir complex which can be oxidized and the oxidation...

  19. Lung Lesions During Fever of Unknown Origin.

    Krupa, Renata; Zielonka, Tadeusz M; Hadzik-Blaszczyk, Malgorzata; Wardyn, Kazimierz A; Zycinska, Katarzyna


    Fever of unknown origin (FUO) remains one of the most difficult diagnostic challenges. The causes of FUO can be various diseases located in different organs. The aim of the study was to determine the prevalence and nature of pulmonary lesions during FUO. One hundred and sixty one patients with FUO participated in this prospective study. We performed a detailed comprehensive history, physical examination, and a wide spectrum of tests. The most common causes of FUO were infections (39%), autoimmune conditions (28%), and neoplasms (17%). Lung lesions were found in 30% of patients. In this group 35% were infections, 30% autoimmune diseases, and 4% cancer. Among patients with respiratory infections, there were cases of tuberculosis, atypical pneumonia, lung abscess, and bronchiectases. Autoimmune pulmonary lesions were observed during vasculitis and systemic lupus. The causes of FUO in the group of patients with lung lesions were also pulmonary embolism, sarcoidosis, and pulmonary fibrosis. Chest CT played an important role in the diagnosis of the causes of FUO with pulmonary manifestations. Pulmonary lesions are a common cause of FUO. Most FUO with pulmonary lesions are recognized during infections and autoimmune diseases. An important part of diagnosing FUO is a detailed evaluation of the respiratory system.

  20. Unknown Risks: Parental Hesitation about Vaccination.

    Blaisdell, Laura L; Gutheil, Caitlin; Hootsmans, Norbert A M; Han, Paul K J


    This qualitative study of a select sample of vaccine-hesitant parents (VHPs) explores perceived and constructed personal judgments about the risks and uncertainties associated with vaccines and vaccine-preventable diseases (VPDs) and how these subjective risk judgments influence parents' decisions about childhood vaccination. The study employed semistructured focus group interviews with 42 VHPs to elicit parents' perceptions and thought processes regarding the risks associated with vaccination and nonvaccination, the sources of these perceptions, and their approach to decision making about vaccination for their children. VHPs engage in various reasoning processes and tend to perceive risks of vaccination as greater than the risks of VPDs. At the same time, VHPs engage in other reasoning processes that lead them to perceive ambiguity in information about the harms of vaccination-citing concerns about the missing, conflicting, changing, or otherwise unreliable nature of information. VHPs' refusal of vaccination may reflect their aversion to both the risk and ambiguity they perceive to be associated with vaccination. Mitigating this vaccine hesitancy likely requires reconstructing the risks and ambiguities associated with vaccination-a challenging task that requires providing parents with meaningful evidence-based information on the known risks of vaccination versus VPDs and explicitly acknowledging the risks that remain truly unknown. © The Author(s) 2015.

  1. The energy equation with three unknowns

    Schifano, Fabio; Moriconi, Daniele


    This article discusses the alarming situation of energy in Italy as this country depends at 82 per cent on its imports (oil, natural gas and electricity), a dependence which could even increase. The authors first propose overviews of the situation regarding oil, natural gas and electric power (origins of imports, role of Italian companies, status of infrastructures), and also briefly of renewable energies. They recall the history of the use of nuclear energy: Italy has been one of the first country to use nuclear energy to produce electric power, but a referendum organised after Chernobyl resulted in phasing out nuclear. Then, the authors discuss perspectives associated with three main strategic unknowns: an increase of energy dependence with respect to hydrocarbons and to foreign nuclear power, a supply insecurity due to a dependence concentrated on a small number of countries (notably as far as natural gas is concerned), and an increasing interdependence between economic growth and sustainable development (the reduction of greenhouse emissions is a prevailing parameter for future energetic choices)

  2. Payoff Shares in Two-Player Contests

    Samuel Häfner


    Full Text Available In imperfectly discriminating contests with symmetric valuations, equilibrium payoffs are positive shares of the value of the prize. In contrast to a bargaining situation, players’ shares sum to less than one because a residual share of the value is lost due to rent dissipation. In this paper, we consider contests with two players and investigate the relationship between these equilibrium shares and the parameters of a class of asymmetric Tullock contest success functions. Our main finding is that any players’ shares that sum up to less than one can arise as the unique outcome of a pure-strategy Nash equilibrium for appropriate parameters.

  3. Pro SharePoint 2010 Search

    Noble, J; Bakman-Mikalski, Dan


    Pro SharePoint 2010 Search gives you expert advice on planning, deploying and customizing searches in SharePoint 2010. Drawing on the authors' extensive experience of working with real-world SharePoint deployments, this book teaches everything you'll need to know to create well-designed SharePoint solutions that always keep the end-user's experience in mind. Increase your search efficiency with SharePoint 2010's search functionality: extend the search user interface using third-party tools, and utilize analytics to improve relevancy. This practical hands-on book is a must-have resource for any

  4. Reconceptualising Shared Services

    Peter McKinlay


    Full Text Available Endeavours to improve the efficiency and effectiveness of local government have been a persistent theme both of politicians in higher tiers of government and of interest groups, especially business. The two contenders for improvement which receive most coverage both in the research literature and in popular discussion are amalgamation and shared services. Arguments from the literature have generally favoured shared services over amalgamation. Bish (2001 in a comprehensive review of North American research dismisses the argument for amalgamation as a product of flawed nineteenth-century thinking and a bureaucratic urge for centralized control. He does so making the very reasonable point that the presumed economies of scale which will result from amalgamation are a function not of the size and scale of individual local authorities, but of the services for which those local authorities are responsible, and the point at which economies of scale will be optimised will be very different for different services. The case against amalgamation is also reinforced by the absence of any significant post-facto evidence that amalgamation achieves either the promised savings or the anticipated efficiency gains (McKinlay 2006.

  5. A hybrid search algorithm for swarm robots searching in an unknown environment.

    Li, Shoutao; Li, Lina; Lee, Gordon; Zhang, Hao


    This paper proposes a novel method to improve the efficiency of a swarm of robots searching in an unknown environment. The approach focuses on the process of feeding and individual coordination characteristics inspired by the foraging behavior in nature. A predatory strategy was used for searching; hence, this hybrid approach integrated a random search technique with a dynamic particle swarm optimization (DPSO) search algorithm. If a search robot could not find any target information, it used a random search algorithm for a global search. If the robot found any target information in a region, the DPSO search algorithm was used for a local search. This particle swarm optimization search algorithm is dynamic as all the parameters in the algorithm are refreshed synchronously through a communication mechanism until the robots find the target position, after which, the robots fall back to a random searching mode. Thus, in this searching strategy, the robots alternated between two searching algorithms until the whole area was covered. During the searching process, the robots used a local communication mechanism to share map information and DPSO parameters to reduce the communication burden and overcome hardware limitations. If the search area is very large, search efficiency may be greatly reduced if only one robot searches an entire region given the limited resources available and time constraints. In this research we divided the entire search area into several subregions, selected a target utility function to determine which subregion should be initially searched and thereby reduced the residence time of the target to improve search efficiency.

  6. Security Measurement for Unknown Threats Based on Attack Preferences

    Lihua Yin


    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  7. Rethinking the Sharing Economy

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate


    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  8. Job Sharing in Education.

    Davidson, Wilma; Kline, Susan


    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  9. Production sharing agreements


    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  10. Management of Gene Variants of Unknown Significance

    Alosi, Daniela; Bisgaard, Marie Luise; Hemmingsen, Sophie Nowak


    by germline mutations in the VHL gene, which predispose to the development of multiple tumors such as central nervous system hemangioblastomas and renal cell carcinoma (RCC). Objective: We propose a method for the evaluation of VUS pathogenicity through our experience with the VHL missense mutation c.241C...... (IHC); 3) Assessment of the variant’s impact on protein structure and function, using multiple databases, in silico algorithms, and reports of functional studies. Results: Only one family member had clinical signs of vHL with early-onset RCC. IHC analysis showed no VHL protein expressed in the tumor...

  11. HydroShare: A Platform for Collaborative Data and Model Sharing in Hydrology

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.


    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting its use as a virtual environment supporting education and research. HydroShare has components that support: (1) resource storage, (2) resource exploration, and (3) web apps for actions on resources. The HydroShare data discovery, sharing and publishing functions as well as HydroShare web apps provide the capability to analyze data and execute models completely in the cloud (servers remote from the user) overcoming desktop platform limitations. The HydroShare GIS app provides a basic capability to visualize spatial data. The HydroShare JupyterHub Notebook app provides flexible and documentable execution of Python code snippets for analysis and modeling in a way that results can be shared among HydroShare users and groups to support research collaboration and education. We will discuss how these developments can be used to support different types of educational efforts in Hydrology where being completely web based is of value in an educational setting as students can all have access to the same functionality regardless of their computer.

  12. Job Sharing in Geography.

    Kay, Jeanne


    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  13. The Sharing Economy

    Reinhold, Stephan; Dolnicar, Sara


    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  14. Satisfaction and 'comparison sharing'

    Amilon, Anna


    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  15. Sharing family and household:

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  16. Secret Sharing of a Quantum State.

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei


    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  17. Analysing Trust Transitivity and The Effects of Unknown Dependence

    Touhid Bhuiyan


    Full Text Available Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment; such Internet.

  18. Dynamic quantum secret sharing

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo


    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  19. Job sharing. Part 1.

    Anderson, K; Forbes, R


    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  20. The Sharing Economy

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders


    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  1. Probabilistic Infinite Secret Sharing

    Csirmaz, László


    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  2. BBSRC Data Sharing Policy

    Amanda Collis; David McAllister; Michael Ball


    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  3. Factors Impacting Knowledge Sharing

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  4. Regulating the sharing economy

    Erickson, Kristofer; Sorensen, Inge


    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  5. Phenomenology of experiential sharing

    León, Felipe; Zahavi, Dan


    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  6. A Data Sharing Story

    Mercè Crosas


    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  7. Share your sweets

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido


    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  8. Fever of unknown origin in the elderly.

    Wakefield, K M; Henderson, S T; Streit, J G


    Fever is a prominent sign of an acute-phase response induced by microbial invasion, tissue injury, immunologic reactions, or inflammatory processes. This generalized host response is produced by a multiplicity of localized or systemic diseases and characterized by acute, subacute, or chronic changes in metabolic, endocrinologic, neurologic, and immunologic functions. The fundamental event is an initiation of the acute-phase response by the production of a mediated molecule called IL-1. This polypeptide is produced primarily from phagocytic cells such as blood monocytes, phagocytic lining cells of the liver and spleen, and other tissue macrophages. IL-1 produces a local reaction but also enters the circulation, acting as a hormone to mediate distant organ system responses to infection, immunologic reaction, and inflammatory processes. Fever is the result when IL-1 initiates the synthesis of prostaglandins, notably prostaglandin E2 in the thermoregulatory center located in the anterior hypothalamus. The thermostatic set point is then raised and mechanisms to conserve heat (vasoconstriction) and to produce heat (shivering) are initiated. The result is a sudden rise in body temperature. The same basic mechanisms are involved in FUO. Many of the biologic and biochemical changes that are seen in FUO are also evidence of an acute-phase response. The elevated erythrocyte sedimentation rate is partly due to increased synthesis of hepatic proteins, including compliment components, ceruloplasmin, fibrinogen, and C-reactive protein. IL-1 acts directly on the bone marrow to increase absolute numbers and immaturity of circulating neutrophils. Anemia is produced by many mechanisms, including the reduction of circulating serum iron. Although fever production in the elderly maybe delayed or of less intensity, it is still a marker of significant disease.(ABSTRACT TRUNCATED AT 400 WORDS)

  9. Millennials and the Sharing Economy

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  10. On Secret Sharing with Nonlinear Product Reconstruction

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego


    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  11. Mobile energy sharing futures

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez


    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  12. 5G Spectrum Sharing

    Nekovee, Maziar; Rudd, Richard


    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  13. NCSU Reactor Sharing Program

    Perez, P.B.


    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  14. 'An Arena for Sharing'

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug


    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  15. Cross-species functional analyses reveal shared and separate roles for Sox11 in frog primary neurogenesis and mouse cortical neuronal differentiation

    Chao Chen


    Full Text Available A well-functioning brain requires production of the correct number and types of cells during development; cascades of transcription factors are essential for cellular coordination. Sox proteins are transcription factors that affect various processes in the development of the nervous system. Sox11, a member of the SoxC family, is expressed in differentiated neurons and supports neuronal differentiation in several systems. To understand how generalizable the actions of Sox11 are across phylogeny, its function in the development of the frog nervous system and the mouse cerebral cortex were compared. Expression of Sox11 is largely conserved between these species; in the developing frog, Sox11 is expressed in the neural plate, neural tube and throughout the segmented brain, while in the mouse cerebral cortex, Sox11 is expressed in differentiated zones, including the preplate, subplate, marginal zone and cortical plate. In both frog and mouse, data demonstrate that Sox11 supports a role in promoting neuronal differentiation, with Sox11-positive cells expressing pan-neural markers and becoming morphologically complex. However, frog and mouse Sox11 cannot substitute for one another; a functional difference likely reflected in sequence divergence. Thus, Sox11 appears to act similarly in subserving neuronal differentiation but is species-specific in frog neural development and mouse corticogenesis.

  16. Exploring the Sharing Economy

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  17. Sharing Rare Attitudes Attracts.

    Alves, Hans


    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  18. Longitudinal links between childhood peer acceptance and the neural correlates of sharing.

    Will, Geert-Jan; Crone, Eveline A; van Lier, Pol A C; Güroğlu, Berna


    Childhood peer acceptance is associated with high levels of prosocial behavior and advanced perspective taking skills. Yet, the neurobiological mechanisms underlying these associations have not been studied. This functional magnetic resonance imaging study examined the neural correlates of sharing decisions in a group of adolescents who had a stable accepted status (n = 27) and a group who had a chronic rejected status (n = 19) across six elementary school grades. Both groups of adolescents played three allocation games in which they could share money with strangers with varying costs and profits to them and the other person. Stably accepted adolescents were more likely to share their money with unknown others than chronically rejected adolescents when sharing was not costly. Neuroimaging analyses showed that stably accepted adolescents, compared to chronically rejected adolescents, exhibited higher levels of activation in the temporo-parietal junction, posterior superior temporal sulcus, temporal pole, pre-supplementary motor area, and anterior insula during costly sharing decisions. These findings demonstrate that stable peer acceptance across childhood is associated with heightened activity in brain regions previously linked to perspective taking and the detection of social norm violations during adolescence, and thereby provide insight into processes underlying the widely established links between peer acceptance and prosocial behavior. © 2016 The Authors. Developmental Science Published by John Wiley & Sons Ltd.

  19. Kriging with Unknown Variance Components for Regional Ionospheric Reconstruction

    Ling Huang


    Full Text Available Ionospheric delay effect is a critical issue that limits the accuracy of precise Global Navigation Satellite System (GNSS positioning and navigation for single-frequency users, especially in mid- and low-latitude regions where variations in the ionosphere are larger. Kriging spatial interpolation techniques have been recently introduced to model the spatial correlation and variability of ionosphere, which intrinsically assume that the ionosphere field is stochastically stationary but does not take the random observational errors into account. In this paper, by treating the spatial statistical information on ionosphere as prior knowledge and based on Total Electron Content (TEC semivariogram analysis, we use Kriging techniques to spatially interpolate TEC values. By assuming that the stochastic models of both the ionospheric signals and measurement errors are only known up to some unknown factors, we propose a new Kriging spatial interpolation method with unknown variance components for both the signals of ionosphere and TEC measurements. Variance component estimation has been integrated with Kriging to reconstruct regional ionospheric delays. The method has been applied to data from the Crustal Movement Observation Network of China (CMONOC and compared with the ordinary Kriging and polynomial interpolations with spherical cap harmonic functions, polynomial functions and low-degree spherical harmonic functions. The statistics of results indicate that the daily ionospheric variations during the experimental period characterized by the proposed approach have good agreement with the other methods, ranging from 10 to 80 TEC Unit (TECU, 1 TECU = 1 × 1016 electrons/m2 with an overall mean of 28.2 TECU. The proposed method can produce more appropriate estimations whose general TEC level is as smooth as the ordinary Kriging but with a smaller standard deviation around 3 TECU than others. The residual results show that the interpolation precision of the

  20. Rendezvous with connectivity preservation for multi-robot systems with an unknown leader

    Dong, Yi


    This paper studies the leader-following rendezvous problem with connectivity preservation for multi-agent systems composed of uncertain multi-robot systems subject to external disturbances and an unknown leader, both of which are generated by a so-called exosystem with parametric uncertainty. By combining internal model design, potential function technique and adaptive control, two distributed control strategies are proposed to maintain the connectivity of the communication network, to achieve the asymptotic tracking of all the followers to the output of the unknown leader system, as well as to reject unknown external disturbances. It is also worth to mention that the uncertain parameters in the multi-robot systems and exosystem are further allowed to belong to unknown and unbounded sets when applying the second fully distributed control law containing a dynamic gain inspired by high-gain adaptive control or self-tuning regulator.

  1. Matrix- and tensor-based recommender systems for the discovery of currently unknown inorganic compounds

    Seko, Atsuto; Hayashi, Hiroyuki; Kashima, Hisashi; Tanaka, Isao


    Chemically relevant compositions (CRCs) and atomic arrangements of inorganic compounds have been collected as inorganic crystal structure databases. Machine learning is a unique approach to search for currently unknown CRCs from vast candidates. Herein we propose matrix- and tensor-based recommender system approaches to predict currently unknown CRCs from database entries of CRCs. Firstly, the performance of the recommender system approaches to discover currently unknown CRCs is examined. A Tucker decomposition recommender system shows the best discovery rate of CRCs as the majority of the top 100 recommended ternary and quaternary compositions correspond to CRCs. Secondly, systematic density functional theory (DFT) calculations are performed to investigate the phase stability of the recommended compositions. The phase stability of the 27 compositions reveals that 23 currently unknown compounds are newly found to be stable. These results indicate that the recommender system has great potential to accelerate the discovery of new compounds.

  2. OaMAX2 of Orobanche aegyptiaca and Arabidopsis AtMAX2 share conserved functions in both development and drought responses.

    Li, Weiqiang; Nguyen, Kien Huu; Watanabe, Yasuko; Yamaguchi, Shinjiro; Tran, Lam-Son Phan


    Previous studies in Arabidopsis reported that the MAX2 (more axillary growth 2) gene is a component of the strigolactone (SL) signaling pathway, which regulates a wide range of biological processes, from plant growth and development to environmental stress responses. Orobanche aegyptiaca is a harmful parasitic plant for many economically important crops. Seed germination of O. aegyptiaca is very sensitive to SLs, suggesting that O. aegyptiaca may contain components of the SL signaling pathway. To investigate this hypothesis, we identified and cloned a MAX2 ortholog from O. aegyptiaca for complementation analyses using the Arabidopsis Atmax2 mutant. The so-called OaMAX2 gene could rescue phenotypes of the Atmax2 mutant in various tested developmental aspects, including seed germination, shoot branching, leaf senescence and growth and development of hypocotyl, root hair, primary root and lateral root. More importantly, OaMAX2 could enhance the drought tolerance of Atmax2 mutant, suggesting its ability to restore the drought-tolerant phenotype of mutant plants defected in AtMAX2 function. Thus, this study provides genetic evidence that the functions of the MAX2 orthologs, and perhaps the MAX2 signaling pathways, are conserved in parasitic and non-parasitic plants. Furthermore, the results of our study enable us to develop a strategy to fight against parasitic plants by suppressing the MAX signaling, which ultimately leads to enhanced productivity of crop plants. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Determination of the origin of unknown irradiated nuclear fuel.

    Nicolaou, G


    An isotopic fingerprinting method is presented to determine the origin of unknown nuclear material with forensic importance. Spent nuclear fuel of known origin has been considered as the 'unknown' nuclear material in order to demonstrate the method and verify its prediction capabilities. The method compares, using factor analysis, the measured U, Pu isotopic compositions of the 'unknown' material with U, Pu isotopic compositions simulating well known spent fuels from a range of commercial nuclear power stations. Then, the 'unknown' fuel has the same origin as the commercial fuel with which it exhibits the highest similarity in U, Pu compositions.

  4. Determination of the origin of unknown irradiated nuclear fuel

    Nicolaou, G.


    An isotopic fingerprinting method is presented to determine the origin of unknown nuclear material with forensic importance. Spent nuclear fuel of known origin has been considered as the 'unknown' nuclear material in order to demonstrate the method and verify its prediction capabilities. The method compares, using factor analysis, the measured U, Pu isotopic compositions of the 'unknown' material with U, Pu isotopic compositions simulating well known spent fuels from a range of commercial nuclear power stations. Then, the 'unknown' fuel has the same origin as the commercial fuel with which it exhibits the highest similarity in U, Pu compositions

  5. Chimpanzees share forbidden fruit.

    Kimberley J Hockings


    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  6. Sharing the dance -

    He, Jing; Ravn, Susanne


    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  7. Global resource sharing

    Frederiksen, Linda; Nance, Heidi


    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  8. Report endorses data sharing

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  9. MUSIC-type imaging of small perfectly conducting cracks with an unknown frequency

    Park, Won-Kwang


    MUltiple SIgnal Classification (MUSIC) is a famous non-iterative detection algorithm in inverse scattering problems. However, when the applied frequency is unknown, inaccurate locations are identified via MUSIC. This fact has been confirmed through numerical simulations. However, the reason behind this phenomenon has not been investigated theoretically. Motivated by this fact, we identify the structure of MUSIC-type imaging functionals with unknown frequency, by establishing a relationship with Bessel functions of order zero of the first kind. Through this, we can explain why inaccurate results appear. (paper)

  10. MUSIC-type imaging of small perfectly conducting cracks with an unknown frequency

    Park, Won-Kwang


    MUltiple SIgnal Classification (MUSIC) is a famous non-iterative detection algorithm in inverse scattering problems. However, when the applied frequency is unknown, inaccurate locations are identified via MUSIC. This fact has been confirmed through numerical simulations. However, the reason behind this phenomenon has not been investigated theoretically. Motivated by this fact, we identify the structure of MUSIC-type imaging functionals with unknown frequency, by establishing a relationship with Bessel functions of order zero of the first kind. Through this, we can explain why inaccurate results appear.

  11. Shared reality in interpersonal relationships.

    Andersen, Susan M; Przybylinski, Elizabeth


    Close relationships afford us opportunities to create and maintain meaning systems as shared perceptions of ourselves and the world. Establishing a sense of mutual understanding allows for creating and maintaining lasting social bonds, and as such, is important in human relations. In a related vein, it has long been known that knowledge of significant others in one's life is stored in memory and evoked with new persons-in the social-cognitive process of 'transference'-imbuing new encounters with significance and leading to predictable cognitive, evaluative, motivational, and behavioral consequences, as well as shifts in the self and self-regulation, depending on the particular significant other evoked. In these pages, we briefly review the literature on meaning as interpersonally defined and then selectively review research on transference in interpersonal perception. Based on this, we then highlight a recent series of studies focused on shared meaning systems in transference. The highlighted studies show that values and beliefs that develop in close relationships (as shared reality) are linked in memory to significant-other knowledge, and thus, are indirectly activated (made accessible) when cues in a new person implicitly activate that significant-other knowledge (in transference), with these shared beliefs then actively pursued with the new person and even protected against threat. This also confers a sense of mutual understanding, and all told, serves both relational and epistemic functions. In concluding, we consider as well the relevance of co-construction of shared reality n such processes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Facilitating Knowledge Sharing

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  13. A Sharing Proposition.

    Sturgeon, Julie


    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  14. Psychological profile: the problem of modeling the unknown criminal personality

    Г. М. Гетьман


    Full Text Available The article investigates the problem of modeling an unknown person in the preparation of criminal psychological profile. Some approaches to the concept of "psychological profile" and "psychological portrait", in particular the proposed delineation of these terms. We consider the system steps in the development of the psychological profile of an unknown perpetrator.

  15. Pricing Shared Appreciation Mortgages

    Zhong, Yina


    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  16. Sharing resources@CERN

    Maximilien Brice


    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  17. SharePoint governance

    Ali, Mudassar


    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  18. Information partnerships--shared data, shared scale.

    Konsynski, B R; McFarlan, F W


    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  19. Regulating the sharing economy

    Kristofer Erickson


    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  20. Teleportation of an unknown bipartite state via non-maximally entangled two-particle state

    Cao Hai-Jing; Guo Yan-Qing; Song He-Shan


    In this paper a new scheme for teleporting an unknown entangled state of two particles is proposed. To weaken the requirement for the quantum channel, without loss of generality, two communicators only share a non-maximally entangled two-particle state. Teleportation can be probabilistically realized if sender performs Bell-state measurements and Hadamard transformation and receiver introduces two auxiliary particles, operates G-not operation, single-qubit measurements and appropriate unitary transformations. The probability of successful teleportation is determined by the smaller one among the coefficients' absolute values of the quantum channel.

  1. SharePoint 2010 Development For Dummies

    Withee, Ken


    A much-needed guide that shows you how to leverage SharePoint tools without writing a line of code!. The great news about SharePoint is…you don't need to be a seasoned .NET developer to develop custom functions for it. This book shows you how to use SharePoint Designer, Report Builder, Dashboard Designer, InfoPath, Excel, Word, Visio, and the SharePoint web-based UI to design and develop—without ever writing a line of code! Learn how to customize your site, build SharePoint apps, start social networking, or add Web parts.  This straightforward guide makes everything easier.: Introduces you to

  2. Labia Majora Share

    Hanjing Lee


    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  3. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun


    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  4. Share Contract Choices and Economic Performance

    Salazar Espinoza, César Antonio


    framework, we estimate a dose-response function to study the formation of contracts and identify the marginal effects of changes in crew profit shares on fishing returns in Chilean artisanal fisheries. The results support share contract choices based on bargaining power, monitoring costs, technology, state...... of fishing resources, and outside options. We find significant effects of increasing crew profit shares on vessel owner returns in the interval (0.25, 0.65). The results vary across fisheries, however. While the effects are not significant in the fish group, they are larger and robust for molluscs...

  5. Collaborate, compete and share

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano


    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  6. Urban sharing culture

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  7. Sharing a common resource with concave benefits

    Ambec, S.


    A group of agents enjoy concave and single-peak benefit functions from consuming a shared resource. They also value money (transfers). The resource is scarce in the sense that not everybody can consume its peak. The paper characterizes the unique (resource and money) allocation that is efficient, incentive compatible and equal-sharing individual rational. It can be implemented (i) by selling the resource or taxing extraction and redistributing the money collected equally, or (ii) by assigning...

  8. Phylogenetic molecular function annotation

    Engelhardt, Barbara E; Jordan, Michael I; Repo, Susanna T; Brenner, Steven E


    It is now easier to discover thousands of protein sequences in a new microbial genome than it is to biochemically characterize the specific activity of a single protein of unknown function. The molecular functions of protein sequences have typically been predicted using homology-based computational methods, which rely on the principle that homologous proteins share a similar function. However, some protein families include groups of proteins with different molecular functions. A phylogenetic approach for predicting molecular function (sometimes called 'phylogenomics') is an effective means to predict protein molecular function. These methods incorporate functional evidence from all members of a family that have functional characterizations using the evolutionary history of the protein family to make robust predictions for the uncharacterized proteins. However, they are often difficult to apply on a genome-wide scale because of the time-consuming step of reconstructing the phylogenies of each protein to be annotated. Our automated approach for function annotation using phylogeny, the SIFTER (Statistical Inference of Function Through Evolutionary Relationships) methodology, uses a statistical graphical model to compute the probabilities of molecular functions for unannotated proteins. Our benchmark tests showed that SIFTER provides accurate functional predictions on various protein families, outperforming other available methods.

  9. Shared services in accounting and finance

    Swagerman, D.M.; van Steenis, Jorn; Sieber, Pascal; Griese, Joachim


    The purpose of this paper is to present examples of the current state of the Shared Services Concept as applied to the finance function. The paper arises out of the ongoing research after current developments in the finance function enabled by information and communication technology, at the

  10. Carcinoma of Unknown Primary Treatment (PDQ®)—Patient Version

    Carcinoma of unknown primary (CUP), treatment can include surgery, radiation therapy, chemotherapy, or hormone therapy. Get detailed information about the diagnosis and treatment of CUP in this expert-reviewed summary.

  11. RBF neural network based H∞ synchronization for unknown chaotic ...

    , 172 ... the effect of disturbance to an H∞ norm constraint. It is shown that ... unknown chaotic systems; linear matrix inequality (LMI); learning law. 1. Introduction .... (9) is RBFNN H∞ synchronized if the synchronization error e(t) satisfies. ∫ ∞.

  12. Classification of Unknown Thermocouple Types Using Similarity Factor Measurement

    Seshu K. DAMARLA


    Full Text Available In contrast to classification using PCA method, a new methodology is proposed for type identification of unknown thermocouple. The new methodology is based on calculating the degree of similarity between two multivariate datasets using two types of similarity factors. One similarity factor is based on principle component analysis and the angles between the principle component subspaces while the other is based on the Mahalanobis distance between the datasets. Datasets containing thermo-emfs against given temperature ranges are formed for each type of thermocouple (e.g. J, K, S, T, R, E, B and N type by experimentation are considered as reference datasets. Datasets corresponding to unknown type are captured. Similarity factor between the datasets one of which being the unknown type and the other being each known type are compared. When maximum similarity factor occurs, then the class of unknown type is allocated to that of known type.

  13. Projective and hybrid projective synchronization for the Lorenz-Stenflo system with estimation of unknown parameters

    Mukherjee, Payel; Banerjee, Santo


    In this work, in the first phase, we study the phenomenon of projective synchronization in the Lorenz-Stenflo system. Synchronization is then investigated for the same system with unknown parameters. We show analytically that synchronization is possible for some proper choice of the nonlinear controller by using a suitable Lyapunov function. With the help of this result, it is also possible to estimate the values of the unknown system parameters. In the second phase as an extension of our analysis, we investigate the new hybrid projective synchronization for the same system. All our analyses are well supported with numerical evidence.


    Li Shu; Zhuo Jiashou; Ren Qingwen


    In this paper, an optimal criterion is presented for adaptive Kalman filter in a control sys tem with unknown variances of stochastic vibration by constructing a function of noise variances and minimizing the function. We solve the model and measure variances by using DFP optimal method to guarantee the results of Kalman filter to be optimized. Finally, the control of vibration can be implemented by LQG method.

  15. Chinese Unknown Word Recognition for PCFG-LA Parsing

    Qiuping Huang


    Full Text Available This paper investigates the recognition of unknown words in Chinese parsing. Two methods are proposed to handle this problem. One is the modification of a character-based model. We model the emission probability of an unknown word using the first and last characters in the word. It aims to reduce the POS tag ambiguities of unknown words to improve the parsing performance. In addition, a novel method, using graph-based semisupervised learning (SSL, is proposed to improve the syntax parsing of unknown words. Its goal is to discover additional lexical knowledge from a large amount of unlabeled data to help the syntax parsing. The method is mainly to propagate lexical emission probabilities to unknown words by building the similarity graphs over the words of labeled and unlabeled data. The derived distributions are incorporated into the parsing process. The proposed methods are effective in dealing with the unknown words to improve the parsing. Empirical results for Penn Chinese Treebank and TCT Treebank revealed its effectiveness.

  16. Practical Intersubjectivity and Normative Guidance: Bratman on Shared Agency

    Roth Abraham Sesshu


    Full Text Available In an important new book on shared agency, Michael Bratman develops an account of the normative demand for the coordination of intentions amongst participants in shared agency. Bratman seeks to understand this form of normative guidance in terms of that associated with individual planning intentions. I give reasons to resist his form of reductionism. In addition, I note how Bratman’s discussion raises the interesting issue of the function or purpose of shared intention and of shared agency more generally. According to Bratman, the function of shared intention is to promote interpersonal coordination of intention and action. I suggest that power sharing amongst participants must also be included as a function of shared intention.

  17. Information Sharing and Knowledge Sharing as Communicative Activities

    Savolainen, Reijo


    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  18. Data Series Subtraction with Unknown and Unmodeled Background Noise

    Vitale, Stefano; Congedo, Giuseppe; Dolesi, Rita; Ferroni, Valerio; Hueller, Mauro; Vetrugno, Daniele; Weber, William Joseph; Audley, Heather; Danzmann, Karsten; Diepholz, Ingo; hide


    LISA Pathfinder (LPF), the precursor mission to a gravitational wave observatory of the European Space Agency, will measure the degree to which two test masses can be put into free fall, aiming to demonstrate a suppression of disturbance forces corresponding to a residual relative acceleration with a power spectral density (PSD) below (30 fm/sq s/Hz)(sup 2) around 1 mHz. In LPF data analysis, the disturbance forces are obtained as the difference between the acceleration data and a linear combination of other measured data series. In many circumstances, the coefficients for this linear combination are obtained by fitting these data series to the acceleration, and the disturbance forces appear then as the data series of the residuals of the fit. Thus the background noise or, more precisely, its PSD, whose knowledge is needed to build up the likelihood function in ordinary maximum likelihood fitting, is here unknown, and its estimate constitutes instead one of the goals of the fit. In this paper we present a fitting method that does not require the knowledge of the PSD of the background noise. The method is based on the analytical marginalization of the posterior parameter probability density with respect to the background noise PSD, and returns an estimate both for the fitting parameters and for the PSD. We show that both these estimates are unbiased, and that, when using averaged Welchs periodograms for the residuals, the estimate of the PSD is consistent, as its error tends to zero with the inverse square root of the number of averaged periodograms. Additionally, we find that the method is equivalent to some implementations of iteratively reweighted least-squares fitting. We have tested the method both on simulated data of known PSD and on data from several experiments performed with the LISA Pathfinder end-to-end mission simulator.

  19. CUP Syndrome-Metastatic Malignancy with Unknown Primary Tumor.

    Zaun, Gregor; Schuler, Martin; Herrmann, Ken; Tannapfel, Andrea


    2-4% of newly diagnosed cases of malignant disease involve cancer of unknown primary (CUP). This mixed entity is one of the 6 most common types of malignant disease in Germany. Highly refined treatment strategies can now be offered to patients with CUP. This review is based on pertinent publications retrieved by a selective search in PubMed with an emphasis on articles from the past decade. The current guidelines and recommendations of specialty societies were also considered in the evaluation. CUP most commonly manifests itself as metastases to the lymph nodes, lungs, liver, or bones. With the aid of imaging studies, including functional hybrid imaging and further medical examination, a primary tumor can be discovered in up to 40% of patients initially diagnosed with CUP. Immunohistochemistry guided by histomorphology often enables precise characterization of the lesion and can be supplemented, in selected cases, by molecular-genetic diagnostic evaluation. The most commonly detected types of primary tumor are cancers of the lung, pancreas, liver, and biliary system. For patients with local metastases, surgical resection or radiotherapy with curative intent is usually indicated, sometimes in the framework of a multimodal treatment concept. The median 2-year survival of patients with disseminated CUP is only 20%. For such patients, specific types of systemic therapy are recommended on the basis of the diagnostic characterization of the disease. Immune-modulatory antibodies can be effective, particularly in the treatment of CUP that has been characterized with biomarkers, but should still be considered experimental at present. A combination of conventional and innovative diagnostic methods enables the provision of highly refined therapeutic strategies to patients with CUP who are undergoing treatment in interdisciplinary cancer centers.

  20. Shared Care in Diabetes?

    Bødker, Keld


    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  1. Sharing (and) familiarities

    Rasmussen, Jon Dag; Winther, Ida Wentzel; Davies, Hayley

    but not exclusive to lifestories/biographies, travels, times, spaces and material items, bodies and intimate knowledge of one another, surnames - in the subjective lives of family members? Sociology has traditionally been preoccupied with notions and logics of sharing in homely contexts (e.g. Simmel’s work...

  2. The Sharing Economy

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti


    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected to a...

  3. Automated pathway and reaction prediction facilitates in silico identification of unknown metabolites in human cohort studies.

    Quell, Jan D; Römisch-Margl, Werner; Colombo, Marco; Krumsiek, Jan; Evans, Anne M; Mohney, Robert; Salomaa, Veikko; de Faire, Ulf; Groop, Leif C; Agakov, Felix; Looker, Helen C; McKeigue, Paul; Colhoun, Helen M; Kastenmüller, Gabi


    Identification of metabolites in non-targeted metabolomics continues to be a bottleneck in metabolomics studies in large human cohorts. Unidentified metabolites frequently emerge in the results of association studies linking metabolite levels to, for example, clinical phenotypes. For further analyses these unknown metabolites must be identified. Current approaches utilize chemical information, such as spectral details and fragmentation characteristics to determine components of unknown metabolites. Here, we propose a systems biology model exploiting the internal correlation structure of metabolite levels in combination with existing biochemical and genetic information to characterize properties of unknown molecules. Levels of 758 metabolites (439 known, 319 unknown) in human blood samples of 2279 subjects were measured using a non-targeted metabolomics platform (LC-MS and GC-MS). We reconstructed the structure of biochemical pathways that are imprinted in these metabolomics data by building an empirical network model based on 1040 significant partial correlations between metabolites. We further added associations of these metabolites to 134 genes from genome-wide association studies as well as reactions and functional relations to genes from the public database Recon 2 to the network model. From the local neighborhood in the network, we were able to predict the pathway annotation of 180 unknown metabolites. Furthermore, we classified 100 pairs of known and unknown and 45 pairs of unknown metabolites to 21 types of reactions based on their mass differences. As a proof of concept, we then looked further into the special case of predicted dehydrogenation reactions leading us to the selection of 39 candidate molecules for 5 unknown metabolites. Finally, we could verify 2 of those candidates by applying LC-MS analyses of commercially available candidate substances. The formerly unknown metabolites X-13891 and X-13069 were shown to be 2-dodecendioic acid and 9

  4. Universal algorithm of time sharing

    Silin, I.N.; Fedyun'kin, E.D.


    Timesharing system algorithm is proposed for the wide class of one- and multiprocessor computer configurations. Dynamical priority is the piece constant function of the channel characteristic and system time quantum. The interactive job quantum has variable length. Characteristic recurrent formula is received. The concept of the background job is introduced. Background job loads processor if high priority jobs are inactive. Background quality function is given on the base of the statistical data received in the timesharing process. Algorithm includes optimal trashing off procedure for the jobs replacements in the memory. Sharing of the system time in proportion to the external priorities is guaranteed for the all active enough computing channels (back-ground too). The fast answer is guaranteed for the interactive jobs, which use small time and memory. The external priority control is saved for the high level scheduler. The experience of the algorithm realization on the BESM-6 computer in JINR is discussed

  5. Solving differential equations with unknown constitutive relations as recurrent neural networks

    Hagge, Tobias J.; Stinis, Panagiotis; Yeung, Enoch H.; Tartakovsky, Alexandre M.


    We solve a system of ordinary differential equations with an unknown functional form of a sink (reaction rate) term. We assume that the measurements (time series) of state variables are partially available, and use a recurrent neural network to “learn” the reaction rate from this data. This is achieved by including discretized ordinary differential equations as part of a recurrent neural network training problem. We extend TensorFlow’s recurrent neural network architecture to create a simple but scalable and effective solver for the unknown functions, and apply it to a fedbatch bioreactor simulation problem. Use of techniques from recent deep learning literature enables training of functions with behavior manifesting over thousands of time steps. Our networks are structurally similar to recurrent neural networks, but differ in purpose, and require modified training strategies.

  6. MoCha: Molecular Characterization of Unknown Pathways.

    Lobo, Daniel; Hammelman, Jennifer; Levin, Michael


    Automated methods for the reverse-engineering of complex regulatory networks are paving the way for the inference of mechanistic comprehensive models directly from experimental data. These novel methods can infer not only the relations and parameters of the known molecules defined in their input datasets, but also unknown components and pathways identified as necessary by the automated algorithms. Identifying the molecular nature of these unknown components is a crucial step for making testable predictions and experimentally validating the models, yet no specific and efficient tools exist to aid in this process. To this end, we present here MoCha (Molecular Characterization), a tool optimized for the search of unknown proteins and their pathways from a given set of known interacting proteins. MoCha uses the comprehensive dataset of protein-protein interactions provided by the STRING database, which currently includes more than a billion interactions from over 2,000 organisms. MoCha is highly optimized, performing typical searches within seconds. We demonstrate the use of MoCha with the characterization of unknown components from reverse-engineered models from the literature. MoCha is useful for working on network models by hand or as a downstream step of a model inference engine workflow and represents a valuable and efficient tool for the characterization of unknown pathways using known data from thousands of organisms. MoCha and its source code are freely available online under the GPLv3 license.

  7. Sharing data increases citations

    Drachen, Thea Marie; Ellegaard, Ole; Larsen, Asger Væring


    This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...... by bibliographical links, and consists of papers receiving on average significantly more citations per paper per year, than do papers not associated with links to data.......This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...

  8. Does Knowledge Sharing Pay?

    Mahnke, Volker; Pedersen, Torben; Venzin, Markus

    are developed using a simultaneous equation model applied to a unique dataset encompassing a German MNC, HeidelbergCement. Enablers and impediments of knowledge outflows are assessed in order to explain why subsidiaries share their knowledge with other MNC units. Implications are examined by studying the link......This empirical paper explores knowledge outflow from MNC subsidiaries and its impact on the MNC performance. We develop and test hypotheses derived from literature on MNC knowledge flows integrated with the perspective of knowledge-creating, self-interested MNC subsidiaries. The hypotheses...... between knowledge outflows and subsidiary performance. Our findings suggest that knowledge outflows increase a subsidiary's performance only up to a certain point and that too much knowledge sharing may be detrimental to the contributing subsidiary's performance....

  9. Globalization and Risk Sharing

    Jaume Ventura; Fernando A. Broner


    We study the effects of globalization on risk sharing and welfare. Like the previous literature, we assume that governments cannot commit to enforce the repayment of debts owed by their citizens. Unlike the previous literature, we assume that governments cannot discriminate between domestic and foreign creditors when enforcing debt payments. This creates novel interactions between domestic and international trade in assets. (i) Increases in domestic trade raise the benefits of enforcement and...

  10. Decreasing Serial Cost Sharing

    Hougaard, Jens Leth; Østerdal, Lars Peter

    The increasing serial cost sharing rule of Moulin and Shenker [Econometrica 60 (1992) 1009] and the decreasing serial rule of de Frutos [Journal of Economic Theory 79 (1998) 245] have attracted attention due to their intuitive appeal and striking incentive properties. An axiomatic characterization...... of the increasing serial rule was provided by Moulin and Shenker [Journal of Economic Theory 64 (1994) 178]. This paper gives an axiomatic characterization of the decreasing serial rule...

  11. Decreasing serial cost sharing

    Hougaard, Jens Leth; Østerdal, Lars Peter Raahave


    The increasing serial cost sharing rule of Moulin and Shenker (Econometrica 60:1009-1037, 1992) and the decreasing serial rule of de Frutos (J Econ Theory 79:245-275, 1998) are known by their intuitive appeal and striking incentive properties. An axiomatic characterization of the increasing serial...... rule was provided by Moulin and Shenker (J Econ Theory 64:178-201, 1994). This paper gives an axiomatic characterization of the decreasing serial rule....

  12. Towards A Shared Mission

    Staunstrup, Jørgen; Orth Gaarn-Larsen, Carsten

    A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome of the univer......A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome...... on a shared mission aiming at value creation (in the broadest interpretation). One important aspect of choosing value as the cornerstone of the mission of universities is to stress that the outcome is measured by external stakeholders and by their standards. Most of the paper is devoted to discussing value...... it possible to lead through processes that engage and excite while creating transparency and accountability. The paper will be illustrated with examples from Denmark and the Helios initiative taken by the Danish Academy of Technical Sciences (ATV) under the headline “The value creating university – courage...

  13. Bonobos share with strangers.

    Jingzhi Tan

    Full Text Available Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  14. Sharing resources@CERN


    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Until now many people were unaware that copies of the same book (or standard, or journal) are often held not only by the library but by different divisions. (Here Eduardo Aldaz, from the PS division, and Isabel Bejar, from the ST division, read their divisional copies of the same book.) The idea behind the library's new sharing resources@CERN' initiative is not at all to collect the books in individual collections at the CERN library, but simply to register them in the Library database. Those not belonging to the library will in principle be unavailable for loan, but should be able to be consulted by anybody at CERN who is interested. "When you need a book urgently and it is not available in the library,' said PS Division engineer Eduardo Aldaz Carroll, it is a sham...

  15. Shared care and boundaries:

    Winthereik, Brit Ross


    Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science and techno......Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science...... and technology studies. Findings – The paper shows how a version of “the responsible patient” emerges from the project which is different from the version envisioned by the project organisation. The emerging one is concerned with the boundary between primary and secondary sector care, and not with the boundary......, IT designers and project managers should attend to the specific ways in which boundaries are inevitably enacted and to the ways in which care is already shared. This will provide them with opportunities to use the potentials of new identities and concerns that emerge from changing the organisation...

  16. Grasping Unknown Objects in an Early Cognitive Vision System

    Popovic, Mila


    Grasping of unknown objects presents an important and challenging part of robot manipulation. The growing area of service robotics depends upon the ability of robots to autonomously grasp and manipulate a wide range of objects in everyday environments. Simple, non task-specific grasps of unknown ...... and comparing vision-based grasping methods, and the creation of algorithms for bootstrapping a process of acquiring world understanding for artificial cognitive agents....... presents a system for robotic grasping of unknown objects us- ing stereo vision. Grasps are defined based on contour and surface information provided by the Early Cognitive Vision System, that organizes visual informa- tion into a biologically motivated hierarchical representation. The contributions...... of the thesis are: the extension of the Early Cognitive Vision representation with a new type of feature hierarchy in the texture domain, the definition and evaluation of contour based grasping methods, the definition and evaluation of surface based grasping methods, the definition of a benchmark for testing...

  17. Elimination of some unknown parameters and its effect on outlier detection

    Serif Hekimoglu

    Full Text Available Outliers in observation set badly affect all the estimated unknown parameters and residuals, that is because outlier detection has a great importance for reliable estimation results. Tests for outliers (e.g. Baarda's and Pope's tests are frequently used to detect outliers in geodetic applications. In order to reduce the computational time, sometimes elimination of some unknown parameters, which are not of interest, is performed. In this case, although the estimated unknown parameters and residuals do not change, the cofactor matrix of the residuals and the redundancies of the observations change. In this study, the effects of the elimination of the unknown parameters on tests for outliers have been investigated. We have proved that the redundancies in initial functional model (IFM are smaller than the ones in reduced functional model (RFM where elimination is performed. To show this situation, a horizontal control network was simulated and then many experiences were performed. According to simulation results, tests for outlier in IFM are more reliable than the ones in RFM.

  18. Haplotype analysis and a novel allele-sharing method refines a chromosome 4p locus linked to bipolar affective disorder.

    Le Hellard, Stephanie; Lee, Andrew J; Underwood, Sarah; Thomson, Pippa A; Morris, Stewart W; Torrance, Helen S; Anderson, Susan M; Adams, Richard R; Navarro, Pau; Christoforou, Andrea; Houlihan, Lorna M; Detera-Wadleigh, Sevilla; Owen, Michael J; Asherson, Philip; Muir, Walter J; Blackwood, Douglas H R; Wray, Naomi R; Porteous, David J; Evans, Kathryn L


    Bipolar affective disorder (BPAD) and schizophrenia (SCZ) are common conditions. Their causes are unknown, but they include a substantial genetic component. Previously, we described significant linkage of BPAD to a chromosome 4p locus within a large pedigree (F22). Others subsequently have found evidence for linkage of BPAD and SCZ to this region. We constructed high-resolution haplotypes for four linked families, calculated logarithm of the odds (LOD) scores, and developed a novel method to assess the extent of allele sharing within genes between the families. We describe an increase in the F22 LOD score for this region. Definition and comparison of the linked haplotypes allowed us to prioritize two subregions of 3.8 and 4.4 Mb. Analysis of the extent of allele sharing within these subregions identified 200 kb that shows increased allele sharing between families. Linkage of BPAD to chromosome 4p has been strengthened. Haplotype analysis in the additional linked families refined the 20-Mb linkage region. Development of a novel allele-sharing method allowed us to bridge the gap between conventional linkage and association studies. Description of a 200-kb region of increased allele sharing prioritizes this region, which contains two functional candidate genes for BPAD, SLC2A9, and WDR1, for subsequent studies.

  19. Sharing Teaching Ideas.

    Touval, Ayana


    Introduces the concept of maximum and minimum function values as turning points on the function's graphic representation and presents a method for finding these values without using calculus. The process of utilizing transformations to find the turning point of a quadratic function is extended to find the turning points of cubic functions. (MDH)

  20. Shared-memory synchronization

    Scott, Michael L


    From driving, flying, and swimming, to digging for unknown objects in space exploration, autonomous robots take on varied shapes and sizes. In part, autonomous robots are designed to perform tasks that are too dirty, dull, or dangerous for humans. With nontrivial autonomy and volition, they may soon claim their own place in human society. These robots will be our allies as we strive for understanding our natural and man-made environments and build positive synergies around us. Although we may never perfect replication of biological capabilities in robots, we must harness the inevitable emergen

  1. Shared memories reveal shared structure in neural activity across individuals

    Chen, J.; Leong, Y.C.; Honey, C.J.; Yong, C.H.; Norman, K.A.; Hasson, U.


    Our lives revolve around sharing experiences and memories with others. When different people recount the same events, how similar are their underlying neural representations? Participants viewed a fifty-minute movie, then verbally described the events during functional MRI, producing unguided detailed descriptions lasting up to forty minutes. As each person spoke, event-specific spatial patterns were reinstated in default-network, medial-temporal, and high-level visual areas. Individual event patterns were both highly discriminable from one another and similar between people, suggesting consistent spatial organization. In many high-order areas, patterns were more similar between people recalling the same event than between recall and perception, indicating systematic reshaping of percept into memory. These results reveal the existence of a common spatial organization for memories in high-level cortical areas, where encoded information is largely abstracted beyond sensory constraints; and that neural patterns during perception are altered systematically across people into shared memory representations for real-life events. PMID:27918531

  2. Celiac Disease Presenting as Fever of Unknown Origin

    Megan J. Cooney


    Full Text Available Celiac disease (CD is a common autoimmune enteropathy that occurs, in affected individuals, with exposure to gluten in the diet and improves with removal of dietary gluten. Although CD is readily considered in patients with classical presentations of the disease, atypical manifestations may be the only presenting symptoms. We present a case of CD in a 16-year-old female presenting as fever of unknown origin, which has not been reported previously. The postulated mechanism for fever in CD and the importance of clinicians having a low threshold for considering CD in the differential diagnosis of fever of unknown origin and other enigmatic clinical presentations is discussed.

  3. Scheme for teleportation of unknown states of trapped ion

    Chen Mei-Feng; Ma Song-She


    A scheme is presented for teleporting an unknown state in a trapped ion system.The scheme only requires a single laser beam.It allows the trap to be in any state with a few phonons,e.g.a thermal motion.Furthermore,it works in the regime,where the Rabi frequency of the laser is on the order of the trap frequency.Thus,the teleportation speed is greatly increased,which is important for decreasing the decoherence effect.This idea can also be used to teleport an unknown ionic entangled state.

  4. Everyday executive functions in Down syndrome from early childhood to young adulthood: evidence for both unique and shared characteristics compared to youth with sex chromosome trisomy (XXX and XXY).

    Lee, Nancy Raitano; Anand, Payal; Will, Elizabeth; Adeyemi, Elizabeth I; Clasen, Liv S; Blumenthal, Jonathan D; Giedd, Jay N; Daunhauer, Lisa A; Fidler, Deborah J; Edgin, Jamie O


    Executive functions (EF) are thought to be impaired in Down syndrome (DS) and sex chromosome trisomy (Klinefelter and Trisomy X syndromes; +1X). However, the syndromic specificity and developmental trajectories associated with EF difficulties in these groups are poorly understood. The current investigation (a) compared everyday EF difficulties in youth with DS, +1X, and typical development (TD); and (b) examined relations between age and EF difficulties in these two groups and a TD control group cross-sectionally. Study 1 investigated the syndromic specificity of EF profiles on the Behavior Rating Inventory of Executive Function (BRIEF) in DS (n = 30), +1X (n = 30), and a TD group (n = 30), ages 5-18 years. Study 2 examined age effects on EF in the same cross-sectional sample of participants included in Study 1. Study 3 sought to replicate Study 2's findings for DS by examining age-EF relations in a large independent sample of youth with DS (n = 85) and TD (n = 43), ages 4-24 years. Study 1 found evidence for both unique and shared EF impairments for the DS and +1X groups. Most notably, youth with +1X had relatively uniform EF impairments on the BRIEF scales, while the DS group showed an uneven BRIEF profile with relative strengths and weaknesses. Studies 2 and 3 provided support for fairly similar age-EF relations in the DS and TD groups. In contrast, for the +1X group, findings were mixed; 6 BRIEF scales showed similar age-EF relations to the TD group and 2 showed greater EF difficulties at older ages for +1X. These findings will be discussed within the context of efforts to identify syndrome specific cognitive-behavioral profiles for youth with different genetic syndromes in order to inform basic science investigations into the etiology of EF difficulties in these groups and to develop treatment approaches that are tailored to the needs of these groups.

  5. The fungus Ustilago maydis and humans share disease-related proteins that are not found in Saccharomyces cerevisiae

    Steinberg Gero


    Full Text Available Abstract Background The corn smut fungus Ustilago maydis is a well-established model system for molecular phytopathology. In addition, it recently became evident that U. maydis and humans share proteins and cellular processes that are not found in the standard fungal model Saccharomyces cerevisiae. This prompted us to do a comparative analysis of the predicted proteome of U. maydis, S. cerevisiae and humans. Results At a cut off at 20% identity over protein length, all three organisms share 1738 proteins, whereas both fungi share only 541 conserved proteins. Despite the evolutionary distance between U. maydis and humans, 777 proteins were shared. When applying a more stringent criterion (≥ 20% identity with a homologue in one organism over at least 50 amino acids and ≥ 10% less in the other organism, we found 681 proteins for the comparison of U. maydis and humans, whereas the both fungi share only 622 fungal specific proteins. Finally, we found that S. cerevisiae and humans shared 312 proteins. In the U. maydis to H. sapiens homology set 454 proteins are functionally classified and 42 proteins are related to serious human diseases. However, a large portion of 222 proteins are of unknown function. Conclusion The fungus U. maydis has a long history of being a model system for understanding DNA recombination and repair, as well as molecular plant pathology. The identification of functionally un-characterized genes that are conserved in humans and U. maydis opens the door for experimental work, which promises new insight in the cell biology of the mammalian cell.

  6. Elitism, Sharing and Ranking Choices in Evolutionary Multi-Criterion Optimisation

    Pursehouse, R.C.; Fleming, P.J.


    Elitism and sharing are two mechanisms that are believed to improve the performance of an evolutionary multi-criterion optimiser. The relative performance of of the two most popular ranking strategies is largely unknown. Using a new empirical inquiry framework, this report studies the effect of elitism, sharing and ranking design choices using a benchmark suite of two-criterion problems.........

  7. Designing towards the Unknown: Engaging with Material and Aesthetic Uncertainty

    Danielle Wilde


    Full Text Available New materials with new capabilities demand new ways of approaching design. Destabilising existing methods is crucial to develop new methods. Yet, radical destabilisation—where outcomes remain unknown long enough that new discoveries become possible—is not easy in technology design where complex interdisciplinary teams with time and resource constraints need to deliver concrete outcomes on schedule. The Poetic Kinaesthetic Interface project (PKI engages with this problematic directly. In PKI we use unfolding processes—informed by participatory, speculative and critical design—in emergent actions, to design towards unknown outcomes, using unknown materials. The impossibility of this task is proving as useful as it is disruptive. At its most potent, it is destabilising expectations, aesthetics and processes. Keeping the researchers, collaborators and participants in a state of unknowing, is opening the research potential to far-ranging possibilities. In this article we unpack the motivations driving the PKI project. We present our mixed-methodology, which entangles textile crafts, design interactions and materiality to shape an embodied enquiry. Our research outcomes are procedural and methodological. PKI brings together diverse human, non-human, known and unknown actors to discover where the emergent assemblages might lead. Our approach is re-invigorating—as it demands re-envisioning of—the design process.

  8. Liability for Unknown Risks: A Law and Economics Perspective

    M.G. Faure (Michael); L.T. Visscher (Louis); F. Weber (Franziska)


    textabstractIn the law and economics literature liability is generally regarded as an instrument which provides potential tortfeasors with incentives for optimal care taking. The question, however, arises whether liability can still provide those incentives when risks are unknown. That is the

  9. Fault tolerant control of wind turbines using unknown input observers

    Odgaard, Peter Fogh; Stoustrup, Jakob


    This paper presents a scheme for accommodating faults in the rotor and generator speed sensors in a wind turbine. These measured values are important both for the wind turbine controller as well as the supervisory control of the wind turbine. The scheme is based on unknown input observers, which...

  10. Value of Bone marrow Examination in Pyrexia of unknown origin

    A Jha


    Full Text Available Background: Pyrexia of unknown origin is a common diagnostic dilemma. Series of diagnostic modalities are required to arrive at diagnosis. Bone marrow examination is one of the common tests implicated in the diagnosis in combination with other diagnostic modalities. Present study has attempted to explore the causes of pyrexia of unknown origin based on bone marrow morphological study. Materials and Methods: In a one year prospective study conducted at Manipal Teaching Hospital, Pokhara, Nepal; bone marrow aspiration and biopsy was performed and evaluated morphologically, in 57 patients fulfilling the criteria of classic pyrexia of unknown origin. Results: In 42% cases; specific diagnosis could be made and hematological neoplasm was the most common finding followed by megaloblastic anemia, hypoplastic anemia and one case each of hemophagocytosis, malaria and tuberculosis. Acute leukemia was the most frequently encountered hematological malignancy followed by multiple myeloma, chronic myeloid leukemia, essential thrombocythemia and myelodysplastic syndrome. Conclusion: Morphological examination of bone marrow has important role in diagnosis of pyrexia of unknown origin. However, yield of diagnosis can be increased if it is combined with other diagnostic modalities including radiological, microbiological and serological tests. DOI: Journal of Pathology of Nepal (2013 Vol. 3, 447-451

  11. Fast grasping of unknown objects using principal component analysis

    Lei, Qujiang; Chen, Guangming; Wisse, Martijn


    Fast grasping of unknown objects has crucial impact on the efficiency of robot manipulation especially subjected to unfamiliar environments. In order to accelerate grasping speed of unknown objects, principal component analysis is utilized to direct the grasping process. In particular, a single-view partial point cloud is constructed and grasp candidates are allocated along the principal axis. Force balance optimization is employed to analyze possible graspable areas. The obtained graspable area with the minimal resultant force is the best zone for the final grasping execution. It is shown that an unknown object can be more quickly grasped provided that the component analysis principle axis is determined using single-view partial point cloud. To cope with the grasp uncertainty, robot motion is assisted to obtain a new viewpoint. Virtual exploration and experimental tests are carried out to verify this fast gasping algorithm. Both simulation and experimental tests demonstrated excellent performances based on the results of grasping a series of unknown objects. To minimize the grasping uncertainty, the merits of the robot hardware with two 3D cameras can be utilized to suffice the partial point cloud. As a result of utilizing the robot hardware, the grasping reliance is highly enhanced. Therefore, this research demonstrates practical significance for increasing grasping speed and thus increasing robot efficiency under unpredictable environments.

  12. A Size Exclusion Chromatography Laboratory with Unknowns for Introductory Students

    McIntee, Edward J.; Graham, Kate J.; Colosky, Edward C.; Jakubowski, Henry V.


    Size exclusion chromatography is an important technique in the separation of biological and polymeric samples by molecular weight. While a number of laboratory experiments have been published that use this technique for the purification of large molecules, this is the first report of an experiment that focuses on purifying an unknown small…

  13. Stochastic Online Learning in Dynamic Networks under Unknown Models


    The key is to develop online learning strategies at each individual node. Specifically, through local information exchange with its neighbors, each...infinitely repeated game with incomplete information and developed a dynamic pricing strategy referred to as Competitive and Cooperative Demand Learning...Stochastic Online Learning in Dynamic Networks under Unknown Models This research aims to develop fundamental theories and practical algorithms for

  14. Multiple analysis of an unknown optical multilayer coating

    Dobrowolski, J.A.; Ho, F.C.; Waldorf, A.


    Results are given of the analysis at five different laboratories of an unknown optical multilayer coating. In all, eleven different analytical and laboratory techniques were applied to the problem. The multilayer nominally consisted of three dielectric and two metallic layers. It was demonstrated convincingly that with present day techniques it is possible to determine the basic structure of such a coating

  15. Inventory control in case of unknown demand and control parameters

    Janssen, E.


    This thesis deals with unknown demand and control parameters in inventory control. Inventory control involves decisions on what to order when and in what quantity. These decisions are based on information about the demand. Models are constructed using complete demand information; these models ensure

  16. Editoria: EBOLA: Fear of the unknown | Comoro | Tanzania Journal ...

    Tanzania Journal of Health Research. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 3, No 2 (2001) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Editoria: EBOLA: Fear of the unknown. C. Comoro, J.

  17. Lod score curves for phase-unknown matings.

    Hulbert-Shearon, T; Boehnke, M; Lange, K


    For a phase-unknown nuclear family, we show that the likelihood and lod score are unimodal, and we describe conditions under which the maximum occurs at recombination fraction theta = 0, theta = 1/2, and 0 < theta < 1/2. These simply stated necessary and sufficient conditions seem to have escaped the notice of previous statistical geneticists.

  18. Teleportation of Unknown Superpositions of Collective Atomic Coherent States

    ZHENG ShiBiao


    We propose a scheme to teleport an unknown superposition of two atomic coherent states with different phases. Our scheme is based on resonant and dispersive atom-field interaction. Our scheme provides a possibility of teleporting macroscopic superposition states of many atoms first time.``

  19. Teleportation of an Unknown Atomic State via Adiabatic Passage


    We propose a scheme for teleporting an unknown atomic state via adiabatic passage. Taking advantage of adiabatic passage, the atom has no probability of being excited and thus the atomic spontaneous emission is suppressed.We also show that the fidelity can reach 1 under certain condition.

  20. Clostridium difficile: A healthcare-associated infection of unknown ...

    Clostridium difficile: A healthcare-associated infection of unknown significance in adults in sub-Saharan Africa. ... Abstract. Background: Clostridium difficile infection (CDI) causes a high burden of disease in high-resource healthcare systems, with significant morbidity, mortality, and financial implications. CDI is a ...

  1. Severe scratcher-reaction: an unknown health hazard?

    Carsten Sauer Mikkelsen


    Full Text Available Tattoos are well known to cause skin problems and the number of reported adverse reactions after tattooing has increased. Illegally imported tattoo ink is unrestrained and can contain unknown ingredients and contamination thereby posing a serious health hazard. We present a case illustrating the risk of pronounced phototoxic allergic reaction and other severe complications after using home kit tattoo ink.

  2. Vision-based autonomous grasping of unknown piled objects

    Johnson, R.K.


    Computer vision techniques have been used to develop a vision-based grasping capability for autonomously picking and placing unknown piled objects. This work is currently being applied to the problem of hazardous waste sorting in support of the Department of Energy's Mixed Waste Operations Program

  3. Metastatic Carcinoma of Unknown Primary Presenting as Jugular Venous Thrombosis

    Prince Cheriyan Modayil


    Full Text Available Jugular venous thrombosis is unusual and is associated with central venous catheterisation, intravenous drug abuse and head and neck sepsis. It is rarely associated with malignancy. We report a case of metastatic carcinoma of unknown primary in a forty year old female which presented with jugular venous thrombosis. The discussion includes investigation and treatment options for this condition.

  4. Cancer of unknown primitive metastatic. About two clinical cases

    Cawen, L; Cordoba, A.


    This work is about the two clinical cases about the unknown primitive metastatic cancer. The main techniques used for the diagnosis, treatment and monitoring of different s carcinomas are: Electronic microscope, molecular biology and genetics, especially histopathological study, topographic survey, ultrasound, radiography, chemotherapy, radiotherapy

  5. Advancing Collaboration through Hydrologic Data and Model Sharing

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.


    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  6. Fixed Access Network Sharing

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio


    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  7. The science of sharing and the sharing of science

    Milkman, Katherine L.; Berger, Jonah


    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii)...

  8. Shared Oral Care

    Hede, Børge; Elmelund Poulsen,, Johan; Christophersen, Rasmus


    Shared Oral Care - Forebyggelse af orale sygdomme på plejecentre Introduktion og formål: Mangelfuld mundhygiejne hos plejekrævende ældre er et alment og veldokumenteret sundhedsproblem, der kan føre til massiv udvikling af tandsygdomme, og som yderligere kan være medvirkende årsag til alvorlige...... ressourceanvendelse er muligt at skabe en betydeligt forbedret mundhygiejne hos plejekrævende ældre Key words: Geriatric dentistry, nursing home, community health services, prevention, situated learning...

  9. Socially Shared Health Information

    Hansen, Kjeld S.


    In this PhD project, I'm investigating how health organizations are sharing health information on social media. My PhD project is divided into two parts, but in this paper, I will only focus on the first part: To understand current practices of how health organizations engage with health...... information and users on social media (empirical studies 1,2,3) and to develop a theoretical model for how it is done efficiently and effectively. I have currently conducted and published on two empirical studies (1,2). I am in the process of collecting data for a revised version of empirical study (2...

  10. Shared decision-making.

    Godolphin, William


    Shared decision-making has been called the crux of patient-centred care and identified as a key part of change for improved quality and safety in healthcare. However, it rarely happens, is hard to do and is not taught - for many reasons. Talking with patients about options is not embedded in the attitudes or communication skills training of most healthcare professionals. Information tools such as patient decision aids, personal health records and the Internet will help to shift this state, as will policy that drives patient and public involvement in healthcare delivery and training.

  11. Sharing Keynote Slideshows

    Clark, Josh


    Slideshows have come a long way since overhead projectors were your only option. You can show share your ideas with the world via email, DVD, PDF, YouTube, iPhone, or kiosk. Once your show is polished to perfection, this thorough, accessible guide shows you how to export and deliver it all possible ways-even as a PowerPoint file, QuickTime movie, or web site. As a bonus, you'll find advice on setting up your equipment and delivering an effective presentation.

  12. Bayesian source term determination with unknown covariance of measurements

    Belal, Alkomiet; Tichý, Ondřej; Šmídl, Václav


    Determination of a source term of release of a hazardous material into the atmosphere is a very important task for emergency response. We are concerned with the problem of estimation of the source term in the conventional linear inverse problem, y = Mx, where the relationship between the vector of observations y is described using the source-receptor-sensitivity (SRS) matrix M and the unknown source term x. Since the system is typically ill-conditioned, the problem is recast as an optimization problem minR,B(y - Mx)TR-1(y - Mx) + xTB-1x. The first term minimizes the error of the measurements with covariance matrix R, and the second term is a regularization of the source term. There are different types of regularization arising for different choices of matrices R and B, for example, Tikhonov regularization assumes covariance matrix B as the identity matrix multiplied by scalar parameter. In this contribution, we adopt a Bayesian approach to make inference on the unknown source term x as well as unknown R and B. We assume prior on x to be a Gaussian with zero mean and unknown diagonal covariance matrix B. The covariance matrix of the likelihood R is also unknown. We consider two potential choices of the structure of the matrix R. First is the diagonal matrix and the second is a locally correlated structure using information on topology of the measuring network. Since the inference of the model is intractable, iterative variational Bayes algorithm is used for simultaneous estimation of all model parameters. The practical usefulness of our contribution is demonstrated on an application of the resulting algorithm to real data from the European Tracer Experiment (ETEX). This research is supported by EEA/Norwegian Financial Mechanism under project MSMT-28477/2014 Source-Term Determination of Radionuclide Releases by Inverse Atmospheric Dispersion Modelling (STRADI).

  13. A 21.7 kb DNA segment on the left arm of yeast chromosome XIV carries WHI3, GCR2, SPX18, SPX19, an homologue to the heat shock gene SSB1 and 8 new open reading frames of unknown function.

    Jonniaux, J L; Coster, F; Purnelle, B; Goffeau, A


    We report the amino acid sequence of 13 open reading frames (ORF > 299 bp) located on a 21.7 kb DNA segment from the left arm of chromosome XIV of Saccharomyces cerevisiae. Five open reading frames had been entirely or partially sequenced previously: WHI3, GCR2, SPX19, SPX18 and a heat shock gene similar to SSB1. The products of 8 other ORFs are new putative proteins among which N1394 is probably a membrane protein. N1346 contains a leucine zipper pattern and the corresponding ORF presents an HAP (global regulator of respiratory genes) upstream activating sequence in the promoting region. N1386 shares homologies with the DNA structure-specific recognition protein family SSRPs and the corresponding ORF is preceded by an MCB (MluI cell cycle box) upstream activating factor.

  14. A Nonlinear Unit Root Test in the Presence of an Unknown Break

    Popp, Stephan


    The Perron test is the most commonly applied procedure to test for a unit root in the presence of a structural break of unknown timing in the trend function. Deriving the Perron-type test regression from an unobserved component model, it is shown that the test regression in fact is nonlinear in coefficient. Taking account of the nonlinearity leads to a test with properties that are exclusively assigned to Schmidt-Phillips LM-type unit root tests.

  15. Sharing analysis in the Pawns compiler

    Lee Naish


    Full Text Available Pawns is a programming language under development that supports algebraic data types, polymorphism, higher order functions and “pure” declarative programming. It also supports impure imperative features including destructive update of shared data structures via pointers, allowing significantly increased efficiency for some operations. A novelty of Pawns is that all impure “effects” must be made obvious in the source code and they can be safely encapsulated in pure functions in a way that is checked by the compiler. Execution of a pure function can perform destructive updates on data structures that are local to or eventually returned from the function without risking modification of the data structures passed to the function. This paper describes the sharing analysis which allows impurity to be encapsulated. Aspects of the analysis are similar to other published work, but in addition it handles explicit pointers and destructive update, higher order functions including closures and pre- and post-conditions concerning sharing for functions.

  16. Shared consultant physician posts.

    Cooke, J


    Our aim was to assess the acceptability and cost-efficiency of shared consultancy posts. Two consultant physicians worked alternate fortnights for a period of twelve months. Questionnaires were distributed to general practitioners, nurses, consultants and junior doctors affected by the arrangement. Patients or their next of kin were contacted by telephone. 1\\/17 of consultants described the experience as negative. 14\\/19 junior doctors reported a positive experience. 11 felt that training had been improved while 2 felt that it had been adversely affected. 17\\/17 GPs were satisfied with the arrangement. 1\\/86 nurses surveyed reported a negative experience. 1\\/48 patients were unhappy with the arrangement. An extra 2.2 (p<0.001) patients were seen per clinic. Length of stay was shortened by 2.49 days (p<0.001). A saving of 69,212 was made due to decreased locum requirements. We present data suggesting structured shared consultancy posts can be broadly acceptable and cost efficient in Ireland.

  17. Vaccines, our shared responsibility.

    Pagliusi, Sonia; Jain, Rishabh; Suri, Rajinder Kumar


    The Developing Countries Vaccine Manufacturers' Network (DCVMN) held its fifteenth annual meeting from October 27-29, 2014, New Delhi, India. The DCVMN, together with the co-organizing institution Panacea Biotec, welcomed over 240 delegates representing high-profile governmental and nongovernmental global health organizations from 36 countries. Over the three-day meeting, attendees exchanged information about their efforts to achieve their shared goal of preventing death and disability from known and emerging infectious diseases. Special praise was extended to all stakeholders involved in the success of polio eradication in South East Asia and highlighted challenges in vaccine supply for measles-rubella immunization over the coming decades. Innovative vaccines and vaccine delivery technologies indicated creative solutions for achieving global immunization goals. Discussions were focused on three major themes including regulatory challenges for developing countries that may be overcome with better communication; global collaborations and partnerships for leveraging investments and enable uninterrupted supply of affordable and suitable vaccines; and leading innovation in vaccines difficult to develop, such as dengue, Chikungunya, typhoid-conjugated and EV71, and needle-free technologies that may speed up vaccine delivery. Moving further into the Decade of Vaccines, participants renewed their commitment to shared responsibility toward a world free of vaccine-preventable diseases. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. Towards a Process Algebra for Shared Processors

    Buchholtz, Mikael; Andersen, Jacob; Løvengreen, Hans Henrik


    We present initial work on a timed process algebra that models sharing of processor resources allowing preemption at arbitrary points in time. This enables us to model both the functional and the timely behaviour of concurrent processes executed on a single processor. We give a refinement relation...

  19. Flow Sharing Systems for Mobile Applications

    Andersen, T. O.; Hansen, M. R.; Conrad, Finn


    This contribution reports about some analytical and simulation/experimental studies carried out on different flow control systems for mobile applications with respect to their ability to do flow sharing. All systems have two parallel actuators and are considered regarding functionality...

  20. VHA Data Sharing Agreement Repository

    Department of Veterans Affairs — The VHA Data Sharing Agreement Repository serves as a centralized location to collect and report on agreements that share VHA data with entities outside of VA. It...

  1. Challenges in sharing information effectively

    Sonnenwald, Diane H.


    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  2. Job-Sharing the Principalship.

    Brown, Shelley; Feltham, Wendy


    The coprincipals of a California elementary school share their ideas for building a successful job-sharing partnership. They suggest it is important to find the right partner, develop and present a job-sharing proposal, establish systems of communication with each other, evaluate one's progress, focus on the principalship, and provide leadership…

  3. School Nurses Share a Job.

    Merwin, Elizabeth G.; Voss, Sondra


    Job sharing is a relatively new idea in which two or more people share the hours, the work, and the responsibilities of one job. Advantages and disadvantages to this situation are discussed in relation to the experiences of two nurses who shared a position as district nurse. (JN)

  4. Two datasets of defect reports labeled by a crowd of annotators of unknown reliability

    Jerónimo Hernández-González


    Full Text Available Classifying software defects according to any defined taxonomy is not straightforward. In order to be used for automatizing the classification of software defects, two sets of defect reports were collected from public issue tracking systems from two different real domains. Due to the lack of a domain expert, the collected defects were categorized by a set of annotators of unknown reliability according to their impact from IBM's orthogonal defect classification taxonomy. Both datasets are prepared to solve the defect classification problem by means of techniques of the learning from crowds paradigm (Hernández-González et al. [1].Two versions of both datasets are publicly shared. In the first version, the raw data is given: the text description of defects together with the category assigned by each annotator. In the second version, the text of each defect has been transformed to a descriptive vector using text-mining techniques.

  5. Shared services in accounting and finance

    Swagerman, D.M.; van Steenis, Jorn; Sieber, Pascal; Griese, Joachim


    The purpose of this paper is to present examples of the current state of the Shared Services Concept as applied to the finance function. The paper arises out of the ongoing research after current developments in the finance function enabled by information and communication technology, at the University of Twente. The rapid developments in information and communication technology (leading to new ‘economics of information’) combined with developments in organisation theory, have far-reaching im...

  6. Learning Unknown Structure in CRFs via Adaptive Gradient Projection Method

    Wei Xue


    Full Text Available We study the problem of fitting probabilistic graphical models to the given data when the structure is not known. More specifically, we focus on learning unknown structure in conditional random fields, especially learning both the structure and parameters of a conditional random field model simultaneously. To do this, we first formulate the learning problem as a convex minimization problem by adding an l_2-regularization to the node parameters and a group l_1-regularization to the edge parameters, and then a gradient-based projection method is proposed to solve it which combines an adaptive stepsize selection strategy with a nonmonotone line search. Extensive simulation experiments are presented to show the performance of our approach in solving unknown structure learning problems.

  7. Quadrotor Control in the Presence of Unknown Mass Properties

    Duivenvoorden, Rikky Ricardo Petrus Rufino

    Quadrotor UAVs are popular due to their mechanical simplicity, as well as their capability to hover and vertically take-off and land. As applications diversify, quadrotors are increasingly required to operate under unknown mass properties, for example as a multirole sensor platform or for package delivery operations. The work presented here consists of the derivation of a generalized quadrotor dynamic model without the typical simplifying assumptions on the first and second moments of mass. The maximum payload capacity of a quadrotor in hover, and the observability of the unknown mass properties are discussed. A brief introduction of L1 adaptive control is provided, and three different L 1 adaptive controllers were designed for the Parrot AR.Drone quadrotor. Their tracking and disturbance rejection performance was compared to the baseline nonlinear controller in experiments. Finally, the results of the combination of L1 adaptive control with iterative learning control are presented, showing high performance trajectory tracking under uncertainty.

  8. Diagnosis of the cancer of unknown primary origin

    Jurisova, S.; Poersoek, S.


    Cancer of unknown primary origin (CUP) is one of the ten most frequent cancers worldwide. It constitutes of 3-5% of all human malignancies. At time of diagnosis patients with CUP present with disseminated metastases without established primary origin. CUP manifests as heterogenous group of mainly epithelial cancers recognised by distinct clinico pathological entities. The diagnostic work-up includes extensive histopathology investigations and modern imaging technology. Nevertheless, the primary tumour remains undetected most of the time. (author)

  9. Biomarkers for Ectopic Pregnancy and Pregnancy of Unknown Location

    Senapati, Suneeta; Barnhart, Kurt T.


    Early pregnancy failure is the most common complication of pregnancy, and 1–2% of all pregnancies will be ectopic. As one of the leading causes of maternal morbidity and mortality, diagnosing ectopic pregnancy and determining the fate of a pregnancy of unknown location are of great clinical concern. Several serum and plasma biomarkers for ectopic pregnancy have been investigated independently and in combination. The following is a review of the state of biomarker discovery and development for...

  10. Metastatic meningioma presenting as cancer of unknown primary

    Vinay Gupta


    Full Text Available We describe a case of anaplastic meningioma presenting in an extracranial osseous location, initially diagnosed as cancer of unknown primary. Although anaplastic meningioma comprise 3% of all meningiomas, this subtype is more likely to be associated with metastases. The increased degree of dedifferentiation in anaplastic meningioma makes diagnosis difficult, especially if characteristic imaging findings of meningioma are not identified. Adequate tissue for diagnostic purposes and appropriate imaging studies may help in establishing a definitive diagnosis.

  11. Transfer of an unknown quantum state, quantum networks, and memory

    Biswas, Asoka; Agarwal, G.S.


    We present a protocol for transfer of an unknown quantum state. The protocol is based on a two-mode cavity interacting dispersively in a sequential manner with three-level atoms in the Λ configuration. We propose a scheme for quantum networking using an atomic channel. We investigate the effect of cavity decoherence in the entire process. Further, we demonstrate the possibility of an efficient quantum memory for arbitrary superposition of two modes of a cavity containing one photon




    The program established a collaborative process with domestic industries for the purpose of sharing Navy-developed technology. Private sector businesses were educated so as to increase their awareness of the vast amount of technologies that are available, with an initial focus on technology applications that are related to the Hydrogen, Fuel Cells and Infrastructure Technologies (Hydrogen) Program of the U.S. Department of Energy. Specifically, the project worked to increase industry awareness of the vast technology resources available to them that have been developed with taxpayer funding. NAVSEA-Carderock and the Houston Advanced Research Center teamed with Nicholls State University to catalog NAVSEA-Carderock unclassified technologies, rated the level of readiness of the technologies and established a web based catalog of the technologies. In particular, the catalog contains technology descriptions, including testing summaries and overviews of related presentations.

  13. Thermodynamical quantum information sharing

    Wiesniak, M.; Vedral, V.; Brukner, C.


    Full text: Thermodynamical properties fully originate from classical physics and can be easily measured for macroscopic systems. On the other hand, entanglement is a widely spoken feature of quantum physics, which allows to perform certain task with efficiency unavailable with any classical resource. Therefore an interesting question is whether we can witness entanglement in a state of a macroscopic sample. We show, that some macroscopic properties, in particular magnetic susceptibility, can serve as an entanglement witnesses. We also study a mutual relation between magnetic susceptibility and magnetisation. Such a complementarity exhibits quantum information sharing between these two thermodynamical quantities. Magnetization expresses properties of individual spins, while susceptibility might reveal non-classical correlations as a witness. Therefore, a rapid change of one of these two quantities may mean a phase transition also in terms of entanglement. The complementarity relation is demonstrated by an analytical solution of an exemplary model. (author)

  14. Borrowing brainpower - sharing insecurities

    Wegener, Charlotte; Meier, Ninna; Ingerslev, Karen


    Academic writing is a vital, yet complex skill that must be developed within a doctoral training process. In addition, becoming an academic researcher is a journey of changing sense of self and identity. Through analysis of a group session, we show how the feedback of peers addresses questions...... of structure and writing style along with wider issues of researcher identity. Thus, peer learning is demonstrated as a process of simultaneously building a text and an identity as scholarly researcher. The paper advocates ‘borrowing brainpower’ from peers in order to write better texts and, at the same time......, ‘share insecurities’ during the development of the researcher identity. Based on a distributed notion of peer learning and identity, we point to the need for further research into the everyday activities of doctoral writing groups in order to understand the dynamic relationship between production of text...

  15. University Reactor Sharing Program

    Reese, W.D.


    Research projects supported by the program include items such as dating geological material and producing high current super conducting magnets. The funding continues to give small colleges and universities the valuable opportunity to use the NSC for teaching courses in nuclear processes; specifically neutron activation analysis and gamma spectroscopy. The Reactor Sharing Program has supported the construction of a Fast Neutron Flux Irradiator for users at New Mexico Institute of Mining and Technology and the University of Houston. This device has been characterized and has been found to have near optimum neutron fluxes for A39/Ar 40 dating. Institution final reports and publications resulting from the use of these funds are on file at the Nuclear Science Center

  16. Reactor Sharing Program

    Tehan, Terry


    Support utilization of the RINSC reactor for student and faculty instructions and research. The Department of Energy award has provided financial assistance during the period 9/29/1995 to 5/31/2001 to support the utilization of the Rhode Island Nuclear Science Center (RINSC) reactor for student and faculty instruction and research by non-reactor owning educational institutions within approximately 300 miles of Narragansett, Rhode Island. Through the reactor sharing program, the RINSC (including the reactor and analytical laboratories) provided reactor services and laboratory space that were not available to the other universities and colleges in the region. As an example of services provided to the users: Counting equipment, laboratory space, pneumatic and in-pool irradiations, demonstrations of sample counting and analysis, reactor tours and lectures. Funding from the Reactor Sharing Program has provided the RINSC to expand student tours and demonstration programs that emphasized our long history of providing these types of services to the universities and colleges in the area. The funding have also helped defray the cost of the technical assistance that the staff has routinely provided to schools, individuals and researchers who have called on the RINSC for resolution of problems relating to nuclear science. The reactor has been featured in a Public Broadcasting System documentary on Pollution in the Arctic and how a University of Rhode Island Professor used Neutron Activation Analysis conducted at the RINSC to discover the sources of the ''Arctic Haze''. The RINSC was also featured by local television on Earth Day for its role in environmental monitoring

  17. Characterizing unknown systematics in large scale structure surveys

    Agarwal, Nishant; Ho, Shirley; Myers, Adam D.; Seo, Hee-Jong; Ross, Ashley J.; Bahcall, Neta; Brinkmann, Jonathan; Eisenstein, Daniel J.; Muna, Demitri; Palanque-Delabrouille, Nathalie; Yèche, Christophe; Pâris, Isabelle; Petitjean, Patrick; Schneider, Donald P.; Streblyanska, Alina; Weaver, Benjamin A.


    Photometric large scale structure (LSS) surveys probe the largest volumes in the Universe, but are inevitably limited by systematic uncertainties. Imperfect photometric calibration leads to biases in our measurements of the density fields of LSS tracers such as galaxies and quasars, and as a result in cosmological parameter estimation. Earlier studies have proposed using cross-correlations between different redshift slices or cross-correlations between different surveys to reduce the effects of such systematics. In this paper we develop a method to characterize unknown systematics. We demonstrate that while we do not have sufficient information to correct for unknown systematics in the data, we can obtain an estimate of their magnitude. We define a parameter to estimate contamination from unknown systematics using cross-correlations between different redshift slices and propose discarding bins in the angular power spectrum that lie outside a certain contamination tolerance level. We show that this method improves estimates of the bias using simulated data and further apply it to photometric luminous red galaxies in the Sloan Digital Sky Survey as a case study

  18. Quantum key distribution with an unknown and untrusted source

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong


    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  19. Characterizing unknown systematics in large scale structure surveys

    Agarwal, Nishant; Ho, Shirley [McWilliams Center for Cosmology, Department of Physics, Carnegie Mellon University, Pittsburgh, PA 15213 (United States); Myers, Adam D. [Department of Physics and Astronomy, University of Wyoming, Laramie, WY 82071 (United States); Seo, Hee-Jong [Berkeley Center for Cosmological Physics, LBL and Department of Physics, University of California, Berkeley, CA 94720 (United States); Ross, Ashley J. [Institute of Cosmology and Gravitation, University of Portsmouth, Portsmouth, PO1 3FX (United Kingdom); Bahcall, Neta [Princeton University Observatory, Peyton Hall, Princeton, NJ 08544 (United States); Brinkmann, Jonathan [Apache Point Observatory, P.O. Box 59, Sunspot, NM 88349 (United States); Eisenstein, Daniel J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Muna, Demitri [Department of Astronomy, Ohio State University, Columbus, OH 43210 (United States); Palanque-Delabrouille, Nathalie; Yèche, Christophe [CEA, Centre de Saclay, Irfu/SPP, F-91191 Gif-sur-Yvette (France); Pâris, Isabelle [Departamento de Astronomía, Universidad de Chile, Casilla 36-D, Santiago (Chile); Petitjean, Patrick [Université Paris 6 et CNRS, Institut d' Astrophysique de Paris, 98bis blvd. Arago, 75014 Paris (France); Schneider, Donald P. [Department of Astronomy and Astrophysics, Pennsylvania State University, University Park, PA 16802 (United States); Streblyanska, Alina [Instituto de Astrofisica de Canarias (IAC), E-38200 La Laguna, Tenerife (Spain); Weaver, Benjamin A., E-mail: [Center for Cosmology and Particle Physics, New York University, New York, NY 10003 (United States)


    Photometric large scale structure (LSS) surveys probe the largest volumes in the Universe, but are inevitably limited by systematic uncertainties. Imperfect photometric calibration leads to biases in our measurements of the density fields of LSS tracers such as galaxies and quasars, and as a result in cosmological parameter estimation. Earlier studies have proposed using cross-correlations between different redshift slices or cross-correlations between different surveys to reduce the effects of such systematics. In this paper we develop a method to characterize unknown systematics. We demonstrate that while we do not have sufficient information to correct for unknown systematics in the data, we can obtain an estimate of their magnitude. We define a parameter to estimate contamination from unknown systematics using cross-correlations between different redshift slices and propose discarding bins in the angular power spectrum that lie outside a certain contamination tolerance level. We show that this method improves estimates of the bias using simulated data and further apply it to photometric luminous red galaxies in the Sloan Digital Sky Survey as a case study.

  20. Navigation through unknown and dynamic open spaces using topological notions

    Miguel-Tomé, Sergio


    Until now, most algorithms used for navigation have had the purpose of directing system towards one point in space. However, humans communicate tasks by specifying spatial relations among elements or places. In addition, the environments in which humans develop their activities are extremely dynamic. The only option that allows for successful navigation in dynamic and unknown environments is making real-time decisions. Therefore, robots capable of collaborating closely with human beings must be able to make decisions based on the local information registered by the sensors and interpret and express spatial relations. Furthermore, when one person is asked to perform a task in an environment, this task is communicated given a category of goals so the person does not need to be supervised. Thus, two problems appear when one wants to create multifunctional robots: how to navigate in dynamic and unknown environments using spatial relations and how to accomplish this without supervision. In this article, a new architecture to address the two cited problems is presented, called the topological qualitative navigation architecture. In previous works, a qualitative heuristic called the heuristic of topological qualitative semantics (HTQS) has been developed to establish and identify spatial relations. However, that heuristic only allows for establishing one spatial relation with a specific object. In contrast, navigation requires a temporal sequence of goals with different objects. The new architecture attains continuous generation of goals and resolves them using HTQS. Thus, the new architecture achieves autonomous navigation in dynamic or unknown open environments.

  1. Comment on "Dynamic quantum secret sharing"

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish


    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  2. Job share a consultant post.

    Thornicroft, G.; Strathdee, G.


    Job sharing offers advantages to both employer and employee but it is still uncommon in medicine. Based on the experiences of two psychiatrists sharing a consultant post this article describes some of the problems in obtaining a job share. The most difficult part can be getting an interview, and once a post has been obtained the terms and conditions of service may have to be modified to suit job sharing. Getting on well with your job sharing partner and good communication will not only help o...

  3. Biodiversity and global health—hubris, humility and the unknown

    Stephens, Carolyn


    In November 2011, botanists on a remote island off Papua New Guinea discovered a new species of orchid—uniquely and mysteriously night-flowering [1]. New to science, and with so much more to understand, this flower is threatened by deforestation [2]. Also in November 2011, a survey of 583 conservation scientists reported a unanimous (99.5%) view that 'it is likely a serious loss of biological diversity is underway at a global extent' and that, for scientists, 'protection of biological diversity for its cultural and spiritual values and because of its usefulness to humans were low priorities, which suggests that many scientists do not fully support the utilitarian concept of ecosystem services' [3]. In terms of management, some scientists now advocate controversial conservation strategies such as triage (prioritization of species that provide unique or necessary functions to ecosystems) [4, 5]. Meanwhile, there are many scientists who contend that there is an urgent need to improve our understanding of the importance of biodiversity for human health and well-being, arguing that only an anthropocentric view of biodiversity within a paradigm 'ecosystem service' will enable decision-makers to prioritize the theme [6-9]. A 2011 UN report argues that this need for understanding is especially urgent in fragile and vulnerable ecosystems where communities depend directly on the resources of their environment [10]. Here we have a paradox: international conservation scientists think that we cannot protect biodiversity on the basis of its cultural and spiritual value, nor its usefulness to humans. Other scientists argue that using a utilitarian ecosystem services framework is the only way to get humans to protect biodiversity. Meanwhile, communities directly dependent on biodiverse ecosystems are often those who best understand and protect biodiversity, for exactly these reasons of use and spiritual connection, but they do not hold only a utilitarian view of their

  4. Prevalence and Impact of Unknown Diabetes in the ICU.

    Carpenter, David L; Gregg, Sara R; Xu, Kejun; Buchman, Timothy G; Coopersmith, Craig M


    Many patients with diabetes and their care providers are unaware of the presence of the disease. Dysglycemia encompassing hyperglycemia, hypoglycemia, and glucose variability is common in the ICU in patients with and without diabetes. The purpose of this study was to determine the impact of unknown diabetes on glycemic control in the ICU. Prospective observational study. Nine ICUs in an academic, tertiary hospital and a hybrid academic/community hospital. Hemoglobin A1c levels were ordered at all ICU admissions from March 1, 2011 to September 30, 2013. Electronic medical records were examined for a history of antihyperglycemic medications or International Classification of Diseases, 9th Edition diagnosis of diabetes. Patients were categorized as having unknown diabetes (hemoglobin A1c > 6.5%, without history of diabetes), no diabetes (hemoglobin A1c 6.5%, with documented history of diabetes). None. A total of 15,737 patients had an hemoglobin A1c and medical record evaluable for the history of diabetes, and 5,635 patients had diabetes diagnosed by either medical history or an elevated hemoglobin A1c in the ICU. Of these, 1,460 patients had unknown diabetes, accounting for 26.0% of all patients with diabetes. This represented 41.0% of patients with an hemoglobin A1c > 6.5% and 9.3% of all ICU patients. Compared with patients without diabetes, patients with unknown diabetes had a higher likelihood of requiring an insulin infusion (44.3% vs 29.3%; p 180 mg/dL; p < 0.0001) and hypoglycemia (8.9% vs 2.5%; blood glucose < 70 mg/dL; p < 0.0001), higher glycemic variability (55.6 vs 28.8, average of patient SD of glucose; p < 0.0001), and increased mortality (13.8% vs 11.4%; p = 0.01). Patients with unknown diabetes represent a significant percentage of ICU admissions. Measurement of hemoglobin A1c at admission can prospectively identify a population that are not known to have diabetes but have significant challenges in glycemic control in the ICU.

  5. Sharing data is a shared responsibility: Commentary on: "The essential nature of sharing in science".

    Giffels, Joe


    Research data should be made readily available. A robust data-sharing plan, led by the principal investigator of the research project, requires considerable administrative and operational resources. Because external support for data sharing is minimal, principal investigators should consider engaging existing institutional information experts, such as librarians and information systems personnel, to participate in data-sharing efforts.

  6. Share and share alike? Social information and interaction style in coordination of shared use

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.


    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  7. Gratitude depends on the relational model of communal sharing.

    Simão, Cláudia; Seibt, Beate


    We studied the relation between benefits, perception of social relationships and gratitude. Across three studies, we provide evidence that benefits increase gratitude to the extent to which one applies a mental model of a communal relationship. In Study 1, the communal sharing relational model, and no other relational models, predicted the amount of gratitude participants felt after imagining receiving a benefit from a new acquaintance. In Study 2, participants recalled a large benefit they had received. Applying a communal sharing relational model increased feelings of gratitude for the benefit. In Study 3, we manipulated whether the participant or another person received a benefit from an unknown other. Again, we found that the extent of communal sharing perceived in the relationship with the stranger predicted gratitude. An additional finding of Study 2 was that communal sharing predicted future gratitude regarding the relational partner in a longitudinal design. To conclude, applying a communal sharing model predicts gratitude regarding concrete benefits and regarding the relational partner, presumably because one perceives the communal partner as motivated to meet one's needs. Finally, in Study 3, we found in addition that being the recipient of a benefit without opportunity to repay directly increased communal sharing, and indirectly increased gratitude. These circumstances thus seem to favor the attribution of communal norms, leading to a communal sharing representation and in turn to gratitude. We discuss the importance of relational models as mental representations of relationships for feelings of gratitude.

  8. Secret Sharing and Secure Computing from Monotone Formulae

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro


    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  9. Shared identity is key to effective communication.

    Greenaway, Katharine H; Wright, Ruth G; Willingham, Joanne; Reynolds, Katherine J; Haslam, S Alexander


    The ability to communicate with others is one of the most important human social functions, yet communication is not always investigated from a social perspective. This research examined the role that shared social identity plays in communication effectiveness using a minimal group paradigm. In two experiments, participants constructed a model using instructions that were said to be created by an ingroup or an outgroup member. Participants made models of objectively better quality when working from communications ostensibly created by an ingroup member (Experiments 1 and 2). However, this effect was attenuated when participants were made aware of a shared superordinate identity that included both the ingroup and the outgroup (Experiment 2). These findings point to the importance of shared social identity for effective communication and provide novel insights into the social psychology of communication. © 2014 by the Society for Personality and Social Psychology, Inc.

  10. Multiprocessor shared-memory information exchange

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.; Roslund, C.J.; Ghrist, W.D. III


    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, is designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange

  11. A simple tool for neuroimaging data sharing

    Christian eHaselgrove


    Full Text Available Data sharing is becoming increasingly common, but despite encouragement and facilitation by funding agencies, journals, and some research efforts, most neuroimaging data acquired today is still not shared due to political, financial, social, and technical barriers to sharing data that remain. In particular, technical solutions are few for researchers that are not a part of larger efforts with dedicated sharing infrastructures, and social barriers such as the time commitment required to share can keep data from becoming publicly available.We present a system for sharing neuroimaging data, designed to be simple to use and to provide benefit to the data provider. The system consists of a server at the International Neuroinformatics Coordinating Facility (INCF and user tools for uploading data to the server. The primary design principle for the user tools is ease of use: the user identifies a directory containing DICOM data, provides their INCF Portal authentication, and provides identifiers for the subject and imaging session. The user tool anonymizes the data and sends it to the server. The server then runs quality control routines on the data, and the data and the quality control reports are made public. The user retains control of the data and may change the sharing policy as they need. The result is that in a few minutes of the user’s time, DICOM data can be anonymized and made publicly available, and an initial quality control assessment can be performed on the data. The system is currently functional, and user tools and access to the public image database are available at

  12. The science of sharing and the sharing of science.

    Milkman, Katherine L; Berger, Jonah


    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii) who generates discoveries that are likely to be shared, and (iii) which types of people are most likely to share scientific discoveries. The results described here, combined with a review of recent research on interpersonal communication, suggest how scientists can frame their work to increase its dissemination. They also provide insights about which audiences may be the best targets for the diffusion of scientific content.

  13. Adaptive fuzzy wavelet network control of second order multi-agent systems with unknown nonlinear dynamics.

    Taheri, Mehdi; Sheikholeslam, Farid; Najafi, Majddedin; Zekri, Maryam


    In this paper, consensus problem is considered for second order multi-agent systems with unknown nonlinear dynamics under undirected graphs. A novel distributed control strategy is suggested for leaderless systems based on adaptive fuzzy wavelet networks. Adaptive fuzzy wavelet networks are employed to compensate for the effect of unknown nonlinear dynamics. Moreover, the proposed method is developed for leader following systems and leader following systems with state time delays. Lyapunov functions are applied to prove uniformly ultimately bounded stability of closed loop systems and to obtain adaptive laws. Three simulation examples are presented to illustrate the effectiveness of the proposed control algorithms. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Data sharing system for lithography APC

    Kawamura, Eiichi; Teranishi, Yoshiharu; Shimabara, Masanori


    We have developed a simple and cost-effective data sharing system between fabs for lithography advanced process control (APC). Lithography APC requires process flow, inter-layer information, history information, mask information and so on. So, inter-APC data sharing system has become necessary when lots are to be processed in multiple fabs (usually two fabs). The development cost and maintenance cost also have to be taken into account. The system handles minimum information necessary to make trend prediction for the lots. Three types of data have to be shared for precise trend prediction. First one is device information of the lots, e.g., process flow of the device and inter-layer information. Second one is mask information from mask suppliers, e.g., pattern characteristics and pattern widths. Last one is history data of the lots. Device information is electronic file and easy to handle. The electronic file is common between APCs and uploaded into the database. As for mask information sharing, mask information described in common format is obtained via Wide Area Network (WAN) from mask-vender will be stored in the mask-information data server. This information is periodically transferred to one specific lithography-APC server and compiled into the database. This lithography-APC server periodically delivers the mask-information to every other lithography-APC server. Process-history data sharing system mainly consists of function of delivering process-history data. In shipping production lots to another fab, the product-related process-history data is delivered by the lithography-APC server from the shipping site. We have confirmed the function and effectiveness of data sharing systems.

  15. Contexts as Shared Commitments

    Manuel eGarcía-Carpintero


    Full Text Available Contemporary semantics assumes two different notions of context: one coming from Kaplan (1989, on which contexts are sets of predetermined parameters, and another originated in Stalnaker (1978, on which contexts are sets of propositions that are common ground. The latter is deservedly more popular, given its flexibility to account for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals requires that further flexibility. Even if we acknowledge Lewis (1980 point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014 defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions, but those together with attitudes concerning them: shared commitments, as I will defend.

  16. Evaluation of shared genetic susceptibility loci between autoimmune diseases and schizophrenia based on genome-wide association studies

    Hoeffding, Louise K E; Rosengren, Anders; Thygesen, Johan H


    Background: Epidemiological studies have documented higher than expected comorbidity (or, in some cases, inverse comorbidity) between schizophrenia and several autoimmune disorders. It remains unknown whether this comorbidity reflects shared genetic susceptibility loci.  Aims: The present study a...

  17. Estimation of the false discovery proportion with unknown dependence.

    Fan, Jianqing; Han, Xu


    Large-scale multiple testing with correlated test statistics arises frequently in many scientific research. Incorporating correlation information in approximating false discovery proportion has attracted increasing attention in recent years. When the covariance matrix of test statistics is known, Fan, Han & Gu (2012) provided an accurate approximation of False Discovery Proportion (FDP) under arbitrary dependence structure and some sparsity assumption. However, the covariance matrix is often unknown in many applications and such dependence information has to be estimated before approximating FDP. The estimation accuracy can greatly affect FDP approximation. In the current paper, we aim to theoretically study the impact of unknown dependence on the testing procedure and establish a general framework such that FDP can be well approximated. The impacts of unknown dependence on approximating FDP are in the following two major aspects: through estimating eigenvalues/eigenvectors and through estimating marginal variances. To address the challenges in these two aspects, we firstly develop general requirements on estimates of eigenvalues and eigenvectors for a good approximation of FDP. We then give conditions on the structures of covariance matrices that satisfy such requirements. Such dependence structures include banded/sparse covariance matrices and (conditional) sparse precision matrices. Within this framework, we also consider a special example to illustrate our method where data are sampled from an approximate factor model, which encompasses most practical situations. We provide a good approximation of FDP via exploiting this specific dependence structure. The results are further generalized to the situation where the multivariate normality assumption is relaxed. Our results are demonstrated by simulation studies and some real data applications.

  18. Neurological autoantibodies in drug-resistant epilepsy of unknown cause.

    Tecellioglu, Mehmet; Kamisli, Ozden; Kamisli, Suat; Yucel, Fatma Ebru; Ozcan, Cemal


    Autoimmune epilepsy is a rarely diagnosed condition. Recognition of the underlying autoimmune condition is important, as these patients can be resistant to antiepileptic drugs. To determine the autoimmune and oncological antibodies in adult drug-resistant epilepsy of unknown cause and identify the clinical, radiological, and EEG findings associated with these antibodies according to data in the literature. Eighty-two patients with drug-resistant epilepsy of unknown cause were prospectively identified. Clinical features were recorded. The levels of anti-voltage-gated potassium channel complex (anti-VGKCc), anti-thyroid peroxidase (anti-TPO), anti-nuclear antibody (ANA), anti-glutamic acid decarboxylase (anti-GAD), anti-phospholipid IgG and IgM, anti-cardiolipin IgG and IgM, and onconeural antibodies were determined. Serum antibody positivity suggesting the potential role of autoimmunity in the aetiology was present in 17 patients with resistant epilepsy (22.0%). Multiple antibodies were found in two patients (2.6%). One of these patients (1.3%) had anti-VGKCc and ANA, whereas another (1.3%) had anti-VGKCc and anti-TPO. A single antibody was present in 15 patients (19.5%). Of the 77 patients finally included in the study, 4 had anti-TPO (5.2%), 1 had anti-GAD (1.3%), 4 had anti-VGKCc (5.2%) 8 had ANA (10.3%), and 2 had onconeural antibodies (2.6%) (1 patient had anti-Yo and 1 had anti-MA2/TA). The other antibodies investigated were not detected. EEG abnormality (focal), focal seizure incidence, and frequent seizures were more common in antibody-positive patients. Autoimmune factors may be aetiologically relevant in patients with drug-resistant epilepsy of unknown cause, especially if focal seizures are present together with focal EEG abnormality and frequent seizures.

  19. Optimal unambiguous comparison of two unknown squeezed vacua

    Olivares, Stefano; Paris, Matteo G. A.; Sedlak, Michal; Rapsan, Peter; Busek, Vladimir


    We propose a scheme for the unambiguous state comparison (USC) of two unknown squeezed vacuum states of the electromagnetic field. Our setup is based on linear optical elements and photon-number detectors, and it achieves optimal USC in an ideal case of unit quantum efficiency. In realistic conditions, i.e., for nonunit quantum efficiency of photodetectors, we evaluate the probability of getting an ambiguous result as well as the reliability of the scheme, thus showing its robustness in comparison to previous proposals.

  20. Fast entanglement detection for unknown states of two spatial qutrits

    Lima, G.; Gomez, E. S.; Saavedra, C.; Vargas, A.; Vianna, R. O.


    We investigate the practicality of the method proposed by Maciel et al. [Phys. Rev. A. 80, 032325 (2009).] for detecting the entanglement of two spatial qutrits (three-dimensional quantum systems), which are encoded in the discrete transverse momentum of single photons transmitted through a multislit aperture. The method is based on the acquisition of partial information of the quantum state through projective measurements, and a data processing analysis done with semidefinite programs. This analysis relies on generating gradually an optimal entanglement witness operator, and numerical investigations have shown that it allows for the entanglement detection of unknown states with a cost much lower than full state tomography.

  1. Algorithms for Rapidly Dispersing Robot Swarms in Unknown Environments

    Hsiang, Tien-Ruey; Arkin, Esther M.; Bender, Michael; Fekete, Sandor P.; Mitchell, Joseph S. B.


    We develop and analyze algorithms for dispersing a swarm of primitive robots in an unknown environment, R. The primary objective is to minimize the makespan, that is, the time to fill the entire region. An environment is composed of pixels that form a connected subset of the integer grid. There is at most one robot per pixel and robots move horizontally or vertically at unit speed. Robots enter R by means of k>=1 door pixels Robots are primitive finite automata, only having local communicatio...

  2. Modal Parameter Identification from Responses of General Unknown Random Inputs

    Ibrahim, S. R.; Asmussen, J. C.; Brincker, Rune


    Modal parameter identification from ambient responses due to a general unknown random inputs is investigated. Existing identification techniques which are based on assumptions of white noise and or stationary random inputs are utilized even though the inputs conditions are not satisfied....... This is accomplished via adding. In cascade. A force cascade conversion to the structures system under consideration. The input to the force conversion system is white noise and the output of which is the actual force(s) applied to the structure. The white noise input(s) and the structures responses are then used...

  3. Inverse estimation for the unknown frost geometry on the external wall of a forced-convection pipe

    Chen, W.-L.; Yang, Y.-C.


    In this study, a conjugate gradient method based inverse algorithm is applied to estimate the unknown frost-layer boundary profile on the external wall of a pipe system using temperature measurements. It is assumed that no prior information is available on the functional form of the unknown profile; hence the procedure is classified as the function estimation in inverse calculation. The temperature data obtained from the direct problem are used to simulate the temperature measurements. The accuracy of the inverse analysis is examined by using simulated exact and inexact temperature measurements. Results show that an excellent estimation on boundary profile can be obtained for the test case considered in this study.

  4. Impulse-response analysis of the market share attraction model

    D. Fok (Dennis); Ph.H.B.F. Franses (Philip Hans)


    textabstractWe propose a simulation-based technique to calculate impulse-response functions and their confidence intervals in a market share attraction model [MCI]. As an MCI model implies a reduced form model for the logs of relative market shares, simulation techniques have to be used to obtain

  5. Accessibility of shared space for visually impaired persons

    Havik, Else; Melis, Bart; Steyvers, Franciscus J.J.M.


    Shared Space is a new concept for the design of the public realm that is increasingly applied in Western countries. In Shared Space, the various functions of the public domain are combined, rather than separated. The behavior of road users is mainly determined by social relations and not exclusively

  6. Interpersonal Similarity and Knowledge Sharing within Multinational Organizations

    Mäkelä, Kristiina; Andersson, Ulf; Seppälä, Tomi


    Previous research has established that interpersonal similarity can influence knowledge sharing in such a way that similar people are more likely to share knowledge than those who are dissimilar. We contribute to the literature by showing that in the MNC context, cultural and functional similarit....... These microfoundations of inter-unit knowledge exchange point to important theoretical and practical implications for international management....

  7. 2012 Information Sharing Environment Performance Data

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  8. 2013 Information Sharing Environment Performance Data

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  9. Instant Social Ride-Sharing

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben


    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  10. SharePoint User's Guide

    Corporation, Infusion Development


    This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.

  11. Group prioritisation with unknown expert weights in incomplete linguistic context

    Cheng, Dong; Cheng, Faxin; Zhou, Zhili; Wang, Juan


    In this paper, we study a group prioritisation problem in situations when the expert weights are completely unknown and their judgement preferences are linguistic and incomplete. Starting from the theory of relative entropy (RE) and multiplicative consistency, an optimisation model is provided for deriving an individual priority vector without estimating the missing value(s) of an incomplete linguistic preference relation. In order to address the unknown expert weights in the group aggregating process, we define two new kinds of expert weight indicators based on RE: proximity entropy weight and similarity entropy weight. Furthermore, a dynamic-adjusting algorithm (DAA) is proposed to obtain an objective expert weight vector and capture the dynamic properties involved in it. Unlike the extant literature of group prioritisation, the proposed RE approach does not require pre-allocation of expert weights and can solve incomplete preference relations. An interesting finding is that once all the experts express their preference relations, the final expert weight vector derived from the DAA is fixed irrespective of the initial settings of expert weights. Finally, an application example is conducted to validate the effectiveness and robustness of the RE approach.

  12. Parameter identification of chaos system based on unknown parameter observer

    Wang Shaoming; Luo Haigeng; Yue Chaoyuan; Liao Xiaoxin


    Parameter identification of chaos system based on unknown parameter observer is discussed generally. Based on the work of Guan et al. [X.P. Guan, H.P. Peng, L.X. Li, et al., Acta Phys. Sinica 50 (2001) 26], the design of unknown parameter observer is improved. The application of the improved approach is extended greatly. The works in some literatures [X.P. Guan, H.P. Peng, L.X. Li, et al., Acta Phys. Sinica 50 (2001) 26; J.H. Lue, S.C. Zhang, Phys. Lett. A 286 (2001) 148; X.Q. Wu, J.A. Lu, Chaos Solitons Fractals 18 (2003) 721; J. Liu, S.H. Chen, J. Xie, Chaos Solitons Fractals 19 (2004) 533] are only the special cases of our Corollaries 1 and 2. Some observers for Lue system and a new chaos system are designed to test our improved method, and simulations results demonstrate the effectiveness and feasibility of the improved approach

  13. Atmospheric turbulence profiling with unknown power spectral density

    Helin, Tapio; Kindermann, Stefan; Lehtonen, Jonatan; Ramlau, Ronny


    Adaptive optics (AO) is a technology in modern ground-based optical telescopes to compensate for the wavefront distortions caused by atmospheric turbulence. One method that allows to retrieve information about the atmosphere from telescope data is so-called SLODAR, where the atmospheric turbulence profile is estimated based on correlation data of Shack-Hartmann wavefront measurements. This approach relies on a layered Kolmogorov turbulence model. In this article, we propose a novel extension of the SLODAR concept by including a general non-Kolmogorov turbulence layer close to the ground with an unknown power spectral density. We prove that the joint estimation problem of the turbulence profile above ground simultaneously with the unknown power spectral density at the ground is ill-posed and propose three numerical reconstruction methods. We demonstrate by numerical simulations that our methods lead to substantial improvements in the turbulence profile reconstruction compared to the standard SLODAR-type approach. Also, our methods can accurately locate local perturbations in non-Kolmogorov power spectral densities.

  14. Three-dimensional cinematography with control object of unknown shape.

    Dapena, J; Harman, E A; Miller, J A


    A technique for reconstruction of three-dimensional (3D) motion which involves a simple filming procedure but allows the deduction of coordinates in large object volumes was developed. Internal camera parameters are calculated from measurements of the film images of two calibrated crosses while external camera parameters are calculated from the film images of points in a control object of unknown shape but at least one known length. The control object, which includes the volume in which the activity is to take place, is formed by a series of poles placed at unknown locations, each carrying two targets. From the internal and external camera parameters, and from locations of the images of point in the films of the two cameras, 3D coordinates of the point can be calculated. Root mean square errors of the three coordinates of points in a large object volume (5m x 5m x 1.5m) were 15 mm, 13 mm, 13 mm and 6 mm, and relative errors in lengths averaged 0.5%, 0.7% and 0.5%, respectively.

  15. Reactive Path Planning Approach for Docking Robots in Unknown Environment

    Peng Cui


    Full Text Available Autonomous robots need to be recharged and exchange information with the host through docking in the long-distance tasks. Therefore, feasible path is required in the docking process to guide the robot and adjust its pose. However, when there are unknown obstacles in the work area, it becomes difficult to determine the feasible path for docking. This paper presents a reactive path planning approach named Dubins-APF (DAPF to solve the path planning problem for docking in unknown environment with obstacles. In this proposed approach the Dubins curves are combined with the designed obstacle avoidance potential field to plan the feasible path. Firstly, an initial path is planned and followed according to the configurations of the robot and the docking station. Then when the followed path is evaluated to be infeasible, the intermediate configuration is calculated as well as the replanned path based on the obstacle avoidance potential field. The robot will be navigated to the docking station with proper pose eventually via the DAPF approach. The proposed DAPF approach is efficient and does not require the prior knowledge about the environment. Simulation results are given to validate the effectiveness and feasibility of the proposed approach.

  16. Neurological Autoantibody Prevalence in Epilepsy of Unknown Etiology.

    Dubey, Divyanshu; Alqallaf, Abdulradha; Hays, Ryan; Freeman, Matthew; Chen, Kevin; Ding, Kan; Agostini, Mark; Vernino, Steven


    Autoimmune epilepsy is an underrecognized condition, and its true incidence is unknown. Identifying patients with an underlying autoimmune origin is critical because these patients' condition may remain refractory to conventional antiseizure medications but may respond to immunotherapy. To determine the prevalence of neurological autoantibodies (Abs) among adult patients with epilepsy of unknown etiology. Consecutive patients presenting to neurology services with new-onset epilepsy or established epilepsy of unknown etiology were identified. Serum samples were tested for autoimmune encephalitis Abs as well as thyroperoxidase (TPO) and glutamic acid decarboxylase 65 (GAD65) Abs. An antibody prevalence in epilepsy (APE) score based on clinical characteristics was assigned prospectively. Data were collected from June 1, 2015, to June 1, 2016. Presence of neurological Abs. A score based on clinical characteristics was assigned to estimate the probability of seropositivity prior to antibody test results. Good seizure outcome was estimated on the basis of significant reduction of seizure frequency at the first follow-up or seizure freedom. Of the 127 patients (68 males and 59 females) enrolled in the study, 15 were subsequently excluded after identification of an alternative diagnosis. Serum Abs suggesting a potential autoimmune etiology were detected in 39 (34.8%) cases. More than 1 Ab was detected in 7 patients (6.3%): 3 (2.7%) had TPO-Ab and voltage-gated potassium channel complex (VGKCc) Ab, 2 (1.8%) had GAD65-Ab and VGKCc-Ab, 1 had TPO-Ab and GAD65-Ab, and 1 had anti-Hu Ab and GAD65-Ab. Thirty-two patients (28.6%) had a single Ab marker. Among 112 patients included in the study, 15 (13.4%) had TPO-Ab, 14 (12.5%) had GAD65-Ab, 12 (10.7%) had VGKCc (4 of whom were positive for leucine-rich glioma-inactivated protein 1 [LGI1] Ab), and 4 (3.6%) had N-methyl-D-aspartate receptor (NMDAR) Ab. Even after excluding TPO-Ab and low-titer GAD65-Ab, Abs strongly suggesting an

  17. Governing Individual Knowledge Sharing Behavior

    Minbaeva, Dana; Pedersen, Torben


    The emerging Knowledge Governance Approach asserts the need to build microfoundations grounded in individual action. Toward this goal, using the Theory of Planned Behavior, we aim to explain individual knowledge sharing behavior as being determined by the intention to share knowledge and its...... antecedents: attitude toward knowledge sharing, subjective norms, and perceived behavioral control. In addition, we consider managerial interventions (governance mechanisms) that managers can employ to influence the identified antecedents and thereby govern individual knowledge sharing behavior. We test...... a positive effect on subjective norms and perceived behavioral control, respectively....

  18. What to Share and Why to Share? A Case Study of CrossBoundary Information Sharing in Taiwan e-Government

    Tung-Mou Yang


    Full Text Available In the public sector, cross-boundary information sharing has been an important theme among governmental collaboration and is critical to organizational efficiency and performance. This research explores the types and characteristics of shared information and the intended purposes of information sharing. In the case study, the cross-boundary shared information can be abstracted into five fundamental types: the collected raw data, the value-added information, the administration oriented information, the administration-oriented knowledge, and the domain-oriented knowledge. Another framework is proposed to conceptualize the purposes of interagency information sharing. The identified seven purposes are administrative work, information search and verification, information aggregation, business process chain, innovative service, experience-based knowledge sharing, and crisis and emergency. The seven purposes do not mean to be an exhaustive list but to provide an initial conceptualization to perceive the functionalities and roles that cross-boundary information sharing plays among government agencies. The two proposed frameworks can help both researchers and practitioners perceive and clarify the fundamental part of cross-boundary information sharing in the public sector. The finding of this research is also expected to enrich the current information-sharing theories and to contribute to the current e-Government literature from an international perspective.

  19. Running over unknown rough terrain with a one-legged planar robot

    Andrews, Ben; Miller, Bruce; Clark, Jonathan E; Schmitt, John


    The ability to traverse unknown, rough terrain is an advantage that legged locomoters have over their wheeled counterparts. However, due to the complexity of multi-legged systems, research in legged robotics has not yet been able to reproduce the agility found in the animal kingdom. In an effort to reduce the complexity of the problem, researchers have developed single-legged models to gain insight into the fundamental dynamics of legged running. Inspired by studies of animal locomotion, researchers have proposed numerous control strategies to achieve stable, one-legged running over unknown, rough terrain. One such control strategy incorporates energy variations into the system during the stance phase by changing the force-free leg length as a sinusoidal function of time. In this research, a one-legged planar robot capable of implementing this and other state-of-the-art control strategies was designed and built. Both simulated and experimental results were used to determine and compare the stability of the proposed controllers as the robot was subjected to unknown drop and raised step perturbations equal to 25% of the nominal leg length. This study illustrates the relative advantages of utilizing a minimal-sensing, active energy removal control scheme to stabilize running over rough terrain.

  20. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes


    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  1. Stability of Nonlinear Systems with Unknown Time-varying Feedback Delay

    Chunodkar, Apurva A.; Akella, Maruthi R.


    This paper considers the problem of stabilizing a class of nonlinear systems with unknown bounded delayed feedback wherein the time-varying delay is 1) piecewise constant 2) continuous with a bounded rate. We also consider application of these results to the stabilization of rigid-body attitude dynamics. In the first case, the time-delay in feedback is modeled specifically as a switch among an arbitrarily large set of unknown constant values with a known strict upper bound. The feedback is a linear function of the delayed states. In the case of linear systems with switched delay feedback, a new sufficiency condition for average dwell time result is presented using a complete type Lyapunov-Krasovskii (L-K) functional approach. Further, the corresponding switched system with nonlinear perturbations is proven to be exponentially stable inside a well characterized region of attraction for an appropriately chosen average dwell time. In the second case, the concept of the complete type L-K functional is extended to a class of nonlinear time-delay systems with unknown time-varying time-delay. This extension ensures stability robustness to time-delay in the control design for all values of time-delay less than the known upper bound. Model-transformation is used in order to partition the nonlinear system into a nominal linear part that is exponentially stable with a bounded perturbation. We obtain sufficient conditions which ensure exponential stability inside a region of attraction estimate. A constructive method to evaluate the sufficient conditions is presented together with comparison with the corresponding constant and piecewise constant delay. Numerical simulations are performed to illustrate the theoretical results of this paper.

  2. Teilen, Sharing 1 und Sharing 2: die Sharing Economy im Licht theoretischer Zugänge

    Haase, Michaela; Pick, Doreén


    Der Artikel geht theoretischen Zugängen zum Sharing-Begriff nach. Er erläutert den Beitrag, aber auch die Grenzen von Dienstleistungstheorie und Property-Rights-Theorie für das Verständnis der Sharing Economy. Gründe für die Unterscheidung zwischen kommerzieller und nichtkommerzieller Sharing Economy werden dargelegt sowie mögliche Impulse der Sharing Economy für Änderungen im Verständnis wirtschaftlichen Handels und seiner Organisationsformen erörtert. This article elaborates on theoretic...

  3. An Evidence-Based Review Literature About Risk Indicators and Management of Unknown-Origin Xerostomia

    Farzaneh Agha-hosseini


    Full Text Available Objective: This evidence-based article reviews risk indicators and management of unknown-origin xerostomia. Xerostomia and hyposalivation refer to different aspects of dry mouth. Xerostomia is a subjective sensation of dry mouth, whilst hyposalivation is defined as an objective assessment of reduced salivary flow rate. About 30% of the elderly (65 years and older experience xerostomia and hyposalivation. Structural and functional factors, or both may lead to salivary gland dysfunction.Study Selection: The EBM literature search was conducted by using the medical literature database MEDLINE via PubMed and OvidMedline search engines. Results were limited to English language articles (1965 to present including clinical trials (CT, randomized controlled trials (RCT, systematic reviews and review articles. Case control or cohort studies were included for the etiology.Results: Neuropathic etiology such as localized oral alteration of thermal sensations, saliva composition change (for example higher levels of K, Cl, Ca, IgA, amylase, calcium, PTH and cortisol, lower levels of estrogen and progesterone, smaller salivary gland size, and illnesses such as lichen planus, are risk indicators for unknown-origin xerostomia. The management is palliative and preventative. Management of symptoms includes drug administration (systemic secretogogues, saliva substitutes and bile secretion-stimulator, night guard, diet and habit modifications. Other managements may be indicated to treat adverse effects.Conclusion: Neuropathic etiology, saliva composition change, smaller salivary gland size, and illnesses such as oral lichen planus can be suggestive causes for unknown-origin xerostomia. However, longitudinal studies will be important to elucidate the causes of unknown-origin xerostomia.

  4. Obstacle Avoidance for Unmanned Undersea Vehicle in Unknown Unstructured Environment

    Zheping Yan


    Full Text Available To avoid obstacle in the unknown environment for unmanned undersea vehicle (UUV, an obstacle avoiding system based on improved vector field histogram (VFH is designed. Forward looking sonar is used to detect the environment, and the divisional sonar modal is applied to deal with the measure uncertainty. To adapt to the VFH, rolling occupancy grids are used for the map building, and high accuracy details of local environment are obtained. The threshold is adaptively adjusted by the statistic of obstacles to solve the problem that VFH is sensitive to threshold. To improve the environment adaptability, the hybrid-behaviors strategy is proposed, which selects the optimal avoidance command according to the motion status and environment character. The simulation shows that UUV could avoid the obstacles fast and escape from the U shape obstacles.

  5. Fever of unknown origin (FUO): CMV infectious mononucleosis or lymphoma?

    Cunha, Burke A; Chawla, Karishma


    Fever of unknown origin (FUO) refers to fevers of > 101 °F that persist for > 3 weeks and remain undiagnosed after a focused inpatient or outpatient workup. FUO may be due to infectious, malignant/neoplastic, rheumatic/inflammatory, or miscellaneous disorders. The FUO category determines the focus of the diagnostic workup. In the case presented of an FUO in a young woman, there were clinical findings of both CMV infectious mononucleosis or a lymphoma, e.g., highly elevated ESR, elevated ferritin levels, and elevated ACE level, β-2 microglobulins. The indium scan showed intense splenic uptake. Lymph node biopsy, PET scan, and flow cytometry were negative for lymphoma. CMV infectious mononucleosis was the diagnosis, and she made a slow recovery.

  6. Impact of CT in patients with sepsis of unknown origin

    Barkhausen, J.; Stoeblen, F.; Mueller, R.D.


    Purpose: To evaluate the diagnostic relevance of CT in patients with sepsis of unknown origin. Material and Methods: Sixty-three consecutive intensive care patients with suspicion of an abscess and negative or inconclusive previous radiological examinations were included. CT was performed using the helical technique. A total of 45 abdominal and 38 chest examinations were evaluated. Results: 5/38 examinations of the chest revealed the source of sepsis (pleural empyema 2, lung abscess 1, mediastinitis 1, retrosternal abscess 1). 7/45 abdominal CT examinations showed the source of sepsis (intraabdominal abscess 2, hepatic abscess 3, intestinal perforation 1, gangrenous colitis 1). Conclusion: CT is useful for the evaluation of patients with fever or sepsis without a known source. Due to the detection of a spetic focus by CT, 19% of the patients in our study could be immediately referred to causal therapy as percutaneous drainage or surgery. (orig.)

  7. Impact of CT in patients with sepsis of unknown origin

    Barkhausen, J.; Stoeblen, F.; Mueller, R.D. [University Hospital Essen (Germany). Dept. of Radiology; Dominguez-Fernandez, E. [University Hospital Essen (Germany). Dept. of General Surgery; Henseke, P. [Nycomed-Amersham Arzneimittel GmbH, Muenchen (Germany)


    Purpose: To evaluate the diagnostic relevance of CT in patients with sepsis of unknown origin. Material and Methods: Sixty-three consecutive intensive care patients with suspicion of an abscess and negative or inconclusive previous radiological examinations were included. CT was performed using the helical technique. A total of 45 abdominal and 38 chest examinations were evaluated. Results: 5/38 examinations of the chest revealed the source of sepsis (pleural empyema 2, lung abscess 1, mediastinitis 1, retrosternal abscess 1). 7/45 abdominal CT examinations showed the source of sepsis (intraabdominal abscess 2, hepatic abscess 3, intestinal perforation 1, gangrenous colitis 1). Conclusion: CT is useful for the evaluation of patients with fever or sepsis without a known source. Due to the detection of a spetic focus by CT, 19% of the patients in our study could be immediately referred to causal therapy as percutaneous drainage or surgery. (orig.)

  8. Mobile robot navigation in unknown static environments using ANFIS controller

    Anish Pandey


    Full Text Available Navigation and obstacle avoidance are the most important task for any mobile robots. This article presents the Adaptive Neuro-Fuzzy Inference System (ANFIS controller for mobile robot navigation and obstacle avoidance in the unknown static environments. The different sensors such as ultrasonic range finder sensor and sharp infrared range sensor are used to detect the forward obstacles in the environments. The inputs of the ANFIS controller are obstacle distances obtained from the sensors, and the controller output is a robot steering angle. The primary objective of the present work is to use ANFIS controller to guide the mobile robot in the given environments. Computer simulations are conducted through MATLAB software and implemented in real time by using C/C++ language running Arduino microcontroller based mobile robot. Moreover, the successful experimental results on the actual mobile robot demonstrate the effectiveness and efficiency of the proposed controller.

  9. Autonomous Underwater Navigation and Optical Mapping in Unknown Natural Environments

    Juan David Hernández


    Full Text Available We present an approach for navigating in unknown environments while, simultaneously, gathering information for inspecting underwater structures using an autonomous underwater vehicle (AUV. To accomplish this, we first use our pipeline for mapping and planning collision-free paths online, which endows an AUV with the capability to autonomously acquire optical data in close proximity. With that information, we then propose a reconstruction pipeline to create a photo-realistic textured 3D model of the inspected area. These 3D models are also of particular interest to other fields of study in marine sciences, since they can serve as base maps for environmental monitoring, thus allowing change detection of biological communities and their environment over time. Finally, we evaluate our approach using the Sparus II, a torpedo-shaped AUV, conducting inspection missions in a challenging, real-world and natural scenario.

  10. Metastatic cancer of unknown primary in 21 dogs.

    Rossi, F; Aresu, L; Vignoli, M; Buracco, P; Bettini, G; Ferro, S; Gattino, F; Ghiani, F; Costantino, R; Ressel, L; Bellei, E; Marconato, L


    The aim of this retrospective study was to describe clinical features, treatment and outcome of 21 dogs with metastatic cancer of unknown primary (MCUP), a biopsy-proven malignancy being diagnosed at a metastatic stage, in which the anatomical origin of the primary tumour cannot be detected. All dogs underwent total-body computed tomography. Signalment, type and duration of clinical signs, metastasis site, pathology results, treatment and outcome were recorded. Carcinoma was the most common diagnosis (57.1%), followed by sarcoma, melanoma and mast cell tumour. The median number of disease sites per dog was 2, with bones, lymph nodes, lungs and spleen being the most frequent metastatic locations. The median survival for all dogs was 30 days. Overall, a primary site was not identified in 20 (95.2%) dogs. MCUP encompasses a variety of different pathologic entities and harbours a poor prognosis. © 2013 Blackwell Publishing Ltd.

  11. Distributed Synchronization Control of Multiagent Systems With Unknown Nonlinearities.

    Su, Shize; Lin, Zongli; Garcia, Alfredo


    This paper revisits the distributed adaptive control problem for synchronization of multiagent systems where the dynamics of the agents are nonlinear, nonidentical, unknown, and subject to external disturbances. Two communication topologies, represented, respectively, by a fixed strongly-connected directed graph and by a switching connected undirected graph, are considered. Under both of these communication topologies, we use distributed neural networks to approximate the uncertain dynamics. Decentralized adaptive control protocols are then constructed to solve the cooperative tracker problem, the problem of synchronization of all follower agents to a leader agent. In particular, we show that, under the proposed decentralized control protocols, the synchronization errors are ultimately bounded, and their ultimate bounds can be reduced arbitrarily by choosing the control parameter appropriately. Simulation study verifies the effectiveness of our proposed protocols.

  12. Keratosis of unknown significance and leukoplakia: a preliminary study.

    Woo, Sook-Bin; Grammer, Rebecca L; Lerman, Mark A


    The objectives were to (1) determine the frequency of specific diagnoses in a series of white lesions, and (2) describe the nature of keratotic lesions that are neither reactive nor dysplastic. White lesions were analyzed and diagnosed as reactive keratoses, dysplastic/malignant, or keratoses of unknown significance (KUS). Of the 1251 specimens that were evaluated, 703 met criteria for inclusion, and approximately 75% were reactive, 10% dysplastic/malignant, and 14% KUS. Excluding reactive keratoses, 43% were dysplastic/malignant and 57% were KUS. Reactive keratoses were the most common white lesions followed by lichen planus. Dysplastic/malignant lesions constituted almost 50% of all true leukoplakias. KUS constituted the remaining cases and do not show typical reactive histopathology as well as clear dysplasia. They may represent evolving or devolving reactive keratoses but may also represent the very earliest dysplasia phenotype. Clinical findings may be helpful in differentiating the two. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Villitis of unknown aetiology: correlation of recurrence with clinical outcome.

    Feeley, L


    Villitis of unknown aetiology (VUA) is associated with adverse pregnancy outcome. Consequently, an ability to predict recurrence could be clinically relevant. We examined placentas where villitis was diagnosed in a previous pregnancy to establish the risk of recurrence and outcome. A total of 304 cases of VUA were diagnosed in our laboratory over a 4-year period. Subsequently, 19 of this cohort had a second placenta examined histologically. Recurrence and clinical outcome were recorded. Villitis recurred in 7 of 19 cases (37%). There was a high level of adverse pregnancy outcome in this cohort overall, characterised by small for gestational age infants and stillbirth, particularly in cases with high-grade villitis. We identified recurrent villitis more frequently than previously reported. Our findings confirm an association between high-grade villitis and poor outcome. Adequately powered prospective studies are required to determine if enhanced surveillance of subsequent pregnancies is indicated following a diagnosis of villitis.

  14. Chronic kidney disease of unknown etiology in agricultural communities.

    Almaguer, Miguel; Herrera, Raúl; Orantes, Carlos M


    In recent years, Central America, Egypt, India and Sri Lanka have reported a high prevalence of chronic kidney disease of unknown etiology in agricultural communities, predominantly among male farmworkers. This essay examines the disease's case definitions, epidemiology (disease burden, demographics, associated risk factors) and causal hypotheses, by reviewing published findings from El Salvador, Nicaragua, Costa Rica, Sri Lanka, Egypt and India. The range of confirmed chronic kidney disease prevalence was 17.9%-21.1%. Prevalence of reduced glomerular filtration (homemade alcohol use and family history of chronic kidney disease. There is no strong evidence for a single cause, and multiple environmental, occupational and social factors are probably involved. Further etiological research is needed, plus interventions to reduce preventable risk factors.

  15. A Brief Introduction on Mystery, the Unknown, Surprise

    Sean Scanlan


    Full Text Available In this age of globalization, this age of so many ways to know—and so many ways to know things so quickly—it is both satisfying and deeply unnerving to come upon things and events that are really hard to understand, things and events so shocking or strange or mysterious, that they seem Unknown. Perhaps even unknowable. The first note of NANO Issue 2 focuses on an unsolved murder and reveals a mystery that is confounding, creepy, and yet oddly compelling. In “Karr’s Kill Cult: Virtual Cults and Pseudo-Killing in the Digital Age,” Jeremy Biles and Brian Collins explore the edges of where cyber-crime threatens to turn real—and vice versa. In the second note, Jennifer Ballengee compares Oedipus at Colonus with Don DeLillo’s Falling Man.

  16. Cancer of unknown primary origin: a case report

    Elisa De Carlo


    Full Text Available Carcinoma of unknown primary origin (CUP accounts for 2-10% of all malignancies. The apparent absence of the primary tumour, the development of early, uncommon systemic metastases and the resistance to therapy and poor prognosis are hallmarks of this heterogeneous clinical entity and are a challenge for physicians. The diagnostic workup of patients with CUP includes a large amount of histopathological examination, as well as the use of imaging techniques that often fail to identify the primary tumour. Therefore, the optimal workup and treatment for these patients remains to be determined. Molecular diagnostic tools, such as DNA microarray analysis, could help in the search for "lost" CUP origin and guide the further treatment approach. We report the case of a 66-year-old man, with mediastinal lymph nodes metastasis of carcinoma and neurological syndrome with diplopia and balance disorders, in which many exams have been performed without finding the primary tumour.

  17. Searching for unknown transfusion-transmitted hepatitis viruses

    Edgren, G.; Hjalgrim, H.; Rostgaard, K.


    Background: Both hepatitis B and C viruses were transmitted through blood transfusion before implementation of donor screening. The existence of additional, yet unknown transfusion transmittable agents causing liver disease could have important public health implications. Methods: Analyses were...... 1992 to account for the effect of screening for hepatitis C virus. Results: A total of 1 482 922 transfused patients were included in the analyses. Analyses showed evidence of transfusion transmission of liver diseases before, but not after the implementation of hepatitis C virus screening in 1992...... for transfusion transmission of agents causing liver disease after the implementation of screening for hepatitis B and C, and suggest that if such transmission does occur, it is rare....

  18. Job Sharing in the Schools.

    Moorman, Barbara; And Others

    Job sharing is defined as "two people sharing the responsibilities of one full-time position with salary and benefits prorated"; the concept focuses on positions usually offered only as full-time jobs, often in professional and managerial categories. This book is a guide for teachers and administrators on the implementation and use of…

  19. Unveiling the Knowledge Sharing Culture

    Hendriks, P.H.J.


    It is generally acknowledged that organisation culture affects how knowledge processes such as knowledge-sharing evolve. Despite the growing attention to the aspects of culture, the knowledge management debate has not paid systematic attention to the assessment or measurement of a knowledge-sharing

  20. Panorama 2014 - Car-sharing

    Vinot, Simon


    Car-sharing is a new mode of transportation that consists of multiple users sharing the same vehicle. This type of service is expanding with the arrival of larger players, such as traditional car rental companies, automotive manufacturers, and large firms specializing in transportation. This new mode of transportation offers real potential and is currently finding its users, in France and worldwide. (author)

  1. Twelve previously unknown phage genera are ubiquitous in global oceans.

    Holmfeldt, Karin; Solonenko, Natalie; Shah, Manesh; Corrier, Kristen; Riemann, Lasse; Verberkmoes, Nathan C; Sullivan, Matthew B


    Viruses are fundamental to ecosystems ranging from oceans to humans, yet our ability to study them is bottlenecked by the lack of ecologically relevant isolates, resulting in "unknowns" dominating culture-independent surveys. Here we present genomes from 31 phages infecting multiple strains of the aquatic bacterium Cellulophaga baltica (Bacteroidetes) to provide data for an underrepresented and environmentally abundant bacterial lineage. Comparative genomics delineated 12 phage groups that (i) each represent a new genus, and (ii) represent one novel and four well-known viral families. This diversity contrasts the few well-studied marine phage systems, but parallels the diversity of phages infecting human-associated bacteria. Although all 12 Cellulophaga phages represent new genera, the podoviruses and icosahedral, nontailed ssDNA phages were exceptional, with genomes up to twice as large as those previously observed for each phage type. Structural novelty was also substantial, requiring experimental phage proteomics to identify 83% of the structural proteins. The presence of uncommon nucleotide metabolism genes in four genera likely underscores the importance of scavenging nutrient-rich molecules as previously seen for phages in marine environments. Metagenomic recruitment analyses suggest that these particular Cellulophaga phages are rare and may represent a first glimpse into the phage side of the rare biosphere. However, these analyses also revealed that these phage genera are widespread, occurring in 94% of 137 investigated metagenomes. Together, this diverse and novel collection of phages identifies a small but ubiquitous fraction of unknown marine viral diversity and provides numerous environmentally relevant phage-host systems for experimental hypothesis testing.

  2. Calculation of Unknown Preoperative K Readings in Postrefractive Surgery Patients

    Nicola Rosa


    Full Text Available Purpose. To determine the unknown preoperative K readings (Kpre to be used in history-based methods, for intraocular lens (IOL power calculation in patients who have undergone myopic photorefractive keratectomy (PRK. Methods. A regression formula generated from the left eyes of 174 patients who had undergone PRK for myopia or for myopic astigmatism was compared with other methods in 168 right eyes. The Pearson index and paired t-test were utilized for statistical analysis. Results. The differences between Kpre and those obtained with the other methods were as follows: 0.61 ± 0.94 D (range: −3.94 to 2.05 D, p<0.01 subtracting the effective treatment, 0.01 ± 0.86 D (range: −2.61 to 2.34 D, p=0.82 with Rosa’s formula, −0.02 ± 1.31 D (range: −3.43 to 3.68 D, p=0.82 with the current study formula, and −0.43 ± 1.40 D (range: −3.98 to 3.12 D, p<0.01 utilizing a mean K (Km of 43.5 D. Conclusions. These formulas may permit the utilization of history-based methods, that is, the double-K method in calculating the IOL power following PRK when Kpre are unknown.

  3. Smooth extrapolation of unknown anatomy via statistical shape models

    Grupp, R. B.; Chiang, H.; Otake, Y.; Murphy, R. J.; Gordon, C. R.; Armand, M.; Taylor, R. H.


    Several methods to perform extrapolation of unknown anatomy were evaluated. The primary application is to enhance surgical procedures that may use partial medical images or medical images of incomplete anatomy. Le Fort-based, face-jaw-teeth transplant is one such procedure. From CT data of 36 skulls and 21 mandibles separate Statistical Shape Models of the anatomical surfaces were created. Using the Statistical Shape Models, incomplete surfaces were projected to obtain complete surface estimates. The surface estimates exhibit non-zero error in regions where the true surface is known; it is desirable to keep the true surface and seamlessly merge the estimated unknown surface. Existing extrapolation techniques produce non-smooth transitions from the true surface to the estimated surface, resulting in additional error and a less aesthetically pleasing result. The three extrapolation techniques evaluated were: copying and pasting of the surface estimate (non-smooth baseline), a feathering between the patient surface and surface estimate, and an estimate generated via a Thin Plate Spline trained from displacements between the surface estimate and corresponding vertices of the known patient surface. Feathering and Thin Plate Spline approaches both yielded smooth transitions. However, feathering corrupted known vertex values. Leave-one-out analyses were conducted, with 5% to 50% of known anatomy removed from the left-out patient and estimated via the proposed approaches. The Thin Plate Spline approach yielded smaller errors than the other two approaches, with an average vertex error improvement of 1.46 mm and 1.38 mm for the skull and mandible respectively, over the baseline approach.

  4. A 'range test' for determining scatterers with unknown physical properties

    Potthast, Roland; Sylvester, John; Kusiak, Steven


    We describe a new scheme for determining the convex scattering support of an unknown scatterer when the physical properties of the scatterers are not known. The convex scattering support is a subset of the scatterer and provides information about its location and estimates for its shape. For convex polygonal scatterers the scattering support coincides with the scatterer and we obtain full shape reconstructions. The method will be formulated for the reconstruction of the scatterers from the far field pattern for one or a few incident waves. The method is non-iterative in nature and belongs to the type of recently derived generalized sampling schemes such as the 'no response test' of Luke-Potthast. The range test operates by testing whether it is possible to analytically continue a far field to the exterior of any test domain Omegatest. By intersecting the convex hulls of various test domains we can produce a minimal convex set, the convex scattering support of which must be contained in the convex hull of the support of any scatterer which produces that far field. The convex scattering support is calculated by testing the range of special integral operators for a sampling set of test domains. The numerical results can be used as an approximation for the support of the unknown scatterer. We prove convergence and regularity of the scheme and show numerical examples for sound-soft, sound-hard and medium scatterers. We can apply the range test to non-convex scatterers as well. We can conclude that an Omegatest which passes the range test has a non-empty intersection with the infinity-support (the complement of the unbounded component of the complement of the support) of the true scatterer, but cannot find a minimal set which must be contained therein.

  5. Identification of unknown sample using NAA, EDXRF, XRD techniques

    Dalvi, Aditi A.; Swain, K.K.; Chavan, Trupti; Remya Devi, P.S.; Wagh, D.N.; Verma, R.


    Analytical Chemistry Division (ACD), Bhabha Atomic Research Centre (BARC) receives samples from law enforcement agencies such as Directorate of Revenue Intelligence, Customs for analysis. Five unknown grey powdered samples were received for identification and were suspected to be Iridium (Ir). Identification of unknown sample is always a challenging task and suitable analytical techniques have to be judiciously utilized for arriving at the conclusion. Qualitative analysis was carried out using Jordan Valley, EX-3600 M Energy dispersive X-ray fluorescence (EDXRF) spectrometer at ACD, BARC. A SLP series LEO Si (Li) detector (active area: 30 mm 2 ; thickness: 3.5 mm; resolution: 140 eV at 5.9 keV of Mn K X-ray) was used during the measurement and only characteristic X-rays of Ir (Lα: 9.17 keV and Lβ: 10.70 keV) was seen in the X-ray spectrum. X-ray diffraction (XRD) measurement results indicated that the Ir was in the form of metal. To confirm the XRD data, neutron activation analysis (NAA) was carried out by irradiating samples and elemental standards (as comparator) in graphite reflector position of Advanced Heavy Water Reactor Critical Facility (AHWR CF) reactor, BARC, Mumbai. After suitable decay period, gamma activity measurements were carried out using 45% HPGe detector coupled to 8 k multi channel analyzer. Characteristic gamma line at 328.4 keV of the activation product 194 Ir was used for quantification of iridium and relative method of NAA was used for concentration calculations. NAA results confirmed that all the samples were Iridium metal. (author)

  6. Music2Share - Copyright-Compliant Music Sharing in P2P Systems

    Kalker, Ton; Epema, Dick H.J.; Hartel, Pieter H.; Lagendijk, R. (Inald) L.; van Steen, Martinus Richardus; van Steen, Maarten

    Peer-to-Peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  7. Music2Share --- Copyright-Compliant Music Sharing in P2P Systems

    Kalker, T.; Epema, D.; Hartel, P.; Lagendijk, I.; van Steen, M.R.


    Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  8. Switched-Observer-Based Adaptive Neural Control of MIMO Switched Nonlinear Systems With Unknown Control Gains.

    Long, Lijun; Zhao, Jun


    In this paper, the problem of adaptive neural output-feedback control is addressed for a class of multi-input multioutput (MIMO) switched uncertain nonlinear systems with unknown control gains. Neural networks (NNs) are used to approximate unknown nonlinear functions. In order to avoid the conservativeness caused by adoption of a common observer for all subsystems, an MIMO NN switched observer is designed to estimate unmeasurable states. A new switched observer-based adaptive neural control technique for the problem studied is then provided by exploiting the classical average dwell time (ADT) method and the backstepping method and the Nussbaum gain technique. It effectively handles the obstacle about the coexistence of multiple Nussbaum-type function terms, and improves the classical ADT method, since the exponential decline property of Lyapunov functions for individual subsystems is no longer satisfied. It is shown that the technique proposed is able to guarantee semiglobal uniformly ultimately boundedness of all the signals in the closed-loop system under a class of switching signals with ADT, and the tracking errors converge to a small neighborhood of the origin. The effectiveness of the approach proposed is illustrated by its application to a two inverted pendulum system.

  9. The determination of an unknown boundary condition in a fractional diffusion equation

    Rundell, William


    In this article we consider an inverse boundary problem, in which the unknown boundary function ∂u/∂v = f(u) is to be determined from overposed data in a time-fractional diffusion equation. Based upon the free space fundamental solution, we derive a representation for the solution f as a nonlinear Volterra integral equation of second kind with a weakly singular kernel. Uniqueness and reconstructibility by iteration is an immediate result of a priori assumption on f and applying the fixed point theorem. Numerical examples are presented to illustrate the validity and effectiveness of the proposed method. © 2013 Copyright Taylor and Francis Group, LLC.

  10. Shared Contract-Obedient Endpoints

    Étienne Lozes


    Full Text Available Most of the existing verification techniques for message-passing programs suppose either that channel endpoints are used in a linear fashion, where at most one thread may send or receive from an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach usually forbids the sharing of channels while the latter limits what is provable about programs. In this paper we propose a midpoint between these techniques by extending a proof system based on separation logic to allow sharing of endpoints. We identify two independent mechanisms for supporting sharing: an extension of fractional shares to endpoints, and a new technique based on what we call reflexive ownership transfer. We demonstrate on a number of examples that a linear treatment of sharing is possible.

  11. Knowledge Sharing and National Culture

    Michailova, Snejina; Hutchings, Kate


    Much of the knowledge management literature tends to assume a rather universalistunderstanding of knowledge sharing. Yet, attitudes to knowledge sharing as well as actualknowledge-sharing behaviour depend on conditions that vary across institutional and culturalenvironments. This paper contributes...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...

  12. Shared orthographic neuronal representations for spelling and reading.

    Purcell, Jeremy J; Jiang, Xiong; Eden, Guinevere F


    A central question in the study of the neural basis of written language is whether reading and spelling utilize shared orthographic representations. While recent studies employing fMRI to test this question report that the left inferior frontal gyrus (IFG) and ventral occipitotemporal cortex (vOTC) are active during both spelling and reading in the same subjects (Purcell et al., 2011a; Rapp and Lipka, 2011), the spatial resolution of fMRI limits the interpretation of these findings. Specifically, it is unknown if the neurons which encode orthography for reading are also involved in spelling of the same words. Here we address this question by employing an event-related functional magnetic resonance imaging-adaptation (fMRI-A) paradigm designed to examine shared orthographic representations across spelling and reading. First, we identified areas that independently showed adaptation to reading, and adaptation to spelling. Then we identified spatial convergence for these two separate maps via a conjunction analysis. Consistent with previous studies (Purcell et al., 2011a; Rapp and Lipka, 2011), this analysis revealed the left dorsal IFG, vOTC and supplementary motor area. To further validate these observations, we then interrogated these regions using an across-task adaptation technique, and found adaptation across reading and spelling in the left dorsal IFG (BA 44/9). Our final analysis focused specifically on the Visual Word Form Area (VWFA) in the vOTC, whose variability in location among subjects requires the use of subject-specific identification mechanisms (Glezer and Riesenhuber, 2013). Using a functional localizer for reading, we defined the VWFA in each subject, and found adaptation effects for both within the spelling and reading conditions, respectively, as well as across spelling and reading. Because none of these effects were observed during a phonological/semantic control condition, we conclude that the left dorsal IFG and VWFA are involved in accessing

  13. 'Reacting to the unknown': experiencing the first birth at home or in hospital in Australia.

    Dahlen, Hannah G; Barclay, Lesley; Homer, Caroline S E


    to explore the experiences of a small group of first-time mothers giving birth at home or in hospital. a grounded theory methodology was used. Data were generated from in-depth interviews with women in their own homes. Sydney, Australia. 19 women were interviewed. Seven women who gave birth for the first time in a public hospital and seven women who gave birth for the first time at home were interviewed, and their experiences were contrasted with two mothers who gave birth for the first time in a birth centre, one mother who gave birth for the first time in a private hospital and two women who had given birth more than once. these women shared common experiences of giving birth as 'novices'. Regardless of birth setting, they were all 'reacting to the unknown'. As they entered labour, the women chose different levels of responsibility for their birth. They also readjusted their expectations when the reality of labour occurred, reacted to the 'force' of labour, and connected or disconnected from the labour and eventually the baby. knowing that first-time mothers, irrespective of birth setting, are essentially 'reacting to the unknown' as they negotiate the experience of birth, could alter the way in which care is provided and increase the sensitivity of midwives to women's needs. Most importantly, midwives need to be aware of the need to help women adjust their expectations during labour and birth. Identifying the 'novice' status of first-time mothers also better explains previous research that reports unrealistic expectations and fear that may be associated with first-time birthing. Crown Copyright 2008. Published by Elsevier Ltd. All rights reserved.

  14. The unknown-unknowns: Revealing the hidden insights in massive biomedical data using combined artificial intelligence and knowledge networks

    Chris Yoo


    Full Text Available Genomic data is estimated to be doubling every seven months with over 2 trillion bases from whole genome sequence studies deposited in Genbank in just the last 15 years alone. Recent advances in compute and storage have enabled the use of artificial intelligence techniques in areas such as feature recognition in digital pathology and chemical synthesis for drug development. To apply A.I. productively to multidimensional data such as cellular processes and their dysregulation, the data must be transformed into a structured format, using prior knowledge to create contextual relationships and hierarchies upon which computational analysis can be performed. Here we present the organization of complex data into hypergraphs that facilitate the application of A.I. We provide an example use case of a hypergraph containing hundreds of biological data values and the results of several classes of A.I. algorithms applied in a popular compute cloud. While multiple, biologically insightful correlations between disease states, behavior, and molecular features were identified, the insights of scientific import were revealed only when exploration of the data included visualization of subgraphs of represented knowledge. The results suggest that while machine learning can identify known correlations and suggest testable ones, the greater probability of discovering unexpected relationships between seemingly independent variables (unknown-unknowns requires a context-aware system – hypergraphs that impart biological meaning in nodes and edges. We discuss the implications of a combined hypergraph-A.I. analysis approach to multidimensional data and the pre-processing requirements for such a system.


    Cristina Cojocaru


    Full Text Available Throughout its content, the memorandum of association, even in the case of a limited liability company, stipulates the contribution of each shareholder to the share capital while the share capital is divided into shares, corresponding to the contribution of each shareholder to the share capital. The limited liability company is established in consideration of the people who set it up and as such, the share transfer is subject to certain conditions provided by law. Therefore, the law sets out strict conditions for share transfer in the case the transfer is done to one or more shareholders, but especially if the transfer is done to people outside the company, or following the inheritance. If the transfer is done to a shareholder, such is possible provided that this transfer has not been prohibited by the act of incorporation itself. Instead, the transfer to people outside the company cannot be done without the cons ent of shareholders representing at least three quarters of the capital. In case of share transfer by succession, the law allows it provided that this transfer is permitted within the memorandum of association .

  16. Nonlinear secret image sharing scheme.

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young


    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  17. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Wang Daoshun


    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  18. One Share-One Vote

    Poulsen, Thomas; Eklund, Johan E.

    Shares with more voting rights than cash flow rights provide their owners with a disproportional influence that is often found to destroy the value of outside equity. This is taken as evidence of discretionary use of power. However, concentration of power does not necessarily result from control...... enhancing mechanisms; it could also be that some shareholders retain a large block in a one share-one vote structure. In this paper, we develop a methodology to disentangle disproportionality, which allows us to test the effect of deviations from one share-one vote more precisely. Our empirical findings add...

  19. How to know unknown fungi: the role of a herbarium.

    Brock, Patrick M; Döring, Heidi; Bidartondo, Martin I


    The development of a universal approach to the identification of fungi from the environment is impeded by the limited number and narrow phylogenetic range of the named internal transcribed spacer DNA sequences available on GenBank. The goal here was to assess the potential impact of systematic DNA sequencing from a fungal herbarium collection. DNA sequences were generated from a diverse set of 279 specimens deposited at the fungal herbarium of the Royal Botanic Gardens at Kew (UK) and bioinformatic analyses were used to study their overlap with the public database. It is estimated that c. 70% of the herbarium taxonomic diversity is not yet represented in GenBank and that a further c. 10% of our sequences match solely to 'environmental samples' or fungi otherwise unidentified. Here it is shown that the unsampled diversity residing in fungal herbaria can substantially enlarge the coverage of GenBank's fully identified sequence pool to ameliorate the problem of environmental unknowns and to aid in the detection of truly novel fungi by molecular data.

  20. Developing Probabilistic Safety Performance Margins for Unknown and Underappreciated Risks

    Benjamin, Allan; Dezfuli, Homayoon; Everett, Chris


    Probabilistic safety requirements currently formulated or proposed for space systems, nuclear reactor systems, nuclear weapon systems, and other types of systems that have a low-probability potential for high-consequence accidents depend on showing that the probability of such accidents is below a specified safety threshold or goal. Verification of compliance depends heavily upon synthetic modeling techniques such as PRA. To determine whether or not a system meets its probabilistic requirements, it is necessary to consider whether there are significant risks that are not fully considered in the PRA either because they are not known at the time or because their importance is not fully understood. The ultimate objective is to establish a reasonable margin to account for the difference between known risks and actual risks in attempting to validate compliance with a probabilistic safety threshold or goal. In this paper, we examine data accumulated over the past 60 years from the space program, from nuclear reactor experience, from aircraft systems, and from human reliability experience to formulate guidelines for estimating probabilistic margins to account for risks that are initially unknown or underappreciated. The formulation includes a review of the safety literature to identify the principal causes of such risks.

  1. PMS2 monoallelic mutation carriers: the known unknown.

    Goodenberger, McKinsey L; Thomas, Brittany C; Riegert-Johnson, Douglas; Boland, C Richard; Plon, Sharon E; Clendenning, Mark; Win, Aung Ko; Senter, Leigha; Lipkin, Steven M; Stadler, Zsofia K; Macrae, Finlay A; Lynch, Henry T; Weitzel, Jeffrey N; de la Chapelle, Albert; Syngal, Sapna; Lynch, Patrick; Parry, Susan; Jenkins, Mark A; Gallinger, Steven; Holter, Spring; Aronson, Melyssa; Newcomb, Polly A; Burnett, Terrilea; Le Marchand, Loïc; Pichurin, Pavel; Hampel, Heather; Terdiman, Jonathan P; Lu, Karen H; Thibodeau, Stephen; Lindor, Noralane M


    Germ-line mutations in MLH1, MSH2, MSH6, and PMS2 have been shown to cause Lynch syndrome. The penetrance of the cancer and tumor spectrum has been repeatedly studied, and multiple professional societies have proposed clinical management guidelines for affected individuals. Several studies have demonstrated a reduced penetrance for monoallelic carriers of PMS2 mutations compared with the other mismatch repair (MMR) genes, but clinical management guidelines have largely proposed the same screening recommendations for all MMR gene carriers. The authors considered whether enough evidence existed to propose new screening guidelines specific to PMS2 mutation carriers with regard to age at onset and frequency of colonic screening. Published reports of PMS2 germ-line mutations were combined with unpublished cases from the authors' research registries and clinical practices, and a discussion of potential modification of cancer screening guidelines was pursued. A total of 234 monoallelic PMS2 mutation carriers from 170 families were included. Approximately 8% of those with colorectal cancer (CRC) were diagnosed before age 30, and each of these tumors presented on the left side of the colon. As it is currently unknown what causes the early onset of CRC in some families with monoallelic PMS2 germline mutations, the authors recommend against reducing cancer surveillance guidelines in families found having monoallelic PMS2 mutations in spite of the reduced penetrance.Genet Med 18 1, 13-19.

  2. Systemic treatment of cancer of unknown primary origin

    Reckova, M.


    Cancer of unknown primary origin (CUP) comprises a heterogenous group of cancers with distinct biology and prognosis. There is, however, a specific group of patients with curable diseases, or incurable diseases with good prognosis. The main aim of treatment in the group of patients with CUP is timely initiation of therapy in the cases of curable disease. There is no known standard of care in the cases of CUP with poor prognosis, but most frequently, platinum-based regimens are used. In the cases of specific immunohistochemistry (IHC) or molecular gene expression profile, there are used the treatment regimens similar to those used in the patients with known primary tumor and similar IHC or molecular profile. Currently, most of data in patients with CUP are from phase II clinical trials. Thus proficiently designed phase III randomized clinical trials with translation research is priority, with aim to improve our knowledge and personalize treatment of such heterogenous group of patients as is a group of patients with CUP. (author)

  3. Radiotherapeutic concepts in cancer of unknown primary site

    Krug, D.; Debus, J.; Sterzing, F.


    The term cancer of unknown primary (CUP) encompasses a group of entities which differ to a great extent regarding etiology, prognosis and therapeutic management. The aim of the study was an elaboration of the role of radiotherapy in CUP syndrome. Systematic literature search and specification of the available treatment options. Radiotherapy is an integral part of interdisciplinary management approaches for patients with CUP in both curative and palliative situations. Radio-oncological techniques, such as intensity-modulated radiotherapy and stereotactic body radiotherapy increase the therapeutic window. Modern diagnostic modalities from radiology and nuclear medicine are the cornerstone of radiotherapeutic interventions, especially in terms of target volume definition and pretherapeutic staging. In the interdisciplinary setting radiation oncology offers the possibility of curative and often organ preserving approaches in patients with axillary and cervical CUP. In addition, improvement and preservation of quality of life can be achieved in patients with metastatic disease. Radiation oncology is a crucial component of the interdisciplinary management of patients with CUP. Therapeutic decisions in patients with CUP should be made in an interdisciplinary setting. (orig.) [de

  4. Crowdsourcing the unknown: the satellite search for Genghis Khan.

    A Y M Lin

    Full Text Available Massively parallel collaboration and emergent knowledge generation is described through a large scale survey for archaeological anomalies within ultra-high resolution earth-sensing satellite imagery. Over 10K online volunteers contributed 30K hours (3.4 years, examined 6,000 km², and generated 2.3 million feature categorizations. Motivated by the search for Genghis Khan's tomb, participants were tasked with finding an archaeological enigma that lacks any historical description of its potential visual appearance. Without a pre-existing reference for validation we turn towards consensus, defined by kernel density estimation, to pool human perception for "out of the ordinary" features across a vast landscape. This consensus served as the training mechanism within a self-evolving feedback loop between a participant and the crowd, essential driving a collective reasoning engine for anomaly detection. The resulting map led a National Geographic expedition to confirm 55 archaeological sites across a vast landscape. A increased ground-truthed accuracy was observed in those participants exposed to the peer feedback loop over those whom worked in isolation, suggesting collective reasoning can emerge within networked groups to outperform the aggregate independent ability of individuals to define the unknown.

  5. Challenges of the Unknown: Clinical Application of Microbial Metagenomics

    Graham Rose


    Full Text Available Availability of fast, high throughput and low cost whole genome sequencing holds great promise within public health microbiology, with applications ranging from outbreak detection and tracking transmission events to understanding the role played by microbial communities in health and disease. Within clinical metagenomics, identifying microorganisms from a complex and host enriched background remains a central computational challenge. As proof of principle, we sequenced two metagenomic samples, a known viral mixture of 25 human pathogens and an unknown complex biological model using benchtop technology. The datasets were then analysed using a bioinformatic pipeline developed around recent fast classification methods. A targeted approach was able to detect 20 of the viruses against a background of host contamination from multiple sources and bacterial contamination. An alternative untargeted identification method was highly correlated with these classifications, and over 1,600 species were identified when applied to the complex biological model, including several species captured at over 50% genome coverage. In summary, this study demonstrates the great potential of applying metagenomics within the clinical laboratory setting and that this can be achieved using infrastructure available to nondedicated sequencing centres.

  6. Chronic kidney disease of unknown etiology in Sri Lanka.

    Rajapakse, Senaka; Shivanthan, Mitrakrishnan Chrishan; Selvarajah, Mathu


    In the last two decades, chronic kidney disease of unknown etiology (CKDu) has emerged as a significant contributor to the burden of chronic kidney disease (CKD) in rural Sri Lanka. It is characterized by the absence of identified causes for CKD. The prevalence of CKDu is 15.1-22.9% in some Sri Lankan districts, and previous research has found an association with farming occupations. A systematic literature review in Pubmed, Embase, Scopus, and Lilacs databases identified 46 eligible peer-reviewed articles and one conference abstract. Geographical mapping indicates a relationship between CKDu and agricultural irrigation water sources. Health mapping studies, human biological studies, and environment-based studies have explored possible causative agents. Most studies focused on likely causative agents related to agricultural practices, geographical distribution based on the prevalence and incidence of CKDu, and contaminants identified in drinking water. Nonetheless, the link between agrochemicals or heavy metals and CKDu remains to be established. No definitive cause for CKDu has been identified. Evidence to date suggests that the disease is related to one or more environmental agents, however pinpointing a definite cause for CKDu is challenging. It is plausible that CKDu is multifactorial. No specific guidelines or recommendations exist for treatment of CKDu, and standard management protocols for CKD apply. Changes in agricultural practices, provision of safe drinking water, and occupational safety precautions are recommended by the World Health Organization.

  7. Dead or Alive? Dealing with Unknown Eligibility in Longitudinal Surveys

    Watson Nicole


    Full Text Available Longitudinal surveys follow people over time and some of these people will die during the life of the panel. Through fieldwork effort, some deaths will be reported or known, but others will be unobserved due to sample members no longer being issued to field or having inconclusive fieldwork outcomes (such as a noncontact that is not followed by a contact at a later wave. The coverage of deaths identified among sample members has flow-on implications to nonresponse correction. Using the Household, Income and Labour Dynamics in Australia (HILDA Survey, four methods are used to examine the extent of missing death reports. The first method matches the sample to the national death register. The second method uses life-expectancy tables to extrapolate the expected number of deaths among the sample with unknown eligibility. The third method is similar but models deaths from data internal to the survey. The fourth method models deaths as part of the attrition process of a longitudinal survey. The last three methods are compared to the first method and the implications for the construction of balanced panel weights and subsequent population inference are explored.

  8. Physics at 13 TeV: CMS - scanning the unknown

    Antonella Del Rosso


    CMS is getting ready to use its accurate detector to scan the many ripples of the unknown physics that may lie beyond the Standard Model. Foremost in everyone’s mind is the search for signs of the production of dark matter at a man-made machine.   Interestingly, the observation of dark matter or new weakly interacting particles implies detecting that some energy has escaped, i.e. it’s missing from the upcoming proton collisions at the LHC. This is why measuring and understanding “missing energy” will be a very important step in that direction. “A large amount of missing energy is the signature for many processes of physics beyond the Standard Model. However, it’s not the only interesting signature that we will be able to exploit when the new collision energy is available,” explains Luca Malgeri, CMS Physics Coordinator. Among the interesting things not associated with missing energy are high-mass resonanc...

  9. Adaptively locating unknown steady states: Formalism and basin of attraction

    Wu, Yu; Lin, Wei


    The adaptive technique, which includes both dynamical estimators and coupling gains, has been recently verified to be practical for locating the unknown steady states numerically. This Letter, in the light of the center manifold theory for dynamical systems and the matrix spectrum principle, establishes an analytical formalism of this adaptive technique and reveals a connection between this technique and the original adaptive controller which includes only the dynamical estimator. More interestingly, in study of the well-known Lorenz system, the selections of the estimator parameters and initial values are found to be crucial to the successful application of the adaptive technique. Some Milnor-like basins of attraction with fractal structures are found quantitatively. All the results obtained in the Letter can be further extended to more general dynamical systems of higher dimensions. -- Highlights: → Establishing a new and rigorous formalism for the adaptive stabilization technique. → Showing a close connection between the adaptive technique and the original controller. → Providing feasible algorithms for simultaneous stabilization of multiple steady states. → Finding Milnor-like basins of attraction with fractal structures in adaptive control.

  10. Investigation of cervical lymph node metastasis from primary unknown carcinoma

    Sagawa, Kosuke; Terada, Tomonori; Saeki, Nobuo; Uwa, Nobuhiro; Mohri, Takeshi; Sakagami, Masafumi


    We retrospectively evaluated 41 patients with metastatic cervical tumors from unknown primary sites at the Hyogo College of Medicine between 1997 and 2007. The N stage classification of cervical lymph nodes was: N1 in 3 cases, N2a in 10 cases, N2b in 10 cases, N2c in 4 cases, and N3 in 14 cases. The histopathological diagnoses of cervical lymph node were: squamous cell carcinoma in 33 cases, adenocarcinoma in 5 cases, undifferentiated carcinoma in 2 cases, and papillary carcinoma in 1 cases. Primary tumor sites were: tonsil in 5 cases, esophaguses in 2 cases, hypopharynxies in 2 cases, and thyroid, oral floor, submandibular gland, lung, gastric and colon in 1 case each. The useful tests were gastric endoscope, positron emission tomography-computed tomography (PET-CT), and blind biopsy of tonsil. We treated 24 of the 41 patients. Therapies were: neck dissection with postoperative radiation therapy in 11 cases, neck dissection alone in 1 case, only radiation or chemoradiation therapy alone in 8 cases, and chemotherapy alone in 4 cases. The 5-year survival rate was 40.1% in all cases and 81.5% in cases who underwent neck dissection. (author)

  11. Gravity, strings and particles a journey into the unknown

    Gasperini, Maurizio


    New fundamental forces of Nature? New forms of "dark'' energy? Signals from epochs preceding the Big Bang? Is our space-time unique? Only a joint study of the three topics examined in this book – gravity, strings and particles – may provide answers to these questions. Such a study may also provide the key to solving one of the most fascinating mysteries of modern science, namely: Besides time and the three spatial dimensions, how many other dimensions exist in our universe? The book is primarily addressed to readers who do not necessarily have a specific background in physics but are nevertheless interested in discovering the originality and the possible implications of some of the amazing ideas in modern theoretical physics. The emphasis is on conveying ideas rather than explaining formulas, focusing not on what is known but -- mainly -- on what is still unknown. Many parts of the book are devoted to fundamental theoretical models and results which are potentially highly relevant for a deeper understand...

  12. Kidnapping Detection and Recognition in Previous Unknown Environment

    Yang Tian


    Full Text Available An unaware event referred to as kidnapping makes the estimation result of localization incorrect. In a previous unknown environment, incorrect localization result causes incorrect mapping result in Simultaneous Localization and Mapping (SLAM by kidnapping. In this situation, the explored area and unexplored area are divided to make the kidnapping recovery difficult. To provide sufficient information on kidnapping, a framework to judge whether kidnapping has occurred and to identify the type of kidnapping with filter-based SLAM is proposed. The framework is called double kidnapping detection and recognition (DKDR by performing two checks before and after the “update” process with different metrics in real time. To explain one of the principles of DKDR, we describe a property of filter-based SLAM that corrects the mapping result of the environment using the current observations after the “update” process. Two classical filter-based SLAM algorithms, Extend Kalman Filter (EKF SLAM and Particle Filter (PF SLAM, are modified to show that DKDR can be simply and widely applied in existing filter-based SLAM algorithms. Furthermore, a technique to determine the adapted thresholds of metrics in real time without previous data is presented. Both simulated and experimental results demonstrate the validity and accuracy of the proposed method.

  13. Being Sticker Rich: Numerical Context Influences Children's Sharing Behavior.

    Tasha Posid

    Full Text Available Young children spontaneously share resources with anonymous recipients, but little is known about the specific circumstances that promote or hinder these prosocial tendencies. Children (ages 3-11 received a small (12 or large (30 number of stickers, and were then given the opportunity to share their windfall with either one or multiple anonymous recipients (Dictator Game. Whether a child chose to share or not varied as a function of age, but was uninfluenced by numerical context. Moreover, children's giving was consistent with a proportion-based account, such that children typically donated a similar proportion (but different absolute number of the resources given to them, regardless of whether they originally received a small or large windfall. The proportion of resources donated, however, did vary based on the number of recipients with whom they were allowed to share, such that on average, children shared more when there were more recipients available, particularly when they had more resources, suggesting they take others into consideration when making prosocial decisions. Finally, results indicated that a child's gender also predicted sharing behavior, with males generally sharing more resources than females. Together, findings suggest that the numerical contexts under which children are asked to share, as well as the quantity of resources that they have to share, may interact to promote (or hinder altruistic behaviors throughout childhood.

  14. Implementing Explicit and Finding Implicit Sharing in Embedded DSLs

    Oleg Kiselyov


    Full Text Available Aliasing, or sharing, is prominent in many domains, denoting that two differently-named objects are in fact identical: a change in one object (memory cell, circuit terminal, disk block is instantly reflected in the other. Languages for modelling such domains should let the programmer explicitly define the sharing among objects or expressions. A DSL compiler may find other identical expressions and share them, implicitly. Such common subexpression elimination is crucial to the efficient implementation of DSLs. Sharing is tricky in embedded DSL, since host aliasing may correspond to copying of the underlying objects rather than their sharing. This tutorial summarizes discussions of implementing sharing in Haskell DSLs for automotive embedded systems and hardware description languages. The technique has since been used in a Haskell SAT solver and the DSL for music synthesis. We demonstrate the embedding in pure Haskell of a simple DSL with a language form for explicit sharing. The DSL also has implicit sharing, implemented via hash-consing. Explicit sharing greatly speeds up hash-consing. The seemingly imperative nature of hash-consing is hidden beneath a simple combinator language. The overall implementation remains pure functional and easy to reason about.

  15. Random neural Q-learning for obstacle avoidance of a mobile robot in unknown environments

    Jing Yang


    Full Text Available The article presents a random neural Q-learning strategy for the obstacle avoidance problem of an autonomous mobile robot in unknown environments. In the proposed strategy, two independent modules, namely, avoidance without considering the target and goal-seeking without considering obstacles, are first trained using the proposed random neural Q-learning algorithm to obtain their best control policies. Then, the two trained modules are combined based on a switching function to realize the obstacle avoidance in unknown environments. For the proposed random neural Q-learning algorithm, a single-hidden layer feedforward network is used to approximate the Q-function to estimate the Q-value. The parameters of the single-hidden layer feedforward network are modified using the recently proposed neural algorithm named the online sequential version of extreme learning machine, where the parameters of the hidden nodes are assigned randomly and the sample data can come one by one. However, different from the original online sequential version of extreme learning machine algorithm, the initial output weights are estimated subjected to quadratic inequality constraint to improve the convergence speed. Finally, the simulation results demonstrate that the proposed random neural Q-learning strategy can successfully solve the obstacle avoidance problem. Also, the higher learning efficiency and better generalization ability are achieved by the proposed random neural Q-learning algorithm compared with the Q-learning based on the back-propagation method.

  16. Share capitalism and worker wellbeing.

    Bryson, Alex; Clark, Andrew E; Freeman, Richard B; Green, Colin P


    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the "gift"; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as "bad" aspects of job quality.

  17. Medicaid Disproportionate Share Hospital Payments

    U.S. Department of Health & Human Services — Medicaid Disproportionate Share Hospital (DSH) Payments This link provides you with information about Medicaid DSH Payments. You can find information on DSH Audit...

  18. Los espacios compartidos ("Shared Space"

    Mateus Porto Schettino


    The "Shared Space" concept was formally defined when the European Project with this title took place, as part of the Interreg IIIB, North Sea Program. "Shared Space" initiated at 2004 and it's time as a project partly financed by the European Union finish at 2008, after having promoted seven "pilot projects" at Germany, Belgium, Denmark, Holland and England. Nevertheless, Shared Space, it's just a new name for a technique with decades of history, developed fundamentally in Holland and which implemented new criteria for traffic regulation and public space design, were based on all traffic signs elimination and on the spatial integration of all different street users. To analyze Shared Space's projects construction and operation experience, and evaluate their possible application in some Spanish city centres is this paper main objective.

  19. Benefit sharing in health research


    Aug 2, 2015 ... [4] Those who contribute to scientific research ought to share in its benefits. .... women to form new relationships, social networks and develop a sense of ... or discoveries about the indigenous biological resources before.

  20. United Network for Organ Sharing

    ... donor families & recipients Organ donation facts Policy Policy development Policy brochures Membership Data Transplant trends Data resources Technology Get Involved EDUCATE Become a UNOS Ambassador Promote organ donation Share through social media VISIT Attend a UNOS event Tour the National ...

  1. Sharing Resources in Educational Communities

    Anoush Margarayn


    Full Text Available The paper explores the implications of mobility within educational communities for sharing and reuse of educational resources. The study begins by exploring individuals’ existing strategies for sharing and reusing educational resources within localised and distributed communities, with particular emphasis on the impact of geographic location on these strategies. The results indicate that the geographic distribution of communities has little impact on individuals’ strategies for resource management, since many individuals are communicating via technology tools with colleagues within a localised setting. The study points to few major differences in the ways in which individuals within the localised and distributed communities store, share and collaborate around educational resources. Moving beyond the view of individuals being statically involved in one or two communities, mobility across communities, roles and geographic location are formulated and illustrated through eight scenarios. The effects of mobility across these scenarios are outlined and a framework for future research into mobility and resource sharing within communities discussed.

  2. Network node for peripheral sharing

    Bobbitt, J.; Johnson, M.


    A module which enables several independent computer systems to share the peripherals (graphics display and line printer) of a PDP-11 computer is described. The module requires no software support in the PDP-11

  3. Shared Year Exchange in Nursing

    Vedsegaard, Helle Wendner; Wederkinck, Elisabeth


    Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien.......Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien....

  4. Value of Sharing: Viral Advertisement

    Duygu Aydın; Aşina Gülerarslan; Süleyman Karaçor; Tarık Doğan


    Sharing motivations of viral advertisements by consumers and the impacts of these advertisements on the perceptions for brand will be questioned in this study. Three fundamental questions are answered in the study. These are advertisement watching and sharing motivations of individuals, criteria of liking viral advertisement and the impact of individual attitudes for viral advertisement on brand perception respectively. This study will be carried out via a viral advertise...

  5. Switch/router architectures shared-bus and shared-memory based systems

    Aweya, James


    A practicing engineer's inclusive review of communication systems based on shared-bus and shared-memory switch/router architectures. This book delves into the inner workings of router and switch design in a comprehensive manner that is accessible to a broad audience. It begins by describing the role of switch/routers in a network, then moves on to the functional composition of a switch/router. A comparison of centralized versus distributed design of the architecture is also presented. The author discusses use of bus versus shared-memory for communication within a design, and also covers Quality of Service (QoS) mechanisms and configuration tools. Written in a simple style and language to allow readers to easily understand and appreciate the material presented, Switch/Router Architectures: Shared-Bus and Shared-Memory Based Systems discusses the design of multilayer switches—starting with the basic concepts and on to the basic architectures. It describes the evolution of multilayer switch designs and highli...

  6. Takotsubo cardiomyopathy: A known unknown foe of asthma.

    Kotsiou, Ourania S; Douras, Alexandros; Makris, Demosthenes; Mpaka, Nikoleta; Gourgoulianis, Konstantinos I


    Patients with uncontrolled asthma are at a greater risk of asthma attacks requiring emergency room visits or hospital admissions. Takotsubo cardiomyopathy is potentially a significant complication in a course of status asthmaticus. We describe a 43-year-old female patient who presented with status asthmaticus that was further complicated with takotsubo cardiomyopathy. Recognizing apical ballooning syndrome is challenging in patients with a history of respiratory disease because the symptoms of the last entity may complicate the diagnostic approach. It is difficult to distinguish clinically apical ballooning syndrome from the acute airway exacerbation itself. Both asthma and takotsubo cardiomyopathy share the same clinical presentation with dyspnea and chest tightness. In our patient, the electrocardiographic abnormalities, the rapidly reversible distinctive characteristics of echocardiography, and the modest elevation of serum cardiac biomarkers levels, in combination with the presence of a stress trigger (severe asthma attack), strongly supported the diagnosis of broken heart syndrome. Clinicians should re-evaluate asthma management and be aware of the complications associated with asthma attacks such as stress-induced cardiomyopathy.

  7. A Genealogical Look at Shared Ancestry on the X Chromosome.

    Buffalo, Vince; Mount, Stephen M; Coop, Graham


    Close relatives can share large segments of their genome identical by descent (IBD) that can be identified in genome-wide polymorphism data sets. There are a range of methods to use these IBD segments to identify relatives and estimate their relationship. These methods have focused on sharing on the autosomes, as they provide a rich source of information about genealogical relationships. We hope to learn additional information about recent ancestry through shared IBD segments on the X chromosome, but currently lack the theoretical framework to use this information fully. Here, we fill this gap by developing probability distributions for the number and length of X chromosome segments shared IBD between an individual and an ancestor k generations back, as well as between half- and full-cousin relationships. Due to the inheritance pattern of the X and the fact that X homologous recombination occurs only in females (outside of the pseudoautosomal regions), the number of females along a genealogical lineage is a key quantity for understanding the number and length of the IBD segments shared among relatives. When inferring relationships among individuals, the number of female ancestors along a genealogical lineage will often be unknown. Therefore, our IBD segment length and number distributions marginalize over this unknown number of recombinational meioses through a distribution of recombinational meioses we derive. By using Bayes' theorem to invert these distributions, we can estimate the number of female ancestors between two relatives, giving us details about the genealogical relations between individuals not possible with autosomal data alone. Copyright © 2016 by the Genetics Society of America.

  8. The HydroShare Collaborative Repository for the Hydrology Community

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.


    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of, and collaboration around, "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting our approach to making this system easy to use and serving the needs of the hydrology community represented by the Consortium of Universities for the Advancement of Hydrologic Sciences, Inc. (CUAHSI). Metadata for uploaded files is harvested automatically or captured using easy to use web user interfaces. Users are encouraged to add or create resources in HydroShare early in the data life cycle. To encourage this we allow users to share and collaborate on HydroShare resources privately among individual users or groups, entering metadata while doing the work. HydroShare also provides enhanced functionality for users through web apps that provide tools and computational capability for actions on resources. HydroShare's architecture broadly is comprised of: (1) resource storage, (2) resource exploration website, and (3) web apps for actions on resources. System components are loosely coupled and interact through APIs, which enhances robustness, as components can be upgraded and advanced relatively independently. The full power of this paradigm is the

  9. Glory on Venus and selection among the unknown UV absorbers

    Petrova, Elena V.


    The comparison of the phase profiles of glories observed on the cloud top of Venus by the Venus Monitoring Camera (Venus Express) and the light-scattering characteristics of sulfuric acid droplets, containing admixtures with a high refractive index, makes it easier to choose between some candidates for the so-called unknown UV absorber in the Venus clouds. Since among the candidates there are materials wetted and not wetted by sulfuric acid, we analyze whether small submicron particles adhered to or embedded into the 1-μm H2SO4 droplets may actually change the glory pattern normally produced by homogeneous spherical particles and what the conditions are, under which the composite particles formed in heterogeneous nucleation may still produce a glory feature. We have found that one of the most frequently considered candidates, sulfur, can hardly be responsible for the contrasts observed at 0.365 μm on the upper clouds, since it is not wetted by sulfuric acid and submicron sulfur particles, serving as condensation nuclei for sulfuric acid, can only adhere to the H2SO4 droplets rather than be enveloped by them. Such droplets decorated by sulfur blobs substantially distort the glory feature characteristic of the scattering by spherical particles or even smooth it at all, while a glory pattern is practically always seen in the images of Venus taken at small phase angles. At the same time, the grains of the other UV absorbers that can be embedded in H2SO4 droplets, e.g., the widely discussed ferric chloride, pose no problem in terms of interpretation of the observations of glory.

  10. Treatment of Regional Metastatic Melanoma of Unknown Primary Origin

    Elke J. A. H. van Beek


    Full Text Available (1 Background: The purpose of this retrospective study was to evaluate the recurrence and survival rates of metastatic melanoma of unknown primary origin (MUP, in order to further refine current recommendations for the surgical treatment; (2 Methods: Medical data of all MUP patients registered between 2000 and 2011, were analyzed. Seventy-eight patients were categorized in either lymph node (axilla, groin, head-and neck or subcutaneous MUP. Axillary node MUPs were generally treated with dissections of levels I-III, inguinal node MUPs with combined superficial and deep groin dissections, and head-and-neck node MUPs with neck dissections to various extents, based on lymph drainage patterns. Subcutaneous lesions were excised with 1–2 cm margins. The primary outcome was treatment outcomes in terms of (locoregional recurrence and survival rates; (3 Results: Lymph node MUP recurred regionally in 11% of patients, with an overall recurrence rate of 45%. In contrast, subcutaneous MUP recurred locally in 65% of patients with an overall recurrence rate of 78%. This latter group had a significantly shorter disease-free interval than patients with lymph node MUP (p = 0.000. In the entire study population, 5-year and 10-year overall survival rates were 56% and 47% respectively, with no differences observed between the various subgroups; (4 Conclusion: The relatively low regional recurrence rate after regional lymph node dissection (11% supports its current status as standard surgical treatment for lymph node MUP. Subcutaneous MUP, on the contrary, appears to recur both locally (65% and overall (78% at a significantly higher rate, suggesting a different biological behavior. However, wide local excision remains the best available option for this specific group.

  11. Known unknowns: indirect energy effects of information and communication technology

    Horner, Nathaniel C.; Shehabi, Arman; Azevedo, Inês L.


    Background. There has been sustained and growing interest in characterizing the net energy impact of information and communication technology (ICT), which results from indirect effects offsetting (or amplifying) the energy directly consumed by ICT equipment. These indirect effects may be either positive or negative, and there is considerable disagreement as to the direction of this sign as well as the effect magnitude. Literature in this area ranges from studies focused on a single service (such as e-commerce versus traditional retail) to macroeconomic studies attempting to characterize the overall impact of ICT. Methods. We review the literature on the indirect energy effect of ICT found via Google Scholar, our own research, and input from other researchers in the field. The various studies are linked to an effect taxonomy, which is synthesized from several different hierarchies present in the literature. References are further grouped according to ICT service (e.g., e-commerce, telework) and summarized by scope, method, and quantitative and qualitative findings. Review results. Uncertainty persists in understanding the net energy effects of ICT. Results of indirect energy effect studies are highly sensitive to scoping decisions and assumptions made by the analyst. Uncertainty increases as the impact scope broadens, due to complex and interconnected effects. However, there is general agreement that ICT has large energy savings potential, but that the realization of this potential is highly dependent on deployment details and user behavior. Discussion. While the overall net effect of ICT is likely to remain unknown, this review suggests several guidelines for improving research quality in this area, including increased data collection, enhancing traditional modeling studies with sensitivity analysis, greater care in scoping, less confidence in characterizing aggregate impacts, more effort on understanding user behavior, and more contextual integration across the

  12. Popular Music in Jia Zhangke’s Unknown Pleasures

    Jie Zhang


    Full Text Available With his documentary-style films reflecting upon China’s unprecedented transformation from a state-controlled to a market-driven economy, Jia Zhangke has risen from within the movement of independent Chinese cinema that began to flourish in the late 1990s to become one of the most recognized filmmakers of contemporary China. Born in 1970 and raised in the underdeveloped Shanxi Province, Jia studied film theory at Beijing Film Academy and was first noticed for his controversial “Hometown Trilogy”—'Pickpocket '('Xiao Wu', 1997, 'Platform '('Zhantai', 1999, and 'Unknown Pleasures '('Ren xiao yao', 2002. These three films, shot with handheld video camera on the streets of his hometown province, focus on the reckless changes that China’s aggressive economic growth and globalization have brought to socially marginalized groups. Like other independently made films—films that are produced with capital from outside the state-sponsored avenues and without the approval of film censorship, and that are not allowed to be shown in China’s public theaters—Jia’s first three films reach domestic audiences only through unofficial DVD copies and small-scaled screenings at universities, film bars, and art salons. His limited domestic influence sharply contrasts with the critical acclaim that he receives from international film festival audiences, who are searching for alternative film culture from China after the Fifth Generation directors. By the late 1990s, Jia had become a spokesperson for an ever-increasing group of aspiring Chinese independent filmmakers, particularly through writings and interviews that theorize independent Chinese cinema’s practice.

  13. Hyperprolactinemia after laparoscopic ovarian drilling: An unknown phenomenon

    Omrani Gholamhossein R


    Full Text Available Abstract Background The effects of ovarian drilling on the serum levels of gonadotropins and androgens have been studied previously. The aim of this study is to evaluate the effects of ovarian drilling on the serum prolactin levels and its relation to ovulation in women with polycystic ovary syndrome. Methods This is a prospective controlled study. Thirty-six women with PCOS underwent ovarian electrocauterization in university hospitals. Control group consisted of 35 ovulatory women with unexplained infertility. Hormonal assessment performed in early follicular phase of spontaneous or induced cycle before operation in the two groups and repeated one week after operation. Hormonal assay was also performed in the early follicular phase of the first post-operative menstruation, folliculometry and progesterone assay were also performed in the same cycle. Data were analyzed by "repeated measurement design, discriminant analysis, correlation coefficient, and Fisher exact test". Results Six to ten weeks after operation the serum mean +/- SD prolactin levels increased from 284.41 +/- 114.32 mIU/ml to 354.06 +/- 204.42 mIU/ml (P = 0.011. The same values for the control group were 277.73 +/- 114.65 to 277.4 +/- 111.4 (P = 0.981 respectively. Approximately 45% of subjects in PCOS group remained anovulatory in spite of decreased level of LH and testosterone. Prolactin level remained elevated in 73.2% of women who did not ovulate 6–10 weeks after the procedure. Conclusion Hyperprolactinemia after ovarian cauterization may be considered as a possible cause of anovulation in women with polycystic ovaries and improved gonadotropin and androgen levels. The cause of hyperprolactinemia is unknown. Hormonal assay particularly PRL in anovulatory patients after ovarian cauterization is recommended.

  14. A learning-based semi-autonomous controller for robotic exploration of unknown disaster scenes while searching for victims.

    Doroodgar, Barzin; Liu, Yugang; Nejat, Goldie


    Semi-autonomous control schemes can address the limitations of both teleoperation and fully autonomous robotic control of rescue robots in disaster environments by allowing a human operator to cooperate and share such tasks with a rescue robot as navigation, exploration, and victim identification. In this paper, we present a unique hierarchical reinforcement learning-based semi-autonomous control architecture for rescue robots operating in cluttered and unknown urban search and rescue (USAR) environments. The aim of the controller is to enable a rescue robot to continuously learn from its own experiences in an environment in order to improve its overall performance in exploration of unknown disaster scenes. A direction-based exploration technique is integrated in the controller to expand the search area of the robot via the classification of regions and the rubble piles within these regions. Both simulations and physical experiments in USAR-like environments verify the robustness of the proposed HRL-based semi-autonomous controller to unknown cluttered scenes with different sizes and varying types of configurations.

  15. Typing of unknown microorganisms based on quantitative analysis of fatty acids by mass spectrometry and hierarchical clustering

    Li Tingting; Dai Ling; Li Lun; Hu Xuejiao; Dong Linjie; Li Jianjian; Salim, Sule Khalfan; Fu Jieying [Key Laboratory of Pesticides and Chemical Biology, Ministry of Education, College of Chemistry, Central China Normal University, Wuhan, Hubei 430079 (China); Zhong Hongying, E-mail: [Key Laboratory of Pesticides and Chemical Biology, Ministry of Education, College of Chemistry, Central China Normal University, Wuhan, Hubei 430079 (China)


    Rapid identification of unknown microorganisms of clinical and agricultural importance is not only critical for accurate diagnosis of infections but also essential for appropriate and prompt treatment. We describe here a rapid method for microorganisms typing based on quantitative analysis of fatty acids by iFAT approach (Isotope-coded Fatty Acid Transmethylation). In this work, lyophilized cell lysates were directly mixed with 0.5 M NaOH solution in d3-methanol and n-hexane. After 1 min of ultrasonication, the top n-hexane layer was combined with a mixture of standard d0-methanol derived fatty acid methylesters with known concentration. Measurement of intensity ratios of d3/d0 labeled fragment ion and molecular ion pairs at the corresponding target fatty acids provides a quantitative basis for hierarchical clustering. In the resultant dendrogram, the Euclidean distance between unknown species and known species quantitatively reveals their differences or shared similarities in fatty acid related pathways. It is of particular interest to apply this method for typing fungal species because fungi has distinguished lipid biosynthetic pathways that have been targeted for lots of drugs or fungicides compared with bacteria and animals. The proposed method has no dependence on the availability of genome or proteome databases. Therefore, it is can be applicable for a broad range of unknown microorganisms or mutant species.

  16. Previously unknown and highly divergent ssDNA viruses populate the oceans.

    Labonté, Jessica M; Suttle, Curtis A


    Single-stranded DNA (ssDNA) viruses are economically important pathogens of plants and animals, and are widespread in oceans; yet, the diversity and evolutionary relationships among marine ssDNA viruses remain largely unknown. Here we present the results from a metagenomic study of composite samples from temperate (Saanich Inlet, 11 samples; Strait of Georgia, 85 samples) and subtropical (46 samples, Gulf of Mexico) seawater. Most sequences (84%) had no evident similarity to sequenced viruses. In total, 608 putative complete genomes of ssDNA viruses were assembled, almost doubling the number of ssDNA viral genomes in databases. These comprised 129 genetically distinct groups, each represented by at least one complete genome that had no recognizable similarity to each other or to other virus sequences. Given that the seven recognized families of ssDNA viruses have considerable sequence homology within them, this suggests that many of these genetic groups may represent new viral families. Moreover, nearly 70% of the sequences were similar to one of these genomes, indicating that most of the sequences could be assigned to a genetically distinct group. Most sequences fell within 11 well-defined gene groups, each sharing a common gene. Some of these encoded putative replication and coat proteins that had similarity to sequences from viruses infecting eukaryotes, suggesting that these were likely from viruses infecting eukaryotic phytoplankton and zooplankton.

  17. Known Structure, Unknown Function: An Inquiry-Based Undergraduate Biochemistry Laboratory Course

    Gray, Cynthia; Price, Carol W.; Lee, Christopher T.; Dewald, Alison H.; Cline, Matthew A.; McAnany, Charles E.; Columbus, Linda; Mura, Cameron


    Undergraduate biochemistry laboratory courses often do not provide students with an authentic research experience, particularly when the express purpose of the laboratory is purely instructional. However, an instructional laboratory course that is inquiry- and research-based could simultaneously impart scientific knowledge and foster a student's…

  18. Known structure, unknown function: An inquiry?based undergraduate biochemistry laboratory course

    Gray, Cynthia; Price, Carol W.; Lee, Christopher T.; Dewald, Alison H.; Cline, Matthew A.; McAnany, Charles E.; Columbus, Linda; Mura, Cameron


    Abstract Undergraduate biochemistry laboratory courses often do not provide students with an authentic research experience, particularly when the express purpose of the laboratory is purely instructional. However, an instructional laboratory course that is inquiry? and research?based could simultaneously impart scientific knowledge and foster a student's research expertise and confidence. We have developed a year?long undergraduate biochemistry laboratory curriculum wherein students determine...

  19. Domain swapping in structure of mNKR-P1A: unique feature with unknown function

    Kolenko, Petr; Rozbeský, Daniel; Skálová, Tereza; Koval, Tomáš; Fejfarová, Karla; Dušková, Jarmila; Stránský, Jan; Hašek, Jindřich; Dohnálek, Jan


    Roč. 70, Supplement /August/ (2014), C249 ISSN 0108-7673. [Congress and General Assembly of the International Union of Crystallography /23./ - IUCr 2014. 05.08.2014-12.08.2014, Montreal] R&D Projects: GA MŠk(CZ) EE2.3.30.0029 Institutional support: RVO:61389013 ; RVO:61388971 ; RVO:86652036 Keywords : NK cell * receptor * swapping Subject RIV: CE - Biochemistry

  20. Functional and in silico assessment of MAX variants of unknown significance

    Comino-Méndez, Iñaki; Leandro-García, Luis J; Montoya, Guillermo


    UNLABELLED: The presence of germline mutations affecting the MYC-associated protein X (MAX) gene has recently been identified as one of the now 11 major genetic predisposition factors for the development of hereditary pheochromocytoma and/or paraganglioma. Little is known regarding how missense v...

  1. 12 CFR 701.35 - Share, share draft, and share certificate accounts.


    ..., and share certificate accounts in all advertising, disclosures, or agreements, whether written or oral..., other federal law, and its contractual obligations, determine the types of fees or charges and other...

  2. Share opportunity sets and cooperative games

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.


    In many share problems there is ana priorigiven a natural set of possible divisions to solve the sharing problem. Cooperative games related to such share sets are introduced, which may be helpful in solving share problems. Relations between properties of share sets and properties of games are

  3. Share Opportunity Sets and Cooperative Games

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.


    In many share problems there is a priori given a natural set of possible divisions to solve the sharing problem.Cooperative games related to such share sets are introduced, which may be helpful in solving share problems.Relations between properties of share sets and properties of games are

  4. Job Sharing--Opportunities or Headaches?

    Leighton, Patricia


    Discusses the issue of job sharing as a new alternative available to workers. Topics covered include (1) a profile of job sharers, (2) response to job sharing, (3) establishing a job share, (4) job sharing in operation, and (5) legal analysis of job sharing. (CH)

  5. Display Sharing: An Alternative Paradigm

    Brown, Michael A.


    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  6. Akuisisi dan Budaya Knowledge Sharing

    Nuril Kusumawardhani Soeprapto Putri


    Full Text Available Large companies which are experiencing barriers in innovation often take a radical step to acquire knowledge, namely acquisition. Though innovation is not the only reason, acquisition will result in the company wishes to achieve competitive advantage affected by the creation of ideas, creativity and innovation. The three points can be achieved more easily when the knowledge sharing within the organization / company runs well. However, the acquisition maybe impacts as a counter-attack for the knowledge sharing culture both in the acquisitor and and company which obtains the acquisition. Therefore, a key to succeed the acquisition is a sharing culture among individuals within a company that runs well or even better. Individuals from the acquisitor and those of the company that obtains the acquisition can adapt to each other and have confidence in order not to hinder them to share knowledge. This study discusses in detail the potential impacts of an acquisition upon a knowledge sharing culture in a company. 

  7. Thin-layer chromatography of polyphosphoinositides from platelet extracts: interference by an unknown phospholipid

    Tysnes, O.B.; Aarbakke, G.M.; Verhoeven, A.J.; Holmsen, H.


    Different ratios of radioactive polyphosphoinositides in platelets pulse-labelled with 32p-orthophosphate have been reported by various laboratories. We studied whether these differences originate from differences in methodology. Extracts of 32p-Pi labelled human platelets were prepared at various times after gel-filtration and phosphatidylinositol (PI)-, mono (PIP)- and bisphosphate (PIP2) were separated by thin-layer chromatography using four different solvent systems. The 32p-levels in PIP and PIP2 remained constant during one hour after gel-filtration, whereas 32p-PI increased continuously and more than doubled within the first h. In two of the systems PIP co-chromatographed with a radioactive compound which separated well from PIP in the two other systems. This unknown compound was also labelled with 3H-glycerol, 3H-inositol and 3H-arachidonic acid, but it was metabolically and functionally different from the polyphosphoinositides. Both the co-chromatography of this unknown phospholipid and the increase in 32p-PI in gel-filtered platelets can explain the difference in 32p-labelling in phosphoinositides reported in the literature

  8. The determination of a neutron source position in an unknown homogeneous medium: The planar case

    Dubinski, S.; Talmor, A.; Presler, O.; Tshuva, A.; Yaar, I.; Orion, I.; Alfassi, Z.B.


    The possibility of localization of an unknown neutron source in various bulky homogeneous media (box) was studied. For the planar case, two 3 He detectors on the opposite faces of the box were used. A constant polypropylene shield around the box and detectors was used to eliminate the varying contribution from the environment to increase count rates of the detectors and to protect the experimentalist. It is shown that the location of a single small neutron emitting source in a large box can be found to a better than 7% by using two neutron detectors positioned on parallel faces of the box, coplanar with the source. The localization requires measurement of the count rate of both the unknown source and an extra source positioned on one of the faces of the box. The localization is based on the finding that the ratio of the count rates of the two detectors is an exponential function of the distance of the source from one of the detectors

  9. Identification of CJC-1295, a growth-hormone-releasing peptide, in an unknown pharmaceutical preparation.

    Henninge, John; Pepaj, Milaim; Hullstein, Ingunn; Hemmersbach, Peter


    Several peptide drugs are being manufactured illicitly, and in some cases they are being made available to the public before entering or completing clinical trials. At the request of Norwegian police and customs authorities, unknown pharmaceutical preparations suspected to contain peptide drugs are regularly subjected to analysis. In 2009, an unknown pharmaceutical preparation was submitted for analysis by liquid chromatography-high resolution tandem mass spectrometry (LC-HRMS/MS). The preparation was found to contain a 29 amino acid peptide with a C-terminal amide function. Based on the interpretation of mass spectrometric data, an amino acid sequence was proposed. The sequence is consistent with a peptide currently marketed under the name CJC-1295. CJC-1295 is a releasing factor for growth hormone and is therefore considered a Prohibited Substance under Section S2 of the WADA Prohibited List. This substance has potential performance-enhancing effects, it is readily available, and there is reason to believe that it is being used within the bodybuilding community. Copyright © 2010 John Wiley & Sons, Ltd.

  10. Experience Replay for Optimal Control of Nonzero-Sum Game Systems With Unknown Dynamics.

    Zhao, Dongbin; Zhang, Qichao; Wang, Ding; Zhu, Yuanheng


    In this paper, an approximate online equilibrium solution is developed for an N -player nonzero-sum (NZS) game systems with completely unknown dynamics. First, a model identifier based on a three-layer neural network (NN) is established to reconstruct the unknown NZS games systems. Moreover, the identifier weight vector is updated based on experience replay technique which can relax the traditional persistence of excitation condition to a simplified condition on recorded data. Then, the single-network adaptive dynamic programming (ADP) with experience replay algorithm is proposed for each player to solve the coupled nonlinear Hamilton- (HJ) equations, where only the critic NN weight vectors are required to tune for each player. The feedback Nash equilibrium is provided by the solution of the coupled HJ equations. Based on the experience replay technique, a novel critic NN weights tuning law is proposed to guarantee the stability of the closed-loop system and the convergence of the value functions. Furthermore, a Lyapunov-based stability analysis shows that the uniform ultimate boundedness of the closed-loop system is achieved. Finally, two simulation examples are given to verify the effectiveness of the proposed control scheme.

  11. One-way shared memory

    Schoeberl, Martin


    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  12. Availability Cascades & the Sharing Economy

    Netter, Sarah


    attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption......In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  13. Certain non-linear differential polynomials sharing a non zero polynomial

    Majumder Sujoy


    functions sharing a nonzero polynomial and obtain two results which improves and generalizes the results due to L. Liu [Uniqueness of meromorphic functions and differential polynomials, Comput. Math. Appl., 56 (2008, 3236-3245.] and P. Sahoo [Uniqueness and weighted value sharing of meromorphic functions, Applied. Math. E-Notes., 11 (2011, 23-32.].

  14. Use-wear Analysis, Something Unknown in the Prehistory Researchs

    Francisco José Vicente Santos


    Full Text Available The interest generated by the Paleolithic retouched stone tools is a distant event and dissections performed to determine its function are a little early. The Speculations about their function were obtained bymorphological variation, by ethnological data or stories and so on etc. However, in 1957 since Semenov Publication "Prehistoric Tecnology" this form to find out their funcionality get old and the most important would be the new one. This Semenov new line of investigation will be go on with the Scientist: L. H. Keeley, G. H. Odell, M. E. Masur-Franchomme, H. Plisson, P. C. Anderson Gerfaud, Korokoba C., or the Spanish Gutierrez, I. Clemente, J. J. Ibáñez, J. E. González, J. F. Gibaja, I. Martín, R. Domingo, C. Mazo, M. Calvo and P. Jardón. It´s based in test of diferents objects use-wear produted in the Stone´s tools. With them, we can answer questions like How, With what material and Why they have been used. This is the base of Traceology and analysis functional. The Text purpose is show this investigation line, his method and his results.

  15. Extraocular muscle function testing

    ... Extraocular muscle function testing To use the sharing features on this page, please enable JavaScript. Extraocular muscle function testing examines the function of the eye muscles. ...

  16. Organizational conditions for dealing with the unknown unknown : illustrated by how a Dutch water management authority is preparing for climate change

    Termeer, C.J.A.M.; Brink, van den M.A.


    The central question of this article is the extent to which organizations, governmental authorities in particular, are able to deal with the unknown unknown. Drawing on Weick’s work on sensemaking, we introduce seven organizational conditions that can facilitate organizations to be reliable under

  17. Organizational Conditions for Dealing with The Unknown Unknown Illustrated by how a Dutch water management authority is preparing for climate change

    Termeer, Catrien J. A. M.; van den Brink, Margo A.


    The central question of this article is the extent to which organizations, governmental authorities in particular, are able to deal with the unknown unknown. Drawing on Weick's work on sensemaking, we introduce seven organizational conditions that can facilitate organizations to be reliable under

  18. How to share inspection practices internationally?

    Zerger, B.


    ASN strives to share practices with its foreign counterparts in order to develop and adopt best practice worldwide. With regard to inspection practices, the exchanges are made with AEN, in particular within the context of the Working Group on Inspection Practices (WGIP). As well as being very rewarding, the exchanges sometimes come up against marked differences in terms of inspection organisation and even in the meaning given to the inspections. The WGIP endeavors, however, to make inspection practice recommendations that are as functional and feasible as possible. (author)

  19. Fast transfer of shared data

    Timmer, C.; Abbott, D.J.; Heyes, W.G.; Jostizembski, E.; MacLeod, R.W.; Wolin, E.


    The Event Transfer system enables its users to produce events (data) and share them with other users by utilizing shared memory on either Solaris or Linux-based computers. Its design emphasizes speed, reliability, ease of use, and recoverability from crashes. In addition to fast local operation, the ET system allows network transfer of events. Using multi-threaded code based on POSIX threades and mutexes, a successful implementation was developed which allowed passing events over 500 kHz on a 4 cpu Sun workstation and 150 kHz on a dual cpu PC

  20. Security interest in business share

    Žák, Zdeněk


    75 English summary Lien of the share in a limited liability company The main goal of my thesis "Lien of the share in a limited liability company" is to analyze provisions of the new Czech Civil Code and Corporation Act, which were passed in the spring of 2012. Both statutes come into effect on 1 January 2014. At first I briefly describe the historical development of this issue since 1906, when first a statute concerning the limited liability company was passed in our country. Then I describe ...

  1. Knowledge Sharing is Knowledge Creation

    Greve, Linda


    Knowledge sharing and knowledge transfer are important to knowledge communication. However when groups of knowledge workers engage in knowledge communication activities, it easily turns into mere mechanical information processing despite other ambitions. This article relates literature of knowledge...... communication and knowledge creation to an intervention study in a large Danish food production company. For some time a specific group of employees uttered a wish for knowledge sharing, but it never really happened. The group was observed and submitted to metaphor analysis as well as analysis of co...

  2. Modeling of the time sharing for lecturers

    E. Yu. Shakhova


    Full Text Available In the context of modernization of the Russian system of higher education, it is necessary to analyze the working time of the university lecturers, taking into account both basic job functions as the university lecturer, and others.The mathematical problem is presented for the optimal working time planning for the university lecturers. The review of the documents, native and foreign works on the study is made. Simulation conditions, based on analysis of the subject area, are defined. Models of optimal working time sharing of the university lecturers («the second half of the day» are developed and implemented in the system MathCAD. Optimal solutions have been obtained.Three problems have been solved:1 to find the optimal time sharing for «the second half of the day» in a certain position of the university lecturer;2 to find the optimal time sharing for «the second half of the day» for all positions of the university lecturers in view of the established model of the academic load differentiation;3 to find the volume value of the non-standardized part of time work in the department for the academic year, taking into account: the established model of an academic load differentiation, distribution of the Faculty number for the positions and the optimal time sharing «the second half of the day» for the university lecturers of the department.Examples are given of the analysis results. The practical application of the research: the developed models can be used when planning the working time of an individual professor in the preparation of the work plan of the university department for the academic year, as well as to conduct a comprehensive analysis of the administrative decisions in the development of local university regulations.

  3. Hyperfamiliarity for unknown faces after left lateral temporo-occipital venous infarction: a double dissociation with prosopagnosia.

    Vuilleumier, Patrik; Mohr, Christine; Valenza, Nathalie; Wetzel, Corinne; Landis, Theodor


    Right hemisphere dominance in face processing is well established and unilateral right inferior temporo-occipital damage can result in prosopagnosia. Here, we describe a 21-year-old right-handed woman with acute impairment in face recognition that selectively concerned unfamiliar faces, following a focal left lateral temporo-occipital venous infarct. She was severely impaired in discerning that unknown people seen in everyday life were unfamiliar, although she had no difficulty recognizing familiar people. Thus, she had no prosopagnosia, but abnormal 'hyperfamiliarity' for unknown faces. Her difficulty was not accompanied by delusions or deficits in discrimination, identification or memory for faces. Standard neuropsychological testing showed that her recognition of familiar faces was entirely normal. By contrast, her sense of personally knowing faces was severely impaired when unknown faces evoked weak signals of familiarity based on spurious cues, to the extent that she would misattribute fame to faces that were unknown but to which she had been incidentally exposed on a prior occasion. Priming experiments also revealed that, unlike normal subjects, she made familiarity judgements without accessing semantic identity representations. Moreover, in face recognition tests, she generally showed bias in that she relied more on right-hemisphere strategies to identify global traits and less on left-hemisphere processes compared with healthy subjects. This case provides novel evidence for a differential contribution of the two hemispheres to face recognition. Hyperfamiliarity for unknown faces might arise from an imbalance between reciprocal hemispheric functions in face recognition, with relative hypoactivation of left hemisphere processes but hyperactivation of right-hemisphere processes for retrieving stored associations about people, linking seen faces to representations of affective and personal relevance. Hence, abnormal bias in attributing some personal meaning to

  4. Energy Sharing Framework for Microgrid-Powered Cellular Base Stations

    Farooq, Muhammad Junaid


    Cellular base stations (BSs) are increasingly becoming equipped with renewable energy generators to reduce operational expenditures and carbon footprint of wireless communications. Moreover, advancements in the traditional electricity grid allow two-way power flow and metering that enable the integration of distributed renewable energy generators at BS sites into a microgrid. In this paper, we develop an optimized energy management framework for microgrid-connected cellular BSs that are equipped with renewable energy generators and finite battery storage to minimize energy cost. The BSs share excess renewable energy with others to reduce the dependency on the conventional electricity grid. Three cases are investigated where the renewable energy generation is unknown, perfectly known, and partially known ahead of time. For the partially known case where only the statistics of renewable energy generation are available, stochastic programming is used to achieve a conservative solution. Results show the time varying energy management behaviour of the BSs and the effect of energy sharing between them.

  5. Microbial Dark Matter Phase II: Stepping deeper into unknown territory

    Jarett, Jessica; Dunfield, Peter; Peura, Sari; Wielen, Paul van der; Hedlund, Brian; Elshahed, Mostafa; Kormas, Konstantinos; Stott, Andreas Teske8, Matt; Birkeland, Nils-Kare; Zhang, Chuanlun; Rengefors, Karin; Lindemann, Stephen; Ravin, Nikolai V.; Spear, John; Hallam, Steven; Crowe, Sean; Steele, Jillian; Goudeau, Danielle; Malmstrom, Rex; Kyrpides, Nikos; Stepanauskas, Ramunas; Woyke, Tanja


    Currently available microbial genomes are of limited phylogenetic breadth due to our historical inability to cultivate most microorganisms in the laboratory. The first phase of the Microbial Dark Matter project used single-cell genomics to sequence 201 single cells from uncultivated lineages, and was able to resolve new superphyla and reveal novel metabolic features in bacteria and archaea. However, many fundamental questions about the evolution and function of microbes remain unanswered, and many candidate phyla remain uncharacterized. Phase II of the Microbial Dark Matter project will target candidate phyla with no sequenced representatives at a variety of new sites using a combination of single-cell sequencing and shotgun metagenomics approaches.

  6. Exploring Shared SRAM Tables in FPGAs for Larger LUTs and Higher Degree of Sharing

    Ali Asghar


    Full Text Available In modern SRAM based Field Programmable Gate Arrays, a Look-Up Table (LUT is the principal constituent logic element which can realize every possible Boolean function. However, this flexibility of LUTs comes with a heavy area penalty. A part of this area overhead comes from the increased amount of configuration memory which rises exponentially as the LUT size increases. In this paper, we first present a detailed analysis of a previously proposed FPGA architecture which allows sharing of LUTs memory (SRAM tables among NPN-equivalent functions, to reduce the area as well as the number of configuration bits. We then propose several methods to improve the existing architecture. A new clustering technique has been proposed which packs NPN-equivalent functions together inside a Configurable Logic Block (CLB. We also make use of a recently proposed high performance Boolean matching algorithm to perform NPN classification. To enhance area savings further, we evaluate the feasibility of more than two LUTs sharing the same SRAM table. Consequently, this work explores the SRAM table sharing approach for a range of LUT sizes (4–7, while varying the cluster sizes (4–16. Experimental results on MCNC benchmark circuits set show an overall area reduction of ~7% while maintaining the same critical path delay.

  7. Active learning for ontological event extraction incorporating named entity recognition and unknown word handling.

    Han, Xu; Kim, Jung-jae; Kwoh, Chee Keong


    Biomedical text mining may target various kinds of valuable information embedded in the literature, but a critical obstacle to the extension of the mining targets is the cost of manual construction of labeled data, which are required for state-of-the-art supervised learning systems. Active learning is to choose the most informative documents for the supervised learning in order to reduce the amount of required manual annotations. Previous works of active learning, however, focused on the tasks of entity recognition and protein-protein interactions, but not on event extraction tasks for multiple event types. They also did not consider the evidence of event participants, which might be a clue for the presence of events in unlabeled documents. Moreover, the confidence scores of events produced by event extraction systems are not reliable for ranking documents in terms of informativity for supervised learning. We here propose a novel committee-based active learning method that supports multi-event extraction tasks and employs a new statistical method for informativity estimation instead of using the confidence scores from event extraction systems. Our method is based on a committee of two systems as follows: We first employ an event extraction system to filter potential false negatives among unlabeled documents, from which the system does not extract any event. We then develop a statistical method to rank the potential false negatives of unlabeled documents 1) by using a language model that measures the probabilities of the expression of multiple events in documents and 2) by using a named entity recognition system that locates the named entities that can be event arguments (e.g. proteins). The proposed method further deals with unknown words in test data by using word similarity measures. We also apply our active learning method for the task of named entity recognition. We evaluate the proposed method against the BioNLP Shared Tasks datasets, and show that our method

  8. Analysis of the maximum likelihood channel estimator for OFDM systems in the presence of unknown interference

    Dermoune, Azzouz; Simon, Eric Pierre


    This paper is a theoretical analysis of the maximum likelihood (ML) channel estimator for orthogonal frequency-division multiplexing (OFDM) systems in the presence of unknown interference. The following theoretical results are presented. Firstly, the uniqueness of the ML solution for practical applications, i.e., when thermal noise is present, is analytically demonstrated when the number of transmitted OFDM symbols is strictly greater than one. The ML solution is then derived from the iterative conditional ML (CML) algorithm. Secondly, it is shown that the channel estimate can be described as an algebraic function whose inputs are the initial value and the means and variances of the received samples. Thirdly, it is theoretically demonstrated that the channel estimator is not biased. The second and the third results are obtained by employing oblique projection theory. Furthermore, these results are confirmed by numerical results.

  9. A case of hemophagocytic lymphohistiocytosis presenting as pyrexia of unknown origin

    Indira Madhavan


    Full Text Available Hemophagocytic lymphohistiocytosis (HLH is a potentially fatal hyper inflammatory condition, which occurs as either primary (genetic or secondary (acquired due to impaired or absent function of natural killer cells and cytotoxic cells. Common secondary causes include viral and bacterial infections, autoimmune diseases, and hematological malignancies. Extensive phagocytosis of blood cells by histiocytes in bone marrow, spleen, liver and lymphnodes result in peripheral blood cytopenias, hepatosplenomegaly, and lymphadenopathy. We evaluated a case of pyrexia of unknown origin and found out that he fulfilled the criteria for diagnosing HLH. He was started on immunochemotherapy with etoposide, cyclosporine and steroids, but he succumbed to illness within 2 weeks of treatment. High index of suspicion is needed to diagnose HLH and prompt treatment on diagnosis can be lifesaving.

  10. Mapping of unknown industrial plant using ROS-based navigation mobile robot

    Priyandoko, G.; Ming, T. Y.; Achmad, M. S. H.


    This research examines how humans work with teleoperated unmanned mobile robot inspection in industrial plant area resulting 2D/3D map for further critical evaluation. This experiment focuses on two parts, the way human-robot doing remote interactions using robust method and the way robot perceives the environment surround as a 2D/3D perspective map. ROS (robot operating system) as a tool was utilized in the development and implementation during the research which comes up with robust data communication method in the form of messages and topics. RGBD SLAM performs the visual mapping function to construct 2D/3D map using Kinect sensor. The results showed that the mobile robot-based teleoperated system are successful to extend human perspective in term of remote surveillance in large area of industrial plant. It was concluded that the proposed work is robust solution for large mapping within an unknown construction building.

  11. Computational Approach to Annotating Variants of Unknown Significance in Clinical Next Generation Sequencing.

    Schulz, Wade L; Tormey, Christopher A; Torres, Richard


    Next generation sequencing (NGS) has become a common technology in the clinical laboratory, particularly for the analysis of malignant neoplasms. However, most mutations identified by NGS are variants of unknown clinical significance (VOUS). Although the approach to define these variants differs by institution, software algorithms that predict variant effect on protein function may be used. However, these algorithms commonly generate conflicting results, potentially adding uncertainty to interpretation. In this review, we examine several computational tools used to predict whether a variant has clinical significance. In addition to describing the role of these tools in clinical diagnostics, we assess their efficacy in analyzing known pathogenic and benign variants in hematologic malignancies. Copyright© by the American Society for Clinical Pathology (ASCP).

  12. Neural-network-observer-based optimal control for unknown nonlinear systems using adaptive dynamic programming

    Liu, Derong; Huang, Yuzhu; Wang, Ding; Wei, Qinglai


    In this paper, an observer-based optimal control scheme is developed for unknown nonlinear systems using adaptive dynamic programming (ADP) algorithm. First, a neural-network (NN) observer is designed to estimate system states. Then, based on the observed states, a neuro-controller is constructed via ADP method to obtain the optimal control. In this design, two NN structures are used: a three-layer NN is used to construct the observer which can be applied to systems with higher degrees of nonlinearity and without a priori knowledge of system dynamics, and a critic NN is employed to approximate the value function. The optimal control law is computed using the critic NN and the observer NN. Uniform ultimate boundedness of the closed-loop system is guaranteed. The actor, critic, and observer structures are all implemented in real-time, continuously and simultaneously. Finally, simulation results are presented to demonstrate the effectiveness of the proposed control scheme.

  13. Knowledge sharing in industrial research

    Berends, J.J.


    Over the past decade, the field of organization studies has increasingly focused on knowledge and knowledge processes in organizations. This thesis describes a study of one of those processes, knowledge sharing, in the context of industrial research. Though the attention for knowledge in

  14. Sharing Power in the Classroom.

    Richard-Amato, Patricia


    Suggests that be sharing power in the classroom teachers allow the development of participatory classrooms in which all students can thrive. Examines participatory teaching and critical pedagogy, components of the participatory learning experience, manifestations of participatory teaching, an application of the language experience approach,…

  15. Scalable shared-memory multiprocessing

    Lenoski, Daniel E


    Dr. Lenoski and Dr. Weber have experience with leading-edge research and practical issues involved in implementing large-scale parallel systems. They were key contributors to the architecture and design of the DASH multiprocessor. Currently, they are involved with commercializing scalable shared-memory technology.

  16. The People's Time Sharing System

    Tanenbaum, A.S.; Benson, W.H.


    A set of programs running under a multiprogramming batch operating system on the CDC 6600 which provide remote users with a time sharing service is described. The basis for the system is the ability of a user program to create job control statements during execution, thereby tricking the operating

  17. Job Sharing: One District's Experience.

    Lantz, Mahlon L.


    Describes responses of principals, teachers, and parents to a job sharing program instituted to reduce impact of staff layoffs. Principals were satisfied overall; teachers believed that students benefited from interaction with two instructors; and a majority of parents felt likewise. (TE)

  18. DOE/university reactor sharing

    Young, H.H.


    The objective of the US Department of Energy's program of reactor sharing is to strengthen nuclear science and engineering instruction and nuclear research opportunities in non-reactor-owning colleges and universities. The benefits of the program and need for the continuation of the program in the future are discussed

  19. Information Sharing and International Taxation

    Keen, M.; Ligthart, J.E.


    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  20. Shared breastfeeding in central Africa

    Ramharter, Michael; Chai, Sanders K.; Adegnika, Ayola A.; Klöpfer, Anna; Längin, Matthias; Agnandji, Selidji T.; Oyakhirome, Sunny; Schwarz, Norbert G.; Grobusch, Martin P.; Issifou, Saadon; Kremsner, Peter G.


    In this study, shared breastfeeding is described asa novel risk factor for vertical HIV transmission. This cross-sectional survey conducted in the central African country Gabon found that 40% of lactating mothers also breastfed other children than their own, and as many children were additionally

  1. Car sharing à la carte

    Anaïs Schaeffer


    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  2. Joint estimation of the fractional differentiation orders and the unknown input for linear fractional non-commensurate system

    Belkhatir, Zehor


    This paper deals with the joint estimation of the unknown input and the fractional differentiation orders of a linear fractional order system. A two-stage algorithm combining the modulating functions with a first-order Newton method is applied to solve this estimation problem. First, the modulating functions approach is used to estimate the unknown input for a given fractional differentiation orders. Then, the method is combined with a first-order Newton technique to identify the fractional orders jointly with the input. To show the efficiency of the proposed method, numerical examples illustrating the estimation of the neural activity, considered as input of a fractional model of the neurovascular coupling, along with the fractional differentiation orders are presented in both noise-free and noisy cases.

  3. From shared data to sharing workflow: Merging PACS and teleradiology

    Benjamin, Menashe; Aradi, Yinon; Shreiber, Reuven


    Due to a host of technological, interface, operational and workflow limitations, teleradiology and PACS/RIS were historically developed as separate systems serving different purposes. PACS/RIS handled local radiology storage and workflow management while teleradiology addressed remote access to images. Today advanced PACS/RIS support complete site radiology workflow for attending physicians, whether on-site or remote. In parallel, teleradiology has emerged into a service of providing remote, off-hours, coverage for emergency radiology and to a lesser extent subspecialty reading to subscribing sites and radiology groups. When attending radiologists use teleradiology for remote access to a site, they may share all relevant patient data and participate in the site's workflow like their on-site peers. The operation gets cumbersome and time consuming when these radiologists serve multi-sites, each requiring a different remote access, or when the sites do not employ the same PACS/RIS/Reporting Systems and do not share the same ownership. The least efficient operation is of teleradiology companies engaged in reading for multiple facilities. As these services typically employ non-local radiologists, they are allowed to share some of the available patient data necessary to provide an emergency report but, by enlarge, they do not share the workflow of the sites they serve. Radiology stakeholders usually prefer to have their own radiologists perform all radiology tasks including interpretation of off-hour examinations. It is possible with current technology to create a system that combines the benefits of local radiology services to multiple sites with the advantages offered by adding subspecialty and off-hours emergency services through teleradiology. Such a system increases efficiency for the radiology groups by enabling all users, regardless of location, to work 'local' and fully participate in the workflow of every site. We refer to such a system as SuperPACS.

  4. Digital music and subculture: Sharing files, sharing styles

    Ebare, Sean


    In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around issues of anonymity and trust, identity experimentation, and online communication...

  5. Shared vision promotes family firm performance.

    Neff, John E


    A clear picture of the influential drivers of private family firm performance has proven to be an elusive target. The unique characteristics of private family owned firms necessitate a broader, non-financial approach to reveal firm performance drivers. This research study sought to specify and evaluate the themes that distinguish successful family firms from less successful family firms. In addition, this study explored the possibility that these themes collectively form an effective organizational culture that improves longer-term firm performance. At an organizational level of analysis, research findings identified four significant variables: Shared Vision (PNS), Role Clarity (RCL), Confidence in Management (CON), and Professional Networking (OLN) that positively impacted family firm financial performance. Shared Vision exhibited the strongest positive influence among the significant factors. In addition, Family Functionality (APGAR), the functional integrity of the family itself, exhibited a significant supporting role. Taken together, the variables collectively represent an effective family business culture (EFBC) that positively impacted the long-term financial sustainability of family owned firms. The index of effective family business culture also exhibited potential as a predictive non-financial model of family firm performance.

  6. Shared Vision promotes family firm performance

    John Edward Neff


    Full Text Available A clear picture of the influential drivers of private family firm performance has proven to be an elusive target. The unique characteristics of private family owned firms necessitate a broader, non-financial approach to reveal firm performance drivers. This research study sought to specify and evaluate the themes that distinguish successful family firms from less successful family firms. In addition, this study explored the possibility that these themes collectively form an effective organizational culture that improves longer-term firm performance. At an organizational level of analysis, research findings identified four significant variables: Shared Vision (PNS, Role Clarity (RCL, Confidence in Management (CON, and Professional Networking (OLN that positively impacted family firm financial performance. Shared Vision exhibited the strongest positive influence among the significant factors. In addition, Family Functionality (APGAR, the functional integrity of the family itself exhibited a significant supporting role. Taken together, the variables collectively represent an effective family business culture (EFBC that positively impacted the long-term financial sustainability of family owned firms. The index of effective family business culture also exhibited potential as a predictive non-financial model of family firm performance.

  7. Impulsive synchronization of Markovian jumping randomly coupled neural networks with partly unknown transition probabilities via multiple integral approach.

    Chandrasekar, A; Rakkiyappan, R; Cao, Jinde


    This paper studies the impulsive synchronization of Markovian jumping randomly coupled neural networks with partly unknown transition probabilities via multiple integral approach. The array of neural networks are coupled in a random fashion which is governed by Bernoulli random variable. The aim of this paper is to obtain the synchronization criteria, which is suitable for both exactly known and partly unknown transition probabilities such that the coupled neural network is synchronized with mixed time-delay. The considered impulsive effects can be synchronized at partly unknown transition probabilities. Besides, a multiple integral approach is also proposed to strengthen the Markovian jumping randomly coupled neural networks with partly unknown transition probabilities. By making use of Kronecker product and some useful integral inequalities, a novel Lyapunov-Krasovskii functional was designed for handling the coupled neural network with mixed delay and then impulsive synchronization criteria are solvable in a set of linear matrix inequalities. Finally, numerical examples are presented to illustrate the effectiveness and advantages of the theoretical results. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. The Complete Guide to Job Sharing.

    Hohn, Marcia D.

    This booklet provides information on job sharing that resulted from the research and experience of the Merrimack Valley Job Sharing Project. An overview of the topic considers the need for job sharing, employer benefits, types of jobs shared, job division, benefits, employer costs and savings, financial considerations for job sharers, perspectives…

  9. Discovery of an All-Pervading Previously Unknown Longitudinal Wave

    Wagner, Orvin E.


    In 1988 a new species of longitudinal sound like wave was identified in this laboratory. These waves travel through (dark matter filled) vacuum as well as through ordinary matter. So far as is known these waves always appear as standing waves. The data suggest that they organize plants, organize structures in manipulated granular materials, organize planetary systems, and other structures of the universe. They are likely the basis for the beginnings of life and are closely associated with quantum waves. The repeating structures that they produce suggest that they are a basis for fractal structures. Their velocities appear to be a function of the medium as well as the timing of their sources since quantized velocities have been found. 12 years of data collected in this laboratory suggest that the waves are all pervading but they still interact with ordinary matter. These waves apparently provide for the stability of the solar system and probably the whole universe. They interact with gravity within plants, for example, to provide a basis for a plant's response to gravity. See the Wagner web site.

  10. Discovery of an Important Previously Unknown Longitudinal Wave.

    Wagner, Orvin


    In 1988 a new species of longitudinal sound like wave was identified in this laboratory. These waves travel through (dark matter filled) vacuum as well as through ordinary matter. So far as is known these waves always appear as standing waves. The data suggest that they organize plants, organize structures in manipulated granular materials, organize planetary systems, and other structures of the universe. They are likely the basis for the beginnings of life and are closely associated with quantum waves. The repeating structures that they produce suggest that they are a basis for fractal structures. Their velocities appear to be a function of the medium as well as the timing of their sources since quantized velocities have been found. 12 years of data collected in this laboratory suggest that the waves are all pervading but they still interact with ordinary matter. These waves apparently provide for the stability of the solar system and probably the whole universe. They interact with gravity within plants, for example, to provide a basis for a plant's response to gravity. See the Wagner web site.

  11. The great unknown seven journeys to the frontiers of science

    Du Sautoy, Marcus


    Ever since the dawn of civilization we have been driven by a desire to know—to understand the physical world and the laws of nature. The idea that there might be a limit to human knowledge has inspired and challenged scientists and functioned as a spur to innovation. Now, in this dazzling journey through seven great breakthroughs in our understanding of the world, Marcus du Sautoy invites us to consider the outer reaches of human understanding. Are some things beyond the predictive powers of science? Or are those thorny challenges our next breakthroughs? In 1900, Lord Kelvin—who gave the world telegraph cables and the Second Law of Thermodynamics—pronounced that there was “nothing new to be discovered in physics now.” Then came Einstein. Du Sautoy reminds us that again and again major breakthroughs were ridiculed and dismissed at the time of their discovery. He takes us into the minds of the greats and reveals the fraught circumstances of their discoveries. And he carries us on a whirlwind tour of ...

  12. Risk sharing, public policy and the contribution of Islamic finance

    Hossein Askari


    Full Text Available A major reason for the recurrent episodes of financial instability is the predominance of interest-based debt and leveraging. Financial stability is achievable through risk sharing finance instead of risk shifting that characterizes contemporary finance. A risk sharing system serves the true function of finance as facilitator of real sector activities and avoids the emergence of a “paper economy” where there is gradual decoupling of finance from the real sector. Islamic finance was initially proposed as a profit-loss sharing system, but its core principle is risk sharing. In prohibiting interest-based debt instruments, Islam grounds finance on a strong risk sharing footing. Although still a young industry that has come a long way, it has not managed to develop truly risk-sharing instruments that would allow individuals, households, and firms as well as whole economies to mitigate systematic and un-systematic risks. It is suggested that governments should intervene and issue macro-market instruments to provide their treasuries with a significant source of non-interest rate based financing while promoting risk sharing. Moreover, given that evidence across the world suggests that monetary policy’s transmission mechanism may be impaired, it is suggested that these government issued securities could also impart added potency to monetary policy.

  13. To share or not to share? Expected pros and cons of data sharing in radiological research.

    Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni


    The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.

  14. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.


    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  15. Functional dyspepsia

    Kleibeuker, JH; Thijs, JC


    Purpose of review Functional dyspepsia is a common disorder, most of the time of unknown etiology and with variable pathophysiology. Therapy has been and still is largely empirical. Data from recent studies provide new clues for targeted therapy based on knowledge of etiology and pathophysiologic

  16. Professional SharePoint 2010 Development

    Rizzo, Tom; Fried, Jeff


    Learn to leverage the features of the newest version of SharePoint, in this update to the bestseller. More than simply a portal, SharePoint is Microsoft's popular content management solution for building intranets and Web sites or hosting wikis and blogs. Offering broad coverage on all aspects of development for the SharePoint platform, this comprehensive book shows you exactly what SharePoint does, how to build solutions, and what features are accessible within SharePoint. Written by one of the most recognized names in SharePoint development, Professional SharePoint 2010 Development offers an

  17. Professional SharePoint 2013 administration

    Young, Shane; Klindt, Todd


    SharePoint admin author gurus return to prepare you for working with the new features of SharePoint 2013! The new iteration of SharePoint boasts exciting new features. However, any new version also comes with its fair share of challenges and that's where this book comes in. The team of SharePoint admin gurus returns to presents a fully updated resource that prepares you for making all the new SharePoint 2013 features work right. They cover all of the administration components of SharePoint 2013 in detail, and present a clear understanding of how they affect the role of the adminis


    Ahmad, Nisar; Naveed, Amjad; Naz, Amber


    believe that structural change is an unimportant side effect of the economic development. On the contrary, economists associated with the World Bank and some others posit that growth is brought about by the changes in sectoral composition. The objective of this study is to empirically test...... the relationship between sectoral shares and economic growth by using the panel data for 20 developed countries. The results of the granger causality suggest that both services and agriculture sectors do granger cause economic growth, whereas industrial sector does not granger cause growth. Reverse causality does...... not hold for any of the three sectors. The results of Barro and Non-Barro regressions along with the set of control variables have suggested that services sector is negatively affecting growth, whereas both industrial and agriculture shares are positively affect economic growth....

  19. Privacy in the Sharing Economy

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  20. Designing for Sharing in Local Communities

    Malmborg, Lone; Light, Ann; Fitzpatrick, Geraldine


    The Sharing Economy has brought new attention to the everyday practice of sharing. Digital tools are changing both what we can do together across neighbourhoods and how we think about sharing our time, materials and skills. It is possible to design to boost resource management, economic wellbeing...... and social resilience by fostering sharing practices, but do different designs speak to different priorities in design for sharing?...


    O. Zotsenko


    Full Text Available The paper examines the impact of globalization on the Ukrainian market of shares. Main trends of globalization of world share market are analyzed. The study highlights key elements of the operating share markets of the world leading countries. The research investigates main factors that affect on the level of national market of shares. The findings trace out a number of problems that hinder and distort the role of the Ukrainian share market in capital allocation.

  2. Vernalization and the Chilling Requirement to Exit Bud Dormancy: Shared or Separate Regulation?

    Amy M Brunner


    Full Text Available Similarities have long been recognized between vernalization, the prolonged exposure to cold temperatures that promotes the floral transition in many plants, and the chilling requirement to release bud dormancy in woody plants of temperate climates. In both cases the extended chilling period occurring during winter is used to coordinate developmental events to the appropriate seasonal time. However, whether or not these processes share common regulatory components and molecular mechanisms remain largely unknown. Both gene function and association genetics studies in Populus are beginning to answer this question. In Populus, studies have revealed that orthologs of the antagonistic flowering time genes FT and CEN/TFL1 might have central roles in both processes. We review Populus seasonal shoot development related to dormancy release and the floral transition and evidence for FT/TFL1-mediated regulation of these processes to consider the question of regulatory overlap. In addition, we discuss the potential for and challenges to integrating functional and population genomics studies to uncover the regulatory mechanisms underpinning these processes in woody plant systems.

  3. Bank Share Prices and Profitability

    Daniel Daugaard; Tom Valentine


    This paper considers the influence of economic conditions and financial markets on Australian bank share prices and profitability. It uses time series analysis to obtain an indication of the effectiveness of banks in managing their exposure to interest rates and exchange rates. The results give rise to some comments on the extent to which banks actively manage their exposure to financial and economic variables. The discussion of risk management activities necessarily raises the question of ho...

  4. Knowledge Management for Shared Awareness


    knowledge derived from experiences that can be communicated through mechanisms such as storytelling , debriefing etc., or summarized in databases...patterned on the neural architecture of the brain . Neural nets often consist of a large number of nodes connected by links that transmit signals...that allow speech generation by a computer. Storytelling : The use of stories in organizations as a way of sharing knowledge and helping learning

  5. State cost sharing of training

    Montgomery, J.M.; Flater, D.A.; Hughes, D.R. Sr.; Lubenau, J.O.; Merges, P.J.; Mobley, M.H.; Raglin, K.A.


    In March 1988, The Office of Governmental and Public Affairs (GPA) completed a report (NUREG-1311) entitled, ''Funding the NRC Training Program for States.'' This report responded to a Commission's request for study of NRC's long-standing practice of paying the travel and per diem of state personnel who attend NRC sponsored training. In May 1988, the Chairman endorsed the report in most respects but asked for further study of a cost sharing of travel and per diem costs. As a result, the Director of GPA's State, Local and Indian Tribe Programs (SLITP) established a Task Force comprised of representatives from the Conference of Radiation Control Program Directors, Inc., the Agreement States and the NRC to look at ways that the states can share the costs of NRC training, particularly travel and per diem. At the request of the Director, GPA, the Task Force also looked at related cost and quantity issues associated with the NRC training program for state personnel. This report includes a discussion of NRC and state perspectives on the issue of sharing travel and per diem costs, a discussion of options, and recommendations for likely cost savings and quality of training improvement. 1 ref., 3 figs., 2 tabs

  6. Intravenous thrombolysis in ischemic stroke with unknown onset using CT perfusion.

    Cortijo, E; García-Bermejo, P; Calleja, A I; Pérez-Fernández, S; Gómez, R; del Monte, J M; Reyes, J; Arenillas, J F


    Acute ischemic stroke patients with unclear onset time presenting >4.5 h from last-seen-normal (LSN) time are considered late patients and excluded from i.v. thrombolysis. We aimed to evaluate whether this subgroup of patients is different from patients presenting >4.5 h from a witnessed onset, in terms of eligibility and response to computed tomography perfusion (CTP)-guided i.v. thrombolysis. We prospectively studied consecutive acute non-lacunar middle cerebral artery (MCA) ischemic stroke patients presenting >4.5 h from LSN. All patients underwent multimodal CT and were considered eligible for i.v. thrombolysis according to CTP criteria. Two patient groups were established based on the knowledge of the stroke onset time. We compared the proportion of candidates suitable for intravenous thrombolysis between both groups, and their outcome after thrombolytic therapy. Among 147 MCA ischemic stroke patients presenting >4.5 h from LSN, stroke onset was witnessed in 74 and unknown in 73. Thirty-seven (50%) patients in the first group and 32 (44%) in the second met CTP criteria for thrombolysis (P = 0.7). Baseline variables were comparable between both groups with the exception of age, which was higher in the unclear onset group. The rates of early neurological improvement (54.1% vs 46.9%), 2-h MCA recanalization (43.5% vs 37%), symptomatic hemorrhagic transformation (3% vs 0%) and good 3-month functional outcome (62.2% vs 56.3%) did not differ significantly between both groups. Delayed stroke patients with unknown onset time were no different than patients >4.5 h regarding eligibility and response to CTP-based i.v. thrombolysis. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. Large-Scale Unsupervised Hashing with Shared Structure Learning.

    Liu, Xianglong; Mu, Yadong; Zhang, Danchen; Lang, Bo; Li, Xuelong


    Hashing methods are effective in generating compact binary signatures for images and videos. This paper addresses an important open issue in the literature, i.e., how to learn compact hash codes by enhancing the complementarity among different hash functions. Most of prior studies solve this problem either by adopting time-consuming sequential learning algorithms or by generating the hash functions which are subject to some deliberately-designed constraints (e.g., enforcing hash functions orthogonal to one another). We analyze the drawbacks of past works and propose a new solution to this problem. Our idea is to decompose the feature space into a subspace shared by all hash functions and its complementary subspace. On one hand, the shared subspace, corresponding to the common structure across different hash functions, conveys most relevant information for the hashing task. Similar to data de-noising, irrelevant information is explicitly suppressed during hash function generation. On the other hand, in case that the complementary subspace also contains useful information for specific hash functions, the final form of our proposed hashing scheme is a compromise between these two kinds of subspaces. To make hash functions not only preserve the local neighborhood structure but also capture the global cluster distribution of the whole data, an objective function incorporating spectral embedding loss, binary quantization loss, and shared subspace contribution is introduced to guide the hash function learning. We propose an efficient alternating optimization method to simultaneously learn both the shared structure and the hash functions. Experimental results on three well-known benchmarks CIFAR-10, NUS-WIDE, and a-TRECVID demonstrate that our approach significantly outperforms state-of-the-art hashing methods.

  8. Beginning SharePoint 2010 Administration Windows SharePoint Foundation 2010 and Microsoft SharePoint Server 2010

    Husman, Göran


    Complete coverage on the latest advances in SharePoint 2010 administration. SharePoint 2010 comprises an abundance of new features, and this book shows you how to take advantage of all SharePoint 2010's many improvements. Written by a four-time SharePoint MVP, Beginning SharePoint 2010 Administration begins with a comparison of SharePoint 2010 compared to the previous version and then examines the differences between WSS 4.0 and MSS 2010. Packed with step-by-step instructions, tips and tricks, and real-world examples, this book dives into the basics of how to install, manage, and administrate

  9. DataShare: Empowering Researcher Data Curation

    Stephen Abrams


    Full Text Available Researchers are increasingly being asked to ensure that all products of research activity – not just traditional publications – are preserved and made widely available for study and reuse as a precondition for publication or grant funding, or to conform to disciplinary best practices. In order to conform to these requirements, scholars need effective, easy-to-use tools and services for the long-term curation of their research data. The DataShare service, developed at the University of California, is being used by researchers to: (1 prepare for curation by reviewing best practice recommendations for the acquisition or creation of digital research data; (2 select datasets using intuitive file browsing and drag-and-drop interfaces; (3 describe their data for enhanced discoverability in terms of the DataCite metadata schema; (4 preserve their data by uploading to a public access collection in the UC3 Merritt curation repository; (5 cite their data in terms of persistent and globally-resolvable DOI identifiers; (6 expose their data through registration with well-known abstracting and indexing services and major internet search engines; (7 control the dissemination of their data through enforceable data use agreements; and (8 discover and retrieve datasets of interest through a faceted search and browse environment. Since the widespread adoption of effective data management practices is highly dependent on ease of use and integration into existing individual, institutional, and disciplinary workflows, the emphasis throughout the design and implementation of DataShare is to provide the highest level of curation service with the lowest possible technical barriers to entry by individual researchers. By enabling intuitive, self-service access to data curation functions, DataShare helps to contribute to more widespread adoption of good data curation practices that are critical to open scientific inquiry, discourse, and advancement.

  10. Discrete-time online learning control for a class of unknown nonaffine nonlinear systems using reinforcement learning.

    Yang, Xiong; Liu, Derong; Wang, Ding; Wei, Qinglai


    In this paper, a reinforcement-learning-based direct adaptive control is developed to deliver a desired tracking performance for a class of discrete-time (DT) nonlinear systems with unknown bounded disturbances. We investigate multi-input-multi-output unknown nonaffine nonlinear DT systems and employ two neural networks (NNs). By using Implicit Function Theorem, an action NN is used to generate the control signal and it is also designed to cancel the nonlinearity of unknown DT systems, for purpose of utilizing feedback linearization methods. On the other hand, a critic NN is applied to estimate the cost function, which satisfies the recursive equations derived from heuristic dynamic programming. The weights of both the action NN and the critic NN are directly updated online instead of offline training. By utilizing Lyapunov's direct method, the closed-loop tracking errors and the NN estimated weights are demonstrated to be uniformly ultimately bounded. Two numerical examples are provided to show the effectiveness of the present approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Some Unknown Pages of the Living Organisms' First Orbital Flight

    Malashenkov, D. C.


    The successful creation of ballistic rockets in USSR has allowed at the end of 1953 to make a real task of delivery of a payload into the Earth's orbit. In March 1954 during the meeting in the Academy of Sciences of USSR, the basic research problems conducted by means of artificial satellites of the Earth were determined. In May, 1954 S. Korolev has sent to Government of the USSR the report with the offer of creation the space satellites on the basis of intercontinental ballistic rocket -7 developed by him. It was the first time when the idea about possibility of interplanetary flights was stated in the official document. In August 1954 Council of Ministers of the USSR had ratified the submitted offers and have entrusted to work over scientific and theoretical problems of space flight. In the beginning of 1956 the Korolev's United Design Bureau was officially entrusted the creation and launch of undirected research satellite named "Object D" weighing 1.000-1.400 kg in 1957-1958. The main scientific management and development of scientific equipment was assigned to a commission of the Academy of Sciences of the USSR under the direction of . Keldysh. The measurement of parameters of the atmosphere, corpuscular radiation of the Sun, magnetic fields, space radiation etc. was planned during the "Object D" flight. The successful performance in the middle of 1956 of the second series of launches of geophysical rockets has allowed to gain a large volume of the information about parameters of physiological functions and behavior of animals in conditions of flight. For enlargement of these works the laboratory of V. Yazdovsky in the Institute of aviation medicine was extended to a department, the large group of the new employees, including V. Antipov, . Baevsky, I. Balakhovsky, B. Buylov, . Genin, O. Gazenko, A. Gurdjian, I. Kasyan, A. Kotovskaya, E..Yuganov, . Shepelev and others came to the department. But, owing to the delay of development of the scientific equipment for

  12. Chaotic system optimal tracking using data-based synchronous method with unknown dynamics and disturbances

    Song Ruizhuo; Wei Qinglai


    We develop an optimal tracking control method for chaotic system with unknown dynamics and disturbances. The method allows the optimal cost function and the corresponding tracking control to update synchronously. According to the tracking error and the reference dynamics, the augmented system is constructed. Then the optimal tracking control problem is defined. The policy iteration (PI) is introduced to solve the min-max optimization problem. The off-policy adaptive dynamic programming (ADP) algorithm is then proposed to find the solution of the tracking Hamilton–Jacobi–Isaacs (HJI) equation online only using measured data and without any knowledge about the system dynamics. Critic neural network (CNN), action neural network (ANN), and disturbance neural network (DNN) are used to approximate the cost function, control, and disturbance. The weights of these networks compose the augmented weight matrix, and the uniformly ultimately bounded (UUB) of which is proven. The convergence of the tracking error system is also proven. Two examples are given to show the effectiveness of the proposed synchronous solution method for the chaotic system tracking problem. (paper)

  13. Distributed Optimal Consensus Control for Nonlinear Multiagent System With Unknown Dynamic.

    Zhang, Jilie; Zhang, Huaguang; Feng, Tao


    This paper focuses on the distributed optimal cooperative control for continuous-time nonlinear multiagent systems (MASs) with completely unknown dynamics via adaptive dynamic programming (ADP) technology. By introducing predesigned extra compensators, the augmented neighborhood error systems are derived, which successfully circumvents the system knowledge requirement for ADP. It is revealed that the optimal consensus protocols actually work as the solutions of the MAS differential game. Policy iteration algorithm is adopted, and it is theoretically proved that the iterative value function sequence strictly converges to the solution of the coupled Hamilton-Jacobi-Bellman equation. Based on this point, a novel online iterative scheme is proposed, which runs based on the data sampled from the augmented system and the gradient of the value function. Neural networks are employed to implement the algorithm and the weights are updated, in the least-square sense, to the ideal value, which yields approximated optimal consensus protocols. Finally, a numerical example is given to illustrate the effectiveness of the proposed scheme.

  14. Direct Position Determination of Unknown Signals in the Presence of Multipath Propagation.

    Du, Jianping; Wang, Ding; Yu, Wanting; Yu, Hongyi


    A novel geolocation architecture, termed "Multiple Transponders and Multiple Receivers for Multiple Emitters Positioning System (MTRE)" is proposed in this paper. Existing Direct Position Determination (DPD) methods take advantage of a rather simple channel assumption (line of sight channels with complex path attenuations) and a simplified MUltiple SIgnal Classification (MUSIC) algorithm cost function to avoid the high dimension searching. We point out that the simplified assumption and cost function reduce the positioning accuracy because of the singularity of the array manifold in a multi-path environment. We present a DPD model for unknown signals in the presence of Multi-path Propagation (MP-DPD) in this paper. MP-DPD adds non-negative real path attenuation constraints to avoid the mistake caused by the singularity of the array manifold. The Multi-path Propagation MUSIC (MP-MUSIC) method and the Active Set Algorithm (ASA) are designed to reduce the dimension of searching. A Multi-path Propagation Maximum Likelihood (MP-ML) method is proposed in addition to overcome the limitation of MP-MUSIC in the sense of a time-sensitive application. An iterative algorithm and an approach of initial value setting are given to make the MP-ML time consumption acceptable. Numerical results validate the performances improvement of MP-MUSIC and MP-ML. A closed form of the Cramér-Rao Lower Bound (CRLB) is derived as a benchmark to evaluate the performances of MP-MUSIC and MP-ML.

  15. Recent Patterns in Shared Decision Making for Prostate-Specific Antigen Testing in the United States.

    Fedewa, Stacey A; Gansler, Ted; Smith, Robert; Sauer, Ann Goding; Wender, Richard; Brawley, Otis W; Jemal, Ahmedin


    Previous studies report infrequent use of shared decision making for prostate-specific antigen (PSA) testing. It is unknown whether this pattern has changed recently considering increased emphasis on shared decision making in prostate cancer screening recommendations. Thus, the objective of this study is to examine recent changes in shared decision making. We conducted a retrospective cross-sectional study among men aged 50 years and older in the United States using 2010 and 2015 National Health Interview Survey (NHIS) data (n = 9,598). Changes in receipt of shared decision making were expressed as adjusted prevalence ratios (aPR) and 95% confidence intervals (CI). Analyses were stratified on PSA testing (recent [in the past year] or no testing). Elements of shared decision making assessed included the patient being informed about the advantages only, advantages and disadvantages, and full shared decision making (advantages, disadvantages, and uncertainties). Among men with recent PSA testing, 58.5% and 62.6% reported having received ≥1 element of shared decision making in 2010 and 2015, respectively ( P = .054, aPR = 1.04; 95% CI, 0.98-1.11). Between 2010 and 2015, being told only about the advantages of PSA testing significantly declined (aPR = 0.82; 95% CI, 0.71-0.96) and full shared decision making prevalence significantly increased (aPR = 1.51; 95% CI, 1.28-1.79) in recently tested men. Among men without prior PSA testing, 10% reported ≥1 element of shared decision making, which did not change with time. Between 2010 and 2015, there was no increase in shared decision making among men with recent PSA testing though there was a shift away from only being told about the advantages of PSA testing towards full shared decision making. Many men receiving PSA testing did not receive shared decision making. © 2018 Annals of Family Medicine, Inc.

  16. Shared Psychotic Disorder (Folie à Deux in Turkey

    Buket Cinemre


    Full Text Available Shared psychotic disorder or folie à deux is a rare and relatively unknown syndrome. Large case series are needed to find out and clarify the etiological factors and the phenomenology of shared psychotic disorder by comparing the cases from different society and cultures. In this study, we reviewed all reported cases of shared psychotic disorder that had been published or presented in Turkey since 1962. To reach this aim, we have searched Pubmed/Medline, ScienceDirect, Google Scholar, Ulakbim Turkish Medical Index, Turkish Psychiatric Index databases for published records originating from Turkey. We have also manually searched poster abstract books of congresses held in Turkey between 1962 and 2009. All cases eligible for inclusion into this study have been evaluated one by one and grouped as primary or secondary cases. The features of these cases were investigated for a number of variables including age, sex, educational level, occupation, the presence of shared delusion and hallucinations, diagnosis, management, onset of illness, family history, IQ, social isolation, the nature of the relationship and classification system used for diagnosis. The results have showed that the syndrome is more frequently observed among women, within same family members and between sisters. Social isolation was the most common risk factor in these patients and most patients shared hallucinations with their partners along with their delusions. Several secondary cases required antipsychotic drugs for the treatment of their symptoms. Though these features were inline with literature findings, the present findings from Turkish population were different from previous studies with regards to the presence of olfactory hallucinations, absence of grandiose delusions and the number of affected family members. The results mostly supported the challenges and discussions in western countries. To understand this most pathological form of interpersonal relationships

  17. The Structure-Function Linkage Database.

    Akiva, Eyal; Brown, Shoshana; Almonacid, Daniel E; Barber, Alan E; Custer, Ashley F; Hicks, Michael A; Huang, Conrad C; Lauck, Florian; Mashiyama, Susan T; Meng, Elaine C; Mischel, David; Morris, John H; Ojha, Sunil; Schnoes, Alexandra M; Stryke, Doug; Yunes, Jeffrey M; Ferrin, Thomas E; Holliday, Gemma L; Babbitt, Patricia C


    The Structure-Function Linkage Database (SFLD, is a manually curated classification resource describing structure-function relationships for functionally diverse enzyme superfamilies. Members of such superfamilies are diverse in their overall reactions yet share a common ancestor and some conserved active site features associated with conserved functional attributes such as a partial reaction. Thus, despite their different functions, members of these superfamilies 'look alike', making them easy to misannotate. To address this complexity and enable rational transfer of functional features to unknowns only for those members for which we have sufficient functional information, we subdivide superfamily members into subgroups using sequence information, and lastly into families, sets of enzymes known to catalyze the same reaction using the same mechanistic strategy. Browsing and searching options in the SFLD provide access to all of these levels. The SFLD offers manually curated as well as automatically classified superfamily sets, both accompanied by search and download options for all hierarchical levels. Additional information includes multiple sequence alignments, tab-separated files of functional and other attributes, and sequence similarity networks. The latter provide a new and intuitively powerful way to visualize functional trends mapped to the context of sequence similarity.

  18. The Structure–Function Linkage Database

    Akiva, Eyal; Brown, Shoshana; Almonacid, Daniel E.; Barber, Alan E.; Custer, Ashley F.; Hicks, Michael A.; Huang, Conrad C.; Lauck, Florian; Mashiyama, Susan T.; Meng, Elaine C.; Mischel, David; Morris, John H.; Ojha, Sunil; Schnoes, Alexandra M.; Stryke, Doug; Yunes, Jeffrey M.; Ferrin, Thomas E.; Holliday, Gemma L.; Babbitt, Patricia C.


    The Structure–Function Linkage Database (SFLD, is a manually curated classification resource describing structure–function relationships for functionally diverse enzyme superfamilies. Members of such superfamilies are diverse in their overall reactions yet share a common ancestor and some conserved active site features associated with conserved functional attributes such as a partial reaction. Thus, despite their different functions, members of these superfamilies ‘look alike’, making them easy to misannotate. To address this complexity and enable rational transfer of functional features to unknowns only for those members for which we have sufficient functional information, we subdivide superfamily members into subgroups using sequence information, and lastly into families, sets of enzymes known to catalyze the same reaction using the same mechanistic strategy. Browsing and searching options in the SFLD provide access to all of these levels. The SFLD offers manually curated as well as automatically classified superfamily sets, both accompanied by search and download options for all hierarchical levels. Additional information includes multiple sequence alignments, tab-separated files of functional and other attributes, and sequence similarity networks. The latter provide a new and intuitively powerful way to visualize functional trends mapped to the context of sequence similarity. PMID:24271399

  19. Own or share? - social science's analysis of car sharing

    Harms, S.


    This 339 page book examines the social aspects of car-sharing. Today's traffic system is not sustainable. In spite of its efforts not to restrict individual mobility, politics are showing first signs of ecological restructuring. Politics is, however, continuously trying to find the balance between acceptance and efficiency of the measures it proposes. The introduction of innovative mobility concepts can be very helpful here. These meet a wide range of consumers' wants and needs and can motivate them to change their patterns of behaviour towards a more environment-friendly direction at the same time. Car-sharing is chosen here as an example of such mobility technology. Because of its low entry costs and its fixed costs, this solution can be made use of by a large majority of the population and, according to experience already made, has a high potential for relieving the strain on the environment. It must be guaranteed, however, that a significant proportion of its users gives up ownership of their own cars and that not just 'car-less' people can be won over. The theoretical and empirical analyses of the factors that hinder or promote membership that are presented here show under which conditions this can be achieved

  20. Understanding shared services (Article 1 of 3

    T. N. Van der Linde


    Full Text Available Purpose: Shared services is a viable business model that can be used by organisations to reduce costs and enhance efficiency and effectiveness in the organisation. The purpose of this trilogy of articles is to introduce shared services as a business model, and how to efficiently and effectively manage a shared services business unit. The purpose of the first article in the trilogy, introduces shared services as a business model, defines what shared services is, the transformation required to successfully implement a shared services business model, as well as the benefits that can be derived from implementing a shared services business model. Methodology: A comprehensive literature study was conducted in order to: - Define and describe shared services as a business model, - Compare shared services with centralisation and de-centralisation, - Determine and describe the transformation required to successfully implement shared services. Findings: In the article, a framework is generated to help organisations understand the business concept of shared services. This work has further potential: when applied correctly, there are both tangible and intangible benefits that can be accrued above cost savings. Implications: The findings of this article are important for organisations that are in the process of implementing or have implemented shared services, as it will assist the organisation in determining if shared services is the correct business model for them to implement. Value: This article provides an understanding of shared services and the business environment required to successfully implement a shared services business model. Value created by a shared services business model is further enhanced once the organisation has embarked on the successful implementation of a shared services business model, which is the primary objective of the second article, Implementation and continuous evolution in shared services.