WorldWideScience

Sample records for vectors avoid inflammatory

  1. Avoiding ergodicity and turbulence in R3 vector fields

    International Nuclear Information System (INIS)

    Ancochea, J.M.; Campoamor-Stursberg, R.; Gonzalez-Gascon, F.

    2003-01-01

    We show that analytic R 3 vector fields having the property of being transversal to either analytic functions or foliations F 2 , or parallel to a foliation, are free from ergodicity and turbulence. The absence of turbulence and ergodicity via induced vector fields is also proven

  2. Review of insecticide resistance and behavioral avoidance of vectors of human diseases in Thailand

    Science.gov (United States)

    2013-01-01

    Physiological resistance and behavioral responses of mosquito vectors to insecticides are critical aspects of the chemical-based disease control equation. The complex interaction between lethal, sub-lethal and excitation/repellent ('excito-repellent’) properties of chemicals is typically overlooked in vector management and control programs. The development of “physiological” resistance, metabolic and/or target site modifications, to insecticides has been well documented in many insect groups and disease vectors around the world. In Thailand, resistance in many mosquito populations has developed to all three classes of insecticidal active ingredients currently used for vector control with a majority being synthetic-derived pyrethroids. Evidence of low-grade insecticide resistance requires immediate countermeasures to mitigate further intensification and spread of the genetic mechanisms responsible for resistance. This can take the form of rotation of a different class of chemical, addition of a synergist, mixtures of chemicals or concurrent mosaic application of different classes of chemicals. From the gathered evidence, the distribution and degree of physiological resistance has been restricted in specific areas of Thailand in spite of long-term use of chemicals to control insect pests and disease vectors throughout the country. Most surprisingly, there have been no reported cases of pyrethroid resistance in anopheline populations in the country from 2000 to 2011. The precise reasons for this are unclear but we assume that behavioral avoidance to insecticides may play a significant role in reducing the selection pressure and thus occurrence and spread of insecticide resistance. The review herein provides information regarding the status of physiological resistance and behavioral avoidance of the primary mosquito vectors of human diseases to insecticides in Thailand from 2000 to 2011. PMID:24294938

  3. Autonomous dynamic obstacle avoidance for bacteria-powered microrobots (BPMs with modified vector field histogram.

    Directory of Open Access Journals (Sweden)

    Hoyeon Kim

    Full Text Available In order to broaden the use of microrobots in practical fields, autonomous control algorithms such as obstacle avoidance must be further developed. However, most previous studies of microrobots used manual motion control to navigate past tight spaces and obstacles while very few studies demonstrated the use of autonomous motion. In this paper, we demonstrated a dynamic obstacle avoidance algorithm for bacteria-powered microrobots (BPMs using electric field in fluidic environments. A BPM consists of an artificial body, which is made of SU-8, and a high dense layer of harnessed bacteria. BPMs can be controlled using externally applied electric fields due to the electrokinetic property of bacteria. For developing dynamic obstacle avoidance for BPMs, a kinematic model of BPMs was utilized to prevent collision and a finite element model was used to characteristic the deformation of an electric field near the obstacle walls. In order to avoid fast moving obstacles, we modified our previously static obstacle avoidance approach using a modified vector field histogram (VFH method. To validate the advanced algorithm in experiments, magnetically controlled moving obstacles were used to intercept the BPMs as the BPMs move from the initial position to final position. The algorithm was able to successfully guide the BPMs to reach their respective goal positions while avoiding the dynamic obstacles.

  4. Autonomous dynamic obstacle avoidance for bacteria-powered microrobots (BPMs) with modified vector field histogram.

    Science.gov (United States)

    Kim, Hoyeon; Cheang, U Kei; Kim, Min Jun

    2017-01-01

    In order to broaden the use of microrobots in practical fields, autonomous control algorithms such as obstacle avoidance must be further developed. However, most previous studies of microrobots used manual motion control to navigate past tight spaces and obstacles while very few studies demonstrated the use of autonomous motion. In this paper, we demonstrated a dynamic obstacle avoidance algorithm for bacteria-powered microrobots (BPMs) using electric field in fluidic environments. A BPM consists of an artificial body, which is made of SU-8, and a high dense layer of harnessed bacteria. BPMs can be controlled using externally applied electric fields due to the electrokinetic property of bacteria. For developing dynamic obstacle avoidance for BPMs, a kinematic model of BPMs was utilized to prevent collision and a finite element model was used to characteristic the deformation of an electric field near the obstacle walls. In order to avoid fast moving obstacles, we modified our previously static obstacle avoidance approach using a modified vector field histogram (VFH) method. To validate the advanced algorithm in experiments, magnetically controlled moving obstacles were used to intercept the BPMs as the BPMs move from the initial position to final position. The algorithm was able to successfully guide the BPMs to reach their respective goal positions while avoiding the dynamic obstacles.

  5. Anxiety, not anger, induces inflammatory activity: An avoidance/approach model of immune system activation.

    Science.gov (United States)

    Moons, Wesley G; Shields, Grant S

    2015-08-01

    Psychological stressors reliably trigger systemic inflammatory activity as indexed by levels of proinflammatory cytokines. This experiment demonstrates that one's specific emotional reaction to a stressor may be a significant determinant of whether an inflammatory reaction occurs in response to that stressor. Based on extant correlational evidence and theory, a causal approach was used to determine whether an avoidant emotion (anxiety) triggers more inflammatory activity than an approach emotion (anger). In an experimental design (N = 40), a 3-way Emotion Condition × Time × Analyte interaction revealed that a writing-based anxiety induction, but not a writing-based anger induction, increased mean levels of interferon-γ (IFN- γ) and interleukin-1β (IL-1β), but not interleukin-6 (IL-6) in oral mucous, F(2, 54) = 4.64, p = .01, ηp(²) = .15. Further, self-reported state anxiety predicted elevated levels of proinflammatory cytokines, all ΔR(²) >.06, ps emotions can differentially cause inflammatory activity and support a theoretical model explaining these effects based on the avoidance or approach motivations associated with emotions. (c) 2015 APA, all rights reserved).

  6. Two Hop Adaptive Vector Based Quality Forwarding for Void Hole Avoidance in Underwater WSNs.

    Science.gov (United States)

    Javaid, Nadeem; Ahmed, Farwa; Wadud, Zahid; Alrajeh, Nabil; Alabed, Mohamad Souheil; Ilahi, Manzoor

    2017-08-01

    Underwater wireless sensor networks (UWSNs) facilitate a wide range of aquatic applications in various domains. However, the harsh underwater environment poses challenges like low bandwidth, long propagation delay, high bit error rate, high deployment cost, irregular topological structure, etc. Node mobility and the uneven distribution of sensor nodes create void holes in UWSNs. Void hole creation has become a critical issue in UWSNs, as it severely affects the network performance. Avoiding void hole creation benefits better coverage over an area, less energy consumption in the network and high throughput. For this purpose, minimization of void hole probability particularly in local sparse regions is focused on in this paper. The two-hop adaptive hop by hop vector-based forwarding (2hop-AHH-VBF) protocol aims to avoid the void hole with the help of two-hop neighbor node information. The other protocol, quality forwarding adaptive hop by hop vector-based forwarding (QF-AHH-VBF), selects an optimal forwarder based on the composite priority function. QF-AHH-VBF improves network good-put because of optimal forwarder selection. QF-AHH-VBF aims to reduce void hole probability by optimally selecting next hop forwarders. To attain better network performance, mathematical problem formulation based on linear programming is performed. Simulation results show that by opting these mechanisms, significant reduction in end-to-end delay and better throughput are achieved in the network.

  7. Avoidance behavior to essential oils by Anopheles minimus, a malaria vector in Thailand

    Science.gov (United States)

    Excito-repellency tests were used to characterize behavioral responses of laboratory colonized Anopheles minimus, a malaria vector in Thailand, using four essential oils, citronella (Cymbopogom nadus), hairy basil (Ocimum americanum), sweet basil (Ocimum basilicum), vetiver (Vetiveria zizanioides), ...

  8. RelB activation in anti-inflammatory decidual endothelial cells: a master plan to avoid pregnancy failure?

    Science.gov (United States)

    Masat, Elisa; Gasparini, Chiara; Agostinis, Chiara; Bossi, Fleur; Radillo, Oriano; De Seta, Francesco; Tamassia, Nicola; Cassatella, Marco A; Bulla, Roberta

    2015-10-14

    It is known that excessive inflammation at fetal-maternal interface is a key contributor in a compromised pregnancy. Female genital tract is constantly in contact with microorganisms and several strategies must be adopted to avoid pregnancy failure. Decidual endothelial cells (DECs) lining decidual microvascular vessels are the first cells that interact with pro-inflammatory stimuli released into the environment by microorganisms derived from gestational tissues or systemic circulation. Here, we show that DECs are hypo-responsive to LPS stimulation in terms of IL-6, CXCL8 and CCL2 production. Our results demonstrate that DECs express low levels of TLR4 and are characterized by a strong constitutive activation of the non-canonical NF-κB pathway and a low responsiveness of the canonical pathway to LPS. In conclusion, DECs show a unique hypo-responsive phenotype to the pro-inflammatory stimulus LPS in order to control the inflammatory response at feto-maternal interface.

  9. Peripheral non-viral MIDGE vector-driven delivery of β-endorphin in inflammatory pain

    Directory of Open Access Journals (Sweden)

    Busch Melanie

    2009-12-01

    Full Text Available Abstract Background Leukocytes infiltrating inflamed tissue produce and release opioid peptides such as β-endorphin, which activate opioid receptors on peripheral terminals of sensory nerves resulting in analgesia. Gene therapy is an attractive strategy to enhance continuous production of endogenous opioids. However, classical viral and plasmid vectors for gene delivery are hampered by immunogenicity, recombination, oncogene activation, anti-bacterial antibody production or changes in physiological gene expression. Non-viral, non-plasmid minimalistic, immunologically defined gene expression (MIDGE vectors may overcome these problems as they carry only elements needed for gene transfer. Here, we investigated the effects of a nuclear localization sequence (NLS-coupled MIDGE encoding the β-endorphin precursor proopiomelanocortin (POMC on complete Freund's adjuvant-induced inflammatory pain in rats. Results POMC-MIDGE-NLS injected into inflamed paws appeared to be taken up by leukocytes resulting in higher concentrations of β-endorphin in these cells. POMC-MIDGE-NLS treatment reversed enhanced mechanical sensitivity compared with control MIDGE-NLS. However, both effects were moderate, not always statistically significant or directly correlated with each other. Also, the anti-hyperalgesic actions could not be increased by enhancing β-endorphin secretion or by modifying POMC-MIDGE-NLS to code for multiple copies of β-endorphin. Conclusion Although MIDGE vectors circumvent side-effects associated with classical viral and plasmid vectors, the current POMC-MIDGE-NLS did not result in reliable analgesic effectiveness in our pain model. This was possibly associated with insufficient and variable efficacy in transfection and/or β-endorphin production. Our data point at the importance of the reproducibility of gene therapy strategies for the control of chronic pain.

  10. The pro-inflammatory effects of platelet contamination in plasma and mitigation strategies for avoidance

    Science.gov (United States)

    Bercovitz, R. S.; Kelher, M. R.; Khan, S. Y.; Land, K. J.; Berry, T. H.; Silliman, C. C.

    2013-01-01

    Background and Objectives Plasma and platelet concentrates are disproportionately implicated in transfusion-related acute lung injury (TRALI). Platelet-derived pro-inflammatory mediators, including soluble CD40 ligand (sCD40L), accumulate during storage. We hypothesized that platelet contamination induces sCD40L generation that causes neutrophil [polymorphonuclear leucocyte (PMN)] priming and PMN-mediated cytotoxicity. Materials and Methods Plasma was untreated, centrifuged (12 500 g) or separated from leucoreduced whole blood (WBLR) prior to freezing. Platelet counts and sCD40L concentrations were measured 1–5 days post-thaw. The plasma was assayed for PMN priming activity and was used in a two-event in vitro model of PMN-mediated human pulmonary microvascular endothelial cell (HMVEC) cytotoxicity. Results Untreated plasma contained 42 ± 4.2 × 103/μl platelets, which generated sCD40L accumulation (1.6-eight-fold vs. controls). Priming activity and HMVEC cytotoxicity were directly proportional to sCD40L concentration. WBLR and centrifugation reduced platelet and sCD40L contamination, abrogating the pro-inflammatory potential. Conclusion Platelet contamination causes sCD40L accumulation in stored plasma that may contribute to TRALI. Platelet reduction is potentially the first TRALI mitigation effort in plasma manufacturing. PMID:22092073

  11. Vectors

    DEFF Research Database (Denmark)

    Boeriis, Morten; van Leeuwen, Theo

    2017-01-01

    should be taken into account in discussing ‘reactions’, which Kress and van Leeuwen link only to eyeline vectors. Finally, the question can be raised as to whether actions are always realized by vectors. Drawing on a re-reading of Rudolf Arnheim’s account of vectors, these issues are outlined......This article revisits the concept of vectors, which, in Kress and van Leeuwen’s Reading Images (2006), plays a crucial role in distinguishing between ‘narrative’, action-oriented processes and ‘conceptual’, state-oriented processes. The use of this concept in image analysis has usually focused...

  12. Joint capsule treatment with enkephalin-encoding HSV-1 recombinant vector reduces inflammatory damage and behavioural sequelae in rat CFA monoarthritis.

    Science.gov (United States)

    Lu, Ying; McNearney, Terry A; Wilson, Steven P; Yeomans, David C; Westlund, Karin N

    2008-03-01

    This study assessed enkephalin expression induced by intra-articular application of recombinant, enkephalin-encoding herpes virus (HSV-1) and the impact of expression on nociceptive behaviours and synovial lining inflammation in arthritic rats. Replication-conditional HSV-1 recombinant vectors with cDNA encoding preproenkephalin (HSV-ENK), or control transgene beta-galactosidase cDNA (HSV-beta-gal; control) were injected into knee joints with complete Freund's adjuvant (CFA). Joint temperatures, circumferences and nociceptive behaviours were monitored on days 0, 7, 14 and 21 post CFA and vector treatments. Lumbar (L4-6) dorsal root ganglia (DRG) and spinal cords were immunostained for met-enkephalin (met-ENK), beta-gal, HSV-1 proteins and Fos. Joint tissues were immunostained for met-ENK, HSV-1 proteins, and inflammatory mediators Regulated on Activation, Normal T-cell Expressed and Secreted (RANTES) and cyclo-oxygenase-2, or stained with haematoxylin and eosin for histopathology. Compared to exuberant synovial hypertrophy and inflammatory cell infiltration seen in arthritic rats treated with CFA only or CFA and HSV-beta-gal, the CFA- and HSV-ENK-treated arthritic rats had: (i) striking preservation of synovial membrane cytoarchitecture with minimal inflammatory cell infiltrates; (ii) significantly improved nociceptive behavioural responses to mechanical and thermal stimuli; (iii) normalized Fos staining in lumbar dorsal horn; and (iv) significantly increased met-ENK staining in ipsilateral synovial tissue, lumbar DRG and spinal cord. The HSV-1 and transgene product expression were confined to ipsilateral lumbar DRG (HSV-1, met-ENK, beta-gal). Only transgene product (met-ENK and beta-gal) was seen in lumbar spinal cord sections. Targeted delivery of enkephalin-encoding HSV-1 vector generated safe, sustained opioid-induced analgesia with protective anti-inflammatory blunting in rat inflammatory arthritis.

  13. Non-invasive classification of severe sepsis and systemic inflammatory response syndrome using a nonlinear support vector machine: a preliminary study

    International Nuclear Information System (INIS)

    Tang, Collin H H; Savkin, Andrey V; Chan, Gregory S H; Middleton, Paul M; Bishop, Sarah; Lovell, Nigel H

    2010-01-01

    Sepsis has been defined as the systemic response to infection in critically ill patients, with severe sepsis and septic shock representing increasingly severe stages of the same disease. Based on the non-invasive cardiovascular spectrum analysis, this paper presents a pilot study on the potential use of the nonlinear support vector machine (SVM) in the classification of the sepsis continuum into severe sepsis and systemic inflammatory response syndrome (SIRS) groups. 28 consecutive eligible patients attending the emergency department with presumptive diagnoses of sepsis syndrome have participated in this study. Through principal component analysis (PCA), the first three principal components were used to construct the SVM feature space. The SVM classifier with a fourth-order polynomial kernel was found to have a better overall performance compared with the other SVM classifiers, showing the following classification results: sensitivity = 94.44%, specificity = 62.50%, positive predictive value = 85.00%, negative predictive value = 83.33% and accuracy = 84.62%. Our classification results suggested that the combinatory use of cardiovascular spectrum analysis and the proposed SVM classification of autonomic neural activity is a potentially useful clinical tool to classify the sepsis continuum into two distinct pathological groups of varying sepsis severity

  14. Avoiding Ticks

    Science.gov (United States)

    ... ticks that bite humans How ticks spread disease Diseases transmitted by ticks Trends in tickborne diseases Tickborne diseases ... Emerging and Zoonotic Infectious Diseases (NCEZID) Division of Vector-Borne Diseases (DVBD) Email Recommend Tweet YouTube Instagram Listen Watch ...

  15. Silk fibroin nanoparticles constitute a vector for controlled release of resveratrol in an experimental model of inflammatory bowel disease in rats

    Directory of Open Access Journals (Sweden)

    Lozano-Pérez AA

    2014-09-01

    Full Text Available Antonio Abel Lozano-Pérez,1 Alba Rodriguez-Nogales,2 Víctor Ortiz-Cullera,1 Francesca Algieri,2 José Garrido-Mesa,2 Pedro Zorrilla,2 M Elena Rodriguez-Cabezas,2 Natividad Garrido-Mesa,2 M Pilar Utrilla,2 Laura De Matteis,3 Jesús Martínez de la Fuente,3 José Luis Cenis,1 Julio Gálvez2 1Instituto Murciano de Investigación y Desarrollo Agrario y Alimentario, Murcia, Spain; 2Centro de Investigaciones Biomédicas en Red – Enfermedades Hepáticas y Digestivas, Department of Pharmacology, ibs Granada, Center for Biomedical Research, University of Granada, Granada, Spain; 3Instituto de Nanociencia de Aragón, Universidad de Zaragoza, Zaragoza, Spain Purpose: We aimed to evaluate the intestinal anti-inflammatory properties of silk fibroin nanoparticles, around 100 nm in size, when loaded with the stilbene compound resveratrol, in an experimental model of rat colitis. Methods: Nanoparticles were loaded with resveratrol by adsorption. The biological effects of the resveratrol-loaded nanoparticles were tested both in vitro, in a cell culture of RAW 264.7 cells (mouse macrophages, and in vivo, in the trinitrobenzenesulfonic acid model of rat colitis, when administered intracolonically.Results: The resveratrol liberation in 1× phosphate-buffered saline (PBS; pH 7.4 was characterized by fast liberation, reaching the solubility limit in 3 hours, which was maintained over a period of 80 hours. The in vitro assays revealed immunomodulatory properties exerted by these resveratrol-loaded nanoparticles since they promoted macrophage activity in basal conditions and inhibited this activity when stimulated with lipopolysaccharide. The in vivo experiments showed that after evaluation of the macroscopic symptoms, inflammatory markers, and intestinal barrier function, the fibroin nanoparticles loaded with resveratrol had a better effect than the single treatments, being similar to that produced by the glucocorticoid dexamethasone. Conclusion: Silk

  16. Vector analysis

    CERN Document Server

    Newell, Homer E

    2006-01-01

    When employed with skill and understanding, vector analysis can be a practical and powerful tool. This text develops the algebra and calculus of vectors in a manner useful to physicists and engineers. Numerous exercises (with answers) not only provide practice in manipulation but also help establish students' physical and geometric intuition in regard to vectors and vector concepts.Part I, the basic portion of the text, consists of a thorough treatment of vector algebra and the vector calculus. Part II presents the illustrative matter, demonstrating applications to kinematics, mechanics, and e

  17. About vectors

    CERN Document Server

    Hoffmann, Banesh

    1975-01-01

    From his unusual beginning in ""Defining a vector"" to his final comments on ""What then is a vector?"" author Banesh Hoffmann has written a book that is provocative and unconventional. In his emphasis on the unresolved issue of defining a vector, Hoffmann mixes pure and applied mathematics without using calculus. The result is a treatment that can serve as a supplement and corrective to textbooks, as well as collateral reading in all courses that deal with vectors. Major topics include vectors and the parallelogram law; algebraic notation and basic ideas; vector algebra; scalars and scalar p

  18. Elementary vectors

    CERN Document Server

    Wolstenholme, E Œ

    1978-01-01

    Elementary Vectors, Third Edition serves as an introductory course in vector analysis and is intended to present the theoretical and application aspects of vectors. The book covers topics that rigorously explain and provide definitions, principles, equations, and methods in vector analysis. Applications of vector methods to simple kinematical and dynamical problems; central forces and orbits; and solutions to geometrical problems are discussed as well. This edition of the text also provides an appendix, intended for students, which the author hopes to bridge the gap between theory and appl

  19. Avoidance-related EEG asymmetry predicts circulating interleukin-6.

    Science.gov (United States)

    Shields, Grant S; Moons, Wesley G

    2016-03-01

    Recent research has linked avoidance-oriented motivational states to elevated pro-inflammatory cytokine levels. According to one of many theories regarding the association between avoidance and cytokine levels, because the evolutionarily basic avoidance system may be activated when an organism is threatened or overwhelmed, an associated inflammatory response may be adaptive for dealing with potential injury in such threatening situations. To examine this hypothesis, we tested whether the neural correlate of avoidance motivation associates with baseline levels of the circulating pro-inflammatory cytokine interleukin-6 (IL-6). Controlling for covariates, greater resting neural activity in the right frontal cortex relative to the left frontal cortex-the neural correlate of avoidance motivation-was associated with baseline IL-6. These results thus support the hypothesis that the avoidance motivational system may be closely linked to systemic inflammatory activity. (c) 2016 APA, all rights reserved).

  20. Vector analysis

    CERN Document Server

    Brand, Louis

    2006-01-01

    The use of vectors not only simplifies treatments of differential geometry, mechanics, hydrodynamics, and electrodynamics, but also makes mathematical and physical concepts more tangible and easy to grasp. This text for undergraduates was designed as a short introductory course to give students the tools of vector algebra and calculus, as well as a brief glimpse into these subjects' manifold applications. The applications are developed to the extent that the uses of the potential function, both scalar and vector, are fully illustrated. Moreover, the basic postulates of vector analysis are brou

  1. Vector velocimeter

    DEFF Research Database (Denmark)

    2012-01-01

    The present invention relates to a compact, reliable and low-cost vector velocimeter for example for determining velocities of particles suspended in a gas or fluid flow, or for determining velocity, displacement, rotation, or vibration of a solid surface, the vector velocimeter comprising a laser...

  2. Cloning vector

    Science.gov (United States)

    Guilfoyle, Richard A.; Smith, Lloyd M.

    1994-01-01

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site.

  3. Cloning vector

    Science.gov (United States)

    Guilfoyle, R.A.; Smith, L.M.

    1994-12-27

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site. 2 figures.

  4. Equivalent Vectors

    Science.gov (United States)

    Levine, Robert

    2004-01-01

    The cross-product is a mathematical operation that is performed between two 3-dimensional vectors. The result is a vector that is orthogonal or perpendicular to both of them. Learning about this for the first time while taking Calculus-III, the class was taught that if AxB = AxC, it does not necessarily follow that B = C. This seemed baffling. The…

  5. Vector geometry

    CERN Document Server

    Robinson, Gilbert de B

    2011-01-01

    This brief undergraduate-level text by a prominent Cambridge-educated mathematician explores the relationship between algebra and geometry. An elementary course in plane geometry is the sole requirement for Gilbert de B. Robinson's text, which is the result of several years of teaching and learning the most effective methods from discussions with students. Topics include lines and planes, determinants and linear equations, matrices, groups and linear transformations, and vectors and vector spaces. Additional subjects range from conics and quadrics to homogeneous coordinates and projective geom

  6. Scalar and vector Galileons

    International Nuclear Information System (INIS)

    Rodríguez, Yeinzon; Navarro, Andrés A.

    2017-01-01

    An alternative for the construction of fundamental theories is the introduction of Galileons. These are fields whose action leads to non higher than second-order equations of motion. As this is a necessary but not sufficient condition to make the Hamiltonian bounded from below, as long as the action is not degenerate, the Galileon construction is a way to avoid pathologies both at the classical and quantum levels. Galileon actions are, therefore, of great interest in many branches of physics, specially in high energy physics and cosmology. This proceedings contribution presents the generalities of the construction of both scalar and vector Galileons following two different but complimentary routes. (paper)

  7. VECTOR INTEGRATION

    NARCIS (Netherlands)

    Thomas, E. G. F.

    2012-01-01

    This paper deals with the theory of integration of scalar functions with respect to a measure with values in a, not necessarily locally convex, topological vector space. It focuses on the extension of such integrals from bounded measurable functions to the class of integrable functions, proving

  8. An introduction to vectors, vector operators and vector analysis

    CERN Document Server

    Joag, Pramod S

    2016-01-01

    Ideal for undergraduate and graduate students of science and engineering, this book covers fundamental concepts of vectors and their applications in a single volume. The first unit deals with basic formulation, both conceptual and theoretical. It discusses applications of algebraic operations, Levi-Civita notation, and curvilinear coordinate systems like spherical polar and parabolic systems and structures, and analytical geometry of curves and surfaces. The second unit delves into the algebra of operators and their types and also explains the equivalence between the algebra of vector operators and the algebra of matrices. Formulation of eigen vectors and eigen values of a linear vector operator are elaborated using vector algebra. The third unit deals with vector analysis, discussing vector valued functions of a scalar variable and functions of vector argument (both scalar valued and vector valued), thus covering both the scalar vector fields and vector integration.

  9. Neuromorphic UAS Collision Avoidance

    Data.gov (United States)

    National Aeronautics and Space Administration — Collision avoidance for unmanned aerial systems (UAS) traveling at high relative speeds is a challenging task. It requires both the detection of a possible collision...

  10. Shedding light on inflammatory pseudotumor in children: spotlight on inflammatory myofibroblastic tumor

    Energy Technology Data Exchange (ETDEWEB)

    Lai, Lillian M.; Kao, Simon C.S.; Moritani, Toshio; Clark, Eve; Ishigami, Kousei; Sato, Yutaka [University of Iowa Hospitals and Clinics, Department of Radiology, Carver College of Medicine, Iowa City, IA (United States); McCarville, M.B. [St. Jude Children' s Research Hospital, Department of Radiology, Memphis, TN (United States); Kirby, Patricia [University of Iowa Hospitals and Clinics, Department of Pathology, Carver College of Medicine, Iowa City, IA (United States); Bahrami, Armita [St. Jude Children' s Research Hospital, Department of Pathology, Memphis, TN (United States)

    2015-11-15

    Inflammatory pseudotumor is a generic term used to designate a heterogeneous group of inflammatory mass-forming lesions histologically characterized by myofibroblastic proliferation with chronic inflammatory infiltrate. Inflammatory pseudotumor is multifactorial in etiology and generally benign, but it is often mistaken for malignancy given its aggressive appearance. It can occur throughout the body and is seen in all age groups. Inflammatory pseudotumor has been described in the literature by many organ-specific names, resulting in confusion. Recently within this generic category of inflammatory pseudotumor, inflammatory myofibroblastic tumor has emerged as a distinct entity and is now recognized as a fibroblastic/myofibroblastic neoplasm with intermediate biological potential and occurring mostly in children. We present interesting pediatric cases of inflammatory myofibroblastic tumors given this entity's tendency to occur in children. Familiarity and knowledge of the imaging features of inflammatory pseudotumor can help in making an accurate diagnosis, thereby avoiding unnecessary radical surgery. (orig.)

  11. Reactive Collision Avoidance Algorithm

    Science.gov (United States)

    Scharf, Daniel; Acikmese, Behcet; Ploen, Scott; Hadaegh, Fred

    2010-01-01

    The reactive collision avoidance (RCA) algorithm allows a spacecraft to find a fuel-optimal trajectory for avoiding an arbitrary number of colliding spacecraft in real time while accounting for acceleration limits. In addition to spacecraft, the technology can be used for vehicles that can accelerate in any direction, such as helicopters and submersibles. In contrast to existing, passive algorithms that simultaneously design trajectories for a cluster of vehicles working to achieve a common goal, RCA is implemented onboard spacecraft only when an imminent collision is detected, and then plans a collision avoidance maneuver for only that host vehicle, thus preventing a collision in an off-nominal situation for which passive algorithms cannot. An example scenario for such a situation might be when a spacecraft in the cluster is approaching another one, but enters safe mode and begins to drift. Functionally, the RCA detects colliding spacecraft, plans an evasion trajectory by solving the Evasion Trajectory Problem (ETP), and then recovers after the collision is avoided. A direct optimization approach was used to develop the algorithm so it can run in real time. In this innovation, a parameterized class of avoidance trajectories is specified, and then the optimal trajectory is found by searching over the parameters. The class of trajectories is selected as bang-off-bang as motivated by optimal control theory. That is, an avoiding spacecraft first applies full acceleration in a constant direction, then coasts, and finally applies full acceleration to stop. The parameter optimization problem can be solved offline and stored as a look-up table of values. Using a look-up table allows the algorithm to run in real time. Given a colliding spacecraft, the properties of the collision geometry serve as indices of the look-up table that gives the optimal trajectory. For multiple colliding spacecraft, the set of trajectories that avoid all spacecraft is rapidly searched on

  12. Avoiding the Flu

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Flu Avoiding the Flu Past Issues / Fall 2009 Table of Contents Children ... should still get the 2009 H1N1 vaccine. H1N1 Flu: Who Should Be Vaccinated First The Centers for ...

  13. Helping Students Avoid Plagiarism.

    Science.gov (United States)

    Wilhoit, Stephen

    1994-01-01

    Discusses how and why college students commit plagiarism, suggesting techniques that instructors can use to help student avoid plagiarism. Instructors should define and discuss plagiarism thoroughly; discuss hypothetical cases; review the conventions of quoting and documenting material; require multiple drafts of essays; and offer responses…

  14. Human pathogen avoidance adaptations

    NARCIS (Netherlands)

    Tybur, J.M.; Lieberman, D.

    2016-01-01

    Over the past few decades, researchers have become increasingly interested in the adaptations guiding the avoidance of disease-causing organisms. Here we discuss the latest developments in this area, including a recently developed information-processing model of the adaptations underlying pathogen

  15. Raster images vectorization system

    OpenAIRE

    Genytė, Jurgita

    2006-01-01

    The problem of raster images vectorization was analyzed and researched in this work. Existing vectorization systems are quite expensive, the results are inaccurate, and the manual vectorization of a large number of drafts is impossible. That‘s why our goal was to design and develop a new raster images vectorization system using our suggested automatic vectorization algorithm and the way to record results in a new universal vectorial file format. The work consists of these main parts: analysis...

  16. Avoidable waste management costs

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP.

  17. Avoidable waste management costs

    International Nuclear Information System (INIS)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP

  18. Kochen-Specker vectors

    International Nuclear Information System (INIS)

    Pavicic, Mladen; Merlet, Jean-Pierre; McKay, Brendan; Megill, Norman D

    2005-01-01

    We give a constructive and exhaustive definition of Kochen-Specker (KS) vectors in a Hilbert space of any dimension as well as of all the remaining vectors of the space. KS vectors are elements of any set of orthonormal states, i.e., vectors in an n-dimensional Hilbert space, H n , n≥3, to which it is impossible to assign 1s and 0s in such a way that no two mutually orthogonal vectors from the set are both assigned 1 and that not all mutually orthogonal vectors are assigned 0. Our constructive definition of such KS vectors is based on algorithms that generate MMP diagrams corresponding to blocks of orthogonal vectors in R n , on algorithms that single out those diagrams on which algebraic (0)-(1) states cannot be defined, and on algorithms that solve nonlinear equations describing the orthogonalities of the vectors by means of statistically polynomially complex interval analysis and self-teaching programs. The algorithms are limited neither by the number of dimensions nor by the number of vectors. To demonstrate the power of the algorithms, all four-dimensional KS vector systems containing up to 24 vectors were generated and described, all three-dimensional vector systems containing up to 30 vectors were scanned, and several general properties of KS vectors were found

  19. Vector regression introduced

    Directory of Open Access Journals (Sweden)

    Mok Tik

    2014-06-01

    Full Text Available This study formulates regression of vector data that will enable statistical analysis of various geodetic phenomena such as, polar motion, ocean currents, typhoon/hurricane tracking, crustal deformations, and precursory earthquake signals. The observed vector variable of an event (dependent vector variable is expressed as a function of a number of hypothesized phenomena realized also as vector variables (independent vector variables and/or scalar variables that are likely to impact the dependent vector variable. The proposed representation has the unique property of solving the coefficients of independent vector variables (explanatory variables also as vectors, hence it supersedes multivariate multiple regression models, in which the unknown coefficients are scalar quantities. For the solution, complex numbers are used to rep- resent vector information, and the method of least squares is deployed to estimate the vector model parameters after transforming the complex vector regression model into a real vector regression model through isomorphism. Various operational statistics for testing the predictive significance of the estimated vector parameter coefficients are also derived. A simple numerical example demonstrates the use of the proposed vector regression analysis in modeling typhoon paths.

  20. VectorBase

    Data.gov (United States)

    U.S. Department of Health & Human Services — VectorBase is a Bioinformatics Resource Center for invertebrate vectors. It is one of four Bioinformatics Resource Centers funded by NIAID to provide web-based...

  1. Generalization of concurrence vectors

    International Nuclear Information System (INIS)

    Yu Changshui; Song Heshan

    2004-01-01

    In this Letter, based on the generalization of concurrence vectors for bipartite pure state with respect to employing tensor product of generators of the corresponding rotation groups, we generalize concurrence vectors to the case of mixed states; a new criterion of separability of multipartite pure states is given out, for which we define a concurrence vector; we generalize the vector to the case of multipartite mixed state and give out a good measure of free entanglement

  2. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  3. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  4. Convexity and Marginal Vectors

    NARCIS (Netherlands)

    van Velzen, S.; Hamers, H.J.M.; Norde, H.W.

    2002-01-01

    In this paper we construct sets of marginal vectors of a TU game with the property that if the marginal vectors from these sets are core elements, then the game is convex.This approach leads to new upperbounds on the number of marginal vectors needed to characterize convexity.An other result is that

  5. Custodial vector model

    DEFF Research Database (Denmark)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan

    2015-01-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a $SU(2)_L\\times SU(2)_R$ spectral global symmetry. This symmetry partially protects the electroweak S-parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum...

  6. Rotations with Rodrigues' vector

    International Nuclear Information System (INIS)

    Pina, E

    2011-01-01

    The rotational dynamics was studied from the point of view of Rodrigues' vector. This vector is defined here by its connection with other forms of parametrization of the rotation matrix. The rotation matrix was expressed in terms of this vector. The angular velocity was computed using the components of Rodrigues' vector as coordinates. It appears to be a fundamental matrix that is used to express the components of the angular velocity, the rotation matrix and the angular momentum vector. The Hamiltonian formalism of rotational dynamics in terms of this vector uses the same matrix. The quantization of the rotational dynamics is performed with simple rules if one uses Rodrigues' vector and similar formal expressions for the quantum operators that mimic the Hamiltonian classical dynamics.

  7. Obstacle Avoidance for Unmanned Undersea Vehicle in Unknown Unstructured Environment

    Directory of Open Access Journals (Sweden)

    Zheping Yan

    2013-01-01

    Full Text Available To avoid obstacle in the unknown environment for unmanned undersea vehicle (UUV, an obstacle avoiding system based on improved vector field histogram (VFH is designed. Forward looking sonar is used to detect the environment, and the divisional sonar modal is applied to deal with the measure uncertainty. To adapt to the VFH, rolling occupancy grids are used for the map building, and high accuracy details of local environment are obtained. The threshold is adaptively adjusted by the statistic of obstacles to solve the problem that VFH is sensitive to threshold. To improve the environment adaptability, the hybrid-behaviors strategy is proposed, which selects the optimal avoidance command according to the motion status and environment character. The simulation shows that UUV could avoid the obstacles fast and escape from the U shape obstacles.

  8. Determinants of Aggressive Tax Avoidance

    OpenAIRE

    Herbert, Tanja

    2015-01-01

    This thesis consists of three essays examining determinants of aggressive tax avoidance. The first essay “Measuring the Aggressive Part of International Tax Avoidance”, co-authored with Prof. Dr. Michael Overesch, proposes a new measure that isolates the additional or even aggressive part in international tax avoidance and analyzes the determinants of aggressive tax avoidance of multinational enterprises. The second essay “Capital Injections and Aggressive Tax Planning - Can Banks Have It All...

  9. Predictors of avoiding medical care and reasons for avoidance behavior.

    Science.gov (United States)

    Kannan, Viji Diane; Veazie, Peter J

    2014-04-01

    Delayed medical care has negative health and economic consequences; interventions have focused on appraising symptoms, with limited success in reducing delay. To identify predictors of care avoidance and reasons for avoiding care. Using the Health Information National Trends Survey (2007), we conducted logistic regressions to identify predictors of avoiding medical visits deemed necessary by the respondents; and, we then conducted similar analyses on reasons given for avoidance behavior. Independent variables included geographic, demographic, socioeconomic, personal health, health behavior, health care system, and cognitive characteristics. Approximately one third of adults avoided doctor visits they had deemed necessary. Although unadjusted associations existed, avoiding needed care was not independently associated with geographic, demographic, and socioeconomic characteristics. Avoidance behavior is characterized by low health self-efficacy, less experience with both quality care and getting help with uncertainty about health, having your feelings attended to by your provider, no usual source of care, negative affect, smoking daily, and fatalistic attitude toward cancer. Reasons elicited for avoidance include preference for self-care or alternative care, dislike or distrust of doctors, fear or dislike of medical treatments, time, and money; respondents also endorsed discomfort with body examinations, fear of having a serious illness, and thoughts of dying. Distinct predictors distinguish each of these reasons. Interventions to reduce patient delay could be improved by addressing the health-related behavioral, belief, experiential, and emotional traits associated with delay. Attention should also be directed toward the interpersonal communications between patients and providers.

  10. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  11. Healthcare avoidance: a critical review.

    Science.gov (United States)

    Byrne, Sharon K

    2008-01-01

    The purpose of this study is to provide a critical review and synthesis of theoretical and research literature documenting the impact of avoidance on healthcare behaviors, identify the factors that influence healthcare avoidance and delay in the adult population, and propose a direction for future research. The Theory of Reasoned Action, Theory of Planned Behavior, Theory of Care-Seeking Behavior, the Transtheoretical Model, and the Behavioral Model of Health Services Use/Utilization are utilized to elaborate on the context within which individual intention to engage in healthcare behaviors occurs. Research literature on the concept of healthcare avoidance obtained by using computerized searches of CINAHL, MEDLINE, PSYCH INFO, and HAPI databases, from 1995 to 2007, were reviewed. Studies were organized by professional disciplines. Healthcare avoidance is a common and highly variable experience. Multiple administrative, demographic, personal, and provider factors are related to healthcare avoidance, for example, distrust of providers and/or the science community, health beliefs, insurance status, or socioeconomic/income level. Although the concept is recognized by multiple disciplines, limited research studies address its impact on healthcare decision making. More systematic research is needed to determine correlates of healthcare avoidance. Such studies will help investigators identify patients at risk for avoidant behaviors and provide the basis for health-promoting interventions. Methodological challenges include identification of characteristics of individuals and environments that hinder healthcare behaviors, as well as, the complexity of measuring healthcare avoidance. Studies need to systematically explore the influence of avoidance behaviors on specific healthcare populations at risk.

  12. Virus-Vectored Influenza Virus Vaccines

    Science.gov (United States)

    Tripp, Ralph A.; Tompkins, S. Mark

    2014-01-01

    Despite the availability of an inactivated vaccine that has been licensed for >50 years, the influenza virus continues to cause morbidity and mortality worldwide. Constant evolution of circulating influenza virus strains and the emergence of new strains diminishes the effectiveness of annual vaccines that rely on a match with circulating influenza strains. Thus, there is a continued need for new, efficacious vaccines conferring cross-clade protection to avoid the need for biannual reformulation of seasonal influenza vaccines. Recombinant virus-vectored vaccines are an appealing alternative to classical inactivated vaccines because virus vectors enable native expression of influenza antigens, even from virulent influenza viruses, while expressed in the context of the vector that can improve immunogenicity. In addition, a vectored vaccine often enables delivery of the vaccine to sites of inductive immunity such as the respiratory tract enabling protection from influenza virus infection. Moreover, the ability to readily manipulate virus vectors to produce novel influenza vaccines may provide the quickest path toward a universal vaccine protecting against all influenza viruses. This review will discuss experimental virus-vectored vaccines for use in humans, comparing them to licensed vaccines and the hurdles faced for licensure of these next-generation influenza virus vaccines. PMID:25105278

  13. Adenoviral vector immunity: its implications and circumvention strategies.

    Science.gov (United States)

    Ahi, Yadvinder S; Bangari, Dinesh S; Mittal, Suresh K

    2011-08-01

    Adenoviral (Ad) vectors have emerged as a promising gene delivery platform for a variety of therapeutic and vaccine purposes during last two decades. However, the presence of preexisting Ad immunity and the rapid development of Ad vector immunity still pose significant challenges to the clinical use of these vectors. Innate inflammatory response following Ad vector administration may lead to systemic toxicity, drastically limit vector transduction efficiency and significantly abbreviate the duration of transgene expression. Currently, a number of approaches are being extensively pursued to overcome these drawbacks by strategies that target either the host or the Ad vector. In addition, significant progress has been made in the development of novel Ad vectors based on less prevalent human Ad serotypes and nonhuman Ad. This review provides an update on our current understanding of immune responses to Ad vectors and delineates various approaches for eluding Ad vector immunity. Approaches targeting the host and those targeting the vector are discussed in light of their promises and limitations.

  14. Supergravity inspired vector curvaton

    International Nuclear Information System (INIS)

    Dimopoulos, Konstantinos

    2007-01-01

    It is investigated whether a massive Abelian vector field, whose gauge kinetic function is growing during inflation, can be responsible for the generation of the curvature perturbation in the Universe. Particle production is studied and it is shown that the vector field can obtain a scale-invariant superhorizon spectrum of perturbations with a reasonable choice of kinetic function. After inflation the vector field begins coherent oscillations, during which it corresponds to pressureless isotropic matter. When the vector field dominates the Universe, its perturbations give rise to the observed curvature perturbation following the curvaton scenario. It is found that this is possible if, after the end of inflation, the mass of the vector field increases at a phase transition at temperature of order 1 TeV or lower. Inhomogeneous reheating, whereby the vector field modulates the decay rate of the inflaton, is also studied

  15. Custodial vector model

    Science.gov (United States)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan; Frandsen, Mads T.; Hapola, Tuomas; Sannino, Francesco

    2015-07-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a S U (2 )L×S U (2 )R spectral global symmetry. This symmetry partially protects the electroweak S parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum and interactions with the standard model fields lead to distinct signatures at the LHC in the diboson, dilepton, and associated Higgs channels.

  16. Vector Differential Calculus

    OpenAIRE

    HITZER, Eckhard MS

    2002-01-01

    This paper treats the fundamentals of the vector differential calculus part of universal geometric calculus. Geometric calculus simplifies and unifies the structure and notation of mathematics for all of science and engineering, and for technological applications. In order to make the treatment self-contained, I first compile all important geometric algebra relationships,which are necesssary for vector differential calculus. Then differentiation by vectors is introduced and a host of major ve...

  17. Implicit Real Vector Automata

    Directory of Open Access Journals (Sweden)

    Jean-François Degbomont

    2010-10-01

    Full Text Available This paper addresses the symbolic representation of non-convex real polyhedra, i.e., sets of real vectors satisfying arbitrary Boolean combinations of linear constraints. We develop an original data structure for representing such sets, based on an implicit and concise encoding of a known structure, the Real Vector Automaton. The resulting formalism provides a canonical representation of polyhedra, is closed under Boolean operators, and admits an efficient decision procedure for testing the membership of a vector.

  18. Conflict Avoidance and University Management.

    Science.gov (United States)

    Tagliacozzo, Daisy M.

    The conditions that intensify conflict avoidance by the central administration in making strategic decisions, and the consequences of such avoidance for the management of college affairs, are discussed. The implication of an emerging decision-making style for adapting the organization to changing environments is also considered. Some of the…

  19. Cigarette tax avoidance and evasion.

    Science.gov (United States)

    Stehr, Mark

    2005-03-01

    Variation in state cigarette taxes provides incentives for tax avoidance through smuggling, legal border crossing to low tax jurisdictions, or Internet purchasing. When taxes rise, tax paid sales of cigarettes will decline both because consumption will decrease and because tax avoidance will increase. The key innovation of this paper is to compare cigarette sales data to cigarette consumption data from the Behavioral Risk Factor Surveillance System (BRFSS). I show that after subtracting percent changes in consumption, residual percent changes in sales are associated with state cigarette tax changes implying the existence of tax avoidance. I estimate that the tax avoidance response to tax changes is at least twice the consumption response and that tax avoidance accounted for up to 9.6% of sales between 1985 and 2001. Because of the increase in tax avoidance, tax paid sales data understate the level of smoking and overstate the drop in smoking. I also find that the level of legal border crossing was very low relative to other forms of tax avoidance. If states have strong preferences for smoking control, they must pair high cigarette taxes with effective policies to curb smuggling and other forms of tax avoidance or employ alternative policies such as counter-advertising and smoking restrictions.

  20. Vectorized Monte Carlo

    International Nuclear Information System (INIS)

    Brown, F.B.

    1981-01-01

    Examination of the global algorithms and local kernels of conventional general-purpose Monte Carlo codes shows that multigroup Monte Carlo methods have sufficient structure to permit efficient vectorization. A structured multigroup Monte Carlo algorithm for vector computers is developed in which many particle events are treated at once on a cell-by-cell basis. Vectorization of kernels for tracking and variance reduction is described, and a new method for discrete sampling is developed to facilitate the vectorization of collision analysis. To demonstrate the potential of the new method, a vectorized Monte Carlo code for multigroup radiation transport analysis was developed. This code incorporates many features of conventional general-purpose production codes, including general geometry, splitting and Russian roulette, survival biasing, variance estimation via batching, a number of cutoffs, and generalized tallies of collision, tracklength, and surface crossing estimators with response functions. Predictions of vectorized performance characteristics for the CYBER-205 were made using emulated coding and a dynamic model of vector instruction timing. Computation rates were examined for a variety of test problems to determine sensitivities to batch size and vector lengths. Significant speedups are predicted for even a few hundred particles per batch, and asymptotic speedups by about 40 over equivalent Amdahl 470V/8 scalar codes arepredicted for a few thousand particles per batch. The principal conclusion is that vectorization of a general-purpose multigroup Monte Carlo code is well worth the significant effort required for stylized coding and major algorithmic changes

  1. Vectors and their applications

    CERN Document Server

    Pettofrezzo, Anthony J

    2005-01-01

    Geared toward undergraduate students, this text illustrates the use of vectors as a mathematical tool in plane synthetic geometry, plane and spherical trigonometry, and analytic geometry of two- and three-dimensional space. Its rigorous development includes a complete treatment of the algebra of vectors in the first two chapters.Among the text's outstanding features are numbered definitions and theorems in the development of vector algebra, which appear in italics for easy reference. Most of the theorems include proofs, and coordinate position vectors receive an in-depth treatment. Key concept

  2. Symbolic computer vector analysis

    Science.gov (United States)

    Stoutemyer, D. R.

    1977-01-01

    A MACSYMA program is described which performs symbolic vector algebra and vector calculus. The program can combine and simplify symbolic expressions including dot products and cross products, together with the gradient, divergence, curl, and Laplacian operators. The distribution of these operators over sums or products is under user control, as are various other expansions, including expansion into components in any specific orthogonal coordinate system. There is also a capability for deriving the scalar or vector potential of a vector field. Examples include derivation of the partial differential equations describing fluid flow and magnetohydrodynamics, for 12 different classic orthogonal curvilinear coordinate systems.

  3. [Orthogonal Vector Projection Algorithm for Spectral Unmixing].

    Science.gov (United States)

    Song, Mei-ping; Xu, Xing-wei; Chang, Chein-I; An, Ju-bai; Yao, Li

    2015-12-01

    Spectrum unmixing is an important part of hyperspectral technologies, which is essential for material quantity analysis in hyperspectral imagery. Most linear unmixing algorithms require computations of matrix multiplication and matrix inversion or matrix determination. These are difficult for programming, especially hard for realization on hardware. At the same time, the computation costs of the algorithms increase significantly as the number of endmembers grows. Here, based on the traditional algorithm Orthogonal Subspace Projection, a new method called. Orthogonal Vector Projection is prompted using orthogonal principle. It simplifies this process by avoiding matrix multiplication and inversion. It firstly computes the final orthogonal vector via Gram-Schmidt process for each endmember spectrum. And then, these orthogonal vectors are used as projection vector for the pixel signature. The unconstrained abundance can be obtained directly by projecting the signature to the projection vectors, and computing the ratio of projected vector length and orthogonal vector length. Compared to the Orthogonal Subspace Projection and Least Squares Error algorithms, this method does not need matrix inversion, which is much computation costing and hard to implement on hardware. It just completes the orthogonalization process by repeated vector operations, easy for application on both parallel computation and hardware. The reasonability of the algorithm is proved by its relationship with Orthogonal Sub-space Projection and Least Squares Error algorithms. And its computational complexity is also compared with the other two algorithms', which is the lowest one. At last, the experimental results on synthetic image and real image are also provided, giving another evidence for effectiveness of the method.

  4. Vector-Vector Scattering on the Lattice

    Science.gov (United States)

    Romero-López, Fernando; Urbach, Carsten; Rusetsky, Akaki

    2018-03-01

    In this work we present an extension of the LüScher formalism to include the interaction of particles with spin, focusing on the scattering of two vector particles. The derived formalism will be applied to Scalar QED in the Higgs Phase, where the U(1) gauge boson acquires mass.

  5. Selection vector filter framework

    Science.gov (United States)

    Lukac, Rastislav; Plataniotis, Konstantinos N.; Smolka, Bogdan; Venetsanopoulos, Anastasios N.

    2003-10-01

    We provide a unified framework of nonlinear vector techniques outputting the lowest ranked vector. The proposed framework constitutes a generalized filter class for multichannel signal processing. A new class of nonlinear selection filters are based on the robust order-statistic theory and the minimization of the weighted distance function to other input samples. The proposed method can be designed to perform a variety of filtering operations including previously developed filtering techniques such as vector median, basic vector directional filter, directional distance filter, weighted vector median filters and weighted directional filters. A wide range of filtering operations is guaranteed by the filter structure with two independent weight vectors for angular and distance domains of the vector space. In order to adapt the filter parameters to varying signal and noise statistics, we provide also the generalized optimization algorithms taking the advantage of the weighted median filters and the relationship between standard median filter and vector median filter. Thus, we can deal with both statistical and deterministic aspects of the filter design process. It will be shown that the proposed method holds the required properties such as the capability of modelling the underlying system in the application at hand, the robustness with respect to errors in the model of underlying system, the availability of the training procedure and finally, the simplicity of filter representation, analysis, design and implementation. Simulation studies also indicate that the new filters are computationally attractive and have excellent performance in environments corrupted by bit errors and impulsive noise.

  6. Brane vector phenomenology

    International Nuclear Information System (INIS)

    Clark, T.E.; Love, S.T.; Nitta, Muneto; Veldhuis, T. ter; Xiong, C.

    2009-01-01

    Local oscillations of the brane world are manifested as massive vector fields. Their coupling to the Standard Model can be obtained using the method of nonlinear realizations of the spontaneously broken higher-dimensional space-time symmetries, and to an extent, are model independent. Phenomenological limits on these vector field parameters are obtained using LEP collider data and dark matter constraints

  7. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...... or meromorphic (allowing poles as singularities) functions. There already exists a well-developed theory for iterative holomorphic dynamical systems, and successful relations found between iteration theory and flows of vector fields have been one of the main motivations for the recent interest in holomorphic...... vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...

  8. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...... of parameter spaces into structurally stable domains, and a description of the bifurcations. For this reason, the talk will focus on these questions for complex polynomial vector fields.......The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...

  9. Emerging Vector-Borne Diseases.

    Science.gov (United States)

    Huntington, Mark K; Allison, Jay; Nair, Dilip

    2016-10-01

    Several mosquito-borne viral infections have recently emerged in North America; West Nile virus is the most common in the United States. Although West Nile virus generally causes a self-limited, flulike febrile illness, a serious neuroinvasive form may occur. Dengue is the most common vector-borne viral disease worldwide, and it has been a significant public health threat in the United States since 2009. Known as breakbone fever for its severe myalgias and arthralgias, dengue may cause a hemorrhagic syndrome. Chikungunya also causes flulike febrile illness and disabling arthralgias. Although meningoencephalitis may occur with chikungunya, bleeding is uncommon. Symptoms of Zika virus infection are similar to those of dengue, but milder. Zika virus increases the risk of fetal brain abnormalities, including microcephaly, if a pregnant woman is infected. Zika virus is spread through Aedes albopictus mosquito bites, is transmitted sexually, and may rarely spread nonsexually from person to person. Diagnosis of these vectorborne infections is clinical and serologic, and treatment is supportive. Other, well-established vector-borne diseases are also important. Ehrlichiosis is a tick-borne bacterial disease that presents as a nonspecific syndrome of fever, headache, malaise, and myalgias. It is diagnosed via blood smear testing, with confirmatory serology. Ehrlichiosis is treated with doxycycline. Rickettsial infections are transmitted by fleas, mites, and ticks, and severity ranges from mild to life threatening. Rocky Mountain spotted fever, the most significant rickettsial infection, is primarily a clinical diagnosis that presents as fever, headache, myalgias, petechial rash, and tick exposure. Doxycycline is effective for rickettsial infections if administered promptly. Vector avoidance strategies are critical to the prevention of all of these infections.

  10. Avoided intersections of nodal lines

    International Nuclear Information System (INIS)

    Monastra, Alejandro G; Smilansky, Uzy; Gnutzmann, Sven

    2003-01-01

    We consider real eigenfunctions of the Schroedinger operator in 2D. The nodal lines of separable systems form a regular grid, and the number of nodal crossings equals the number of nodal domains. In contrast, for wavefunctions of non-integrable systems nodal intersections are rare, and for random waves, the expected number of intersections in any finite area vanishes. However, nodal lines display characteristic avoided crossings which we study in this work. We define a measure for the avoidance range and compute its distribution for the random wave ensemble. We show that the avoidance range distribution of wavefunctions of chaotic systems follows the expected random wave distributions, whereas for wavefunctions of classically integrable but quantum non-separable systems, the distribution is quite different. Thus, the study of the avoidance distribution provides more support to the conjecture that nodal structures of chaotic systems are reproduced by the predictions of the random wave ensemble

  11. Who participates in tax avoidance?

    OpenAIRE

    Alstadsæter, Annette; Jacob, Martin

    2013-01-01

    This paper analyzes the sources of heterogeneity in legal tax avoidance strategies across individuals. Three conditions are required for a taxpayer to participate in tax avoidance: incentive, access, and awareness. Using rich Swedish administrative panel data with a unique link between corporate and individual tax returns, we analyze individual participation in legal tax planning around the 2006 Swedish tax reform. Our results suggest that closely held corporations are utilized to facilitate ...

  12. Predator avoidance in extremophile fish.

    Science.gov (United States)

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-02-06

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii) females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre) and the adjacent sulfidic surface creek (El Azufre), we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve) and wild-caught (i.e., predator-experienced) individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1) that predator avoidance is still functional in extremophile Poecilia spp. and (2) that predator recognition and avoidance reactions have a strong genetic basis.

  13. Predator Avoidance in Extremophile Fish

    Science.gov (United States)

    Bierbach, David; Schulte, Matthias; Herrmann, Nina; Zimmer, Claudia; Arias-Rodriguez, Lenin; Indy, Jeane Rimber; Riesch, Rüdiger; Plath, Martin

    2013-01-01

    Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic) springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii) females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre) and the adjacent sulfidic surface creek (El Azufre), we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve) and wild-caught (i.e., predator-experienced) individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1) that predator avoidance is still functional in extremophile Poecilia spp. and (2) that predator recognition and avoidance reactions have a strong genetic basis. PMID:25371337

  14. Fractal vector optical fields.

    Science.gov (United States)

    Pan, Yue; Gao, Xu-Zhen; Cai, Meng-Qiang; Zhang, Guan-Lin; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2016-07-15

    We introduce the concept of a fractal, which provides an alternative approach for flexibly engineering the optical fields and their focal fields. We propose, design, and create a new family of optical fields-fractal vector optical fields, which build a bridge between the fractal and vector optical fields. The fractal vector optical fields have polarization states exhibiting fractal geometry, and may also involve the phase and/or amplitude simultaneously. The results reveal that the focal fields exhibit self-similarity, and the hierarchy of the fractal has the "weeding" role. The fractal can be used to engineer the focal field.

  15. Approach/avoidance in dreams.

    Science.gov (United States)

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. Noncausal Bayesian Vector Autoregression

    DEFF Research Database (Denmark)

    Lanne, Markku; Luoto, Jani

    We propose a Bayesian inferential procedure for the noncausal vector autoregressive (VAR) model that is capable of capturing nonlinearities and incorporating effects of missing variables. In particular, we devise a fast and reliable posterior simulator that yields the predictive distribution...

  17. Understanding Vector Fields.

    Science.gov (United States)

    Curjel, C. R.

    1990-01-01

    Presented are activities that help students understand the idea of a vector field. Included are definitions, flow lines, tangential and normal components along curves, flux and work, field conservation, and differential equations. (KR)

  18. GAP Land Cover - Vector

    Data.gov (United States)

    Minnesota Department of Natural Resources — This vector dataset is a detailed (1-acre minimum), hierarchically organized vegetation cover map produced by computer classification of combined two-season pairs of...

  19. Sesquilinear uniform vector integral

    Indian Academy of Sciences (India)

    theory, together with his integral, dominate contemporary mathematics. ... directions belonging to Bartle and Dinculeanu (see [1], [6], [7] and [2]). ... in this manner, namely he integrated vector functions with respect to measures of bounded.

  20. Tagged Vector Contour (TVC)

    Data.gov (United States)

    Kansas Data Access and Support Center — The Kansas Tagged Vector Contour (TVC) dataset consists of digitized contours from the 7.5 minute topographic quadrangle maps. Coverage for the state is incomplete....

  1. Vector hysteresis models

    Czech Academy of Sciences Publication Activity Database

    Krejčí, Pavel

    1991-01-01

    Roč. 2, - (1991), s. 281-292 ISSN 0956-7925 Keywords : vector hysteresis operator * hysteresis potential * differential inequality Subject RIV: BA - General Mathematics http://www.math.cas.cz/~krejci/b15p.pdf

  2. Support vector machines applications

    CERN Document Server

    Guo, Guodong

    2014-01-01

    Support vector machines (SVM) have both a solid mathematical background and good performance in practical applications. This book focuses on the recent advances and applications of the SVM in different areas, such as image processing, medical practice, computer vision, pattern recognition, machine learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is to create a comprehensive source on support vector machine applications, especially some recent advances.

  3. Exotic composite vector boson

    International Nuclear Information System (INIS)

    Akama, K.; Hattori, T.; Yasue, M.

    1991-01-01

    An exotic composite vector boson V is introduced in two dynamical models of composite quarks, leptons, W, and Z. One is based on four-Fermi interactions, in which composite vector bosons are regarded as fermion-antifermion bound states and the other is based on the confining SU(2) L gauge model, in which they are given by scalar-antiscalar bound states. Both approaches describe the same effective interactions for the sector of composite quarks, leptons, W, Z, γ, and V

  4. Vector borne diseases

    OpenAIRE

    Melillo Fenech, Tanya

    2010-01-01

    A vector-borne disease is one in which the pathogenic microorganism is transmitted from an infected individual to another individual by an arthropod or other agent. The transmission depends upon the attributes and requirements of at least three different Iiving organisms : the pathologic agent which is either a virus, protozoa, bacteria or helminth (worm); the vector, which is commonly an arthropod such as ticks or mosquitoes; and the human host.

  5. Vector financial rogue waves

    International Nuclear Information System (INIS)

    Yan, Zhenya

    2011-01-01

    The coupled nonlinear volatility and option pricing model presented recently by Ivancevic is investigated, which generates a leverage effect, i.e., stock volatility is (negatively) correlated to stock returns, and can be regarded as a coupled nonlinear wave alternative of the Black–Scholes option pricing model. In this Letter, we analytically propose vector financial rogue waves of the coupled nonlinear volatility and option pricing model without an embedded w-learning. Moreover, we exhibit their dynamical behaviors for chosen different parameters. The vector financial rogue wave (rogon) solutions may be used to describe the possible physical mechanisms for the rogue wave phenomena and to further excite the possibility of relative researches and potential applications of vector rogue waves in the financial markets and other related fields. -- Highlights: ► We investigate the coupled nonlinear volatility and option pricing model. ► We analytically present vector financial rogue waves. ► The vector financial rogue waves may be used to describe the extreme events in financial markets. ► This results may excite the relative researches and potential applications of vector rogue waves.

  6. Inflammatory myofibroblastic tumor

    Directory of Open Access Journals (Sweden)

    Sangeeta Palaskar

    2011-01-01

    Full Text Available Inflammatory myofibroblastic tumor is an uncommon lesion of unknown cause. It encompasses a spectrum of myofibroblastic proliferation along with varying amount of inflammatory infiltrate. A number of terms have been applied to the lesion, namely, inflammatory pseudotumor, fibrous xanthoma, plasma cell granuloma, pseudosarcoma, lymphoid hamartoma, myxoid hamartoma, inflammatory myofibrohistiocytic proliferation, benign myofibroblatoma, and most recently, inflammatory myofibroblastic tumor. The diverse nomenclature is mostly descriptive and reflects the uncertainty regarding true biologic nature of these lesions. Recently, the concept of this lesion being reactive has been challenged based on the clinical demonstration of recurrences and metastasis and cytogenetic evidence of acquired clonal chromosomal abnormalities. We hereby report a case of inflammatory pseudotumor and review its inflammatory versus neoplastic behavior.

  7. Adenovirus Vector-Derived VA-RNA-Mediated Innate Immune Responses

    Directory of Open Access Journals (Sweden)

    Hiroyuki Mizuguchi

    2011-07-01

    Full Text Available The major limitation of the clinical use of replication-incompetent adenovirus (Ad vectors is the interference by innate immune responses, including induction of inflammatory cytokines and interferons (IFN, following in vivo application of Ad vectors. Ad vector-induced production of inflammatory cytokines and IFNs also results in severe organ damage and efficient induction of acquired immune responses against Ad proteins and transgene products. Ad vector-induced innate immune responses are triggered by the recognition of Ad components by pattern recognition receptors (PRRs. In order to reduce the side effects by Ad vector-induced innate immune responses and to develop safer Ad vectors, it is crucial to clarify which PRRs and which Ad components are involved in Ad vector-induced innate immune responses. Our group previously demonstrated that myeloid differentiating factor 88 (MyD88 and toll-like receptor 9 (TLR9 play crucial roles in the Ad vector-induced inflammatory cytokine production in mouse bone marrow-derived dendritic cells. Furthermore, our group recently found that virus associated-RNAs (VA-RNAs, which are about 160 nucleotide-long non-coding small RNAs encoded in the Ad genome, are involved in IFN production through the IFN-β promoter stimulator-1 (IPS-1-mediated signaling pathway following Ad vector transduction. The aim of this review is to highlight the Ad vector-induced innate immune responses following transduction, especially VA-RNA-mediated innate immune responses. Our findings on the mechanism of Ad vector-induced innate immune responses should make an important contribution to the development of safer Ad vectors, such as an Ad vector lacking expression of VA-RNAs.

  8. How to avoid sedation complications

    African Journals Online (AJOL)

    To ensure patient safety, it is crucial that the airway is safeguarded. The single most important responsibility is to protect it. An unobstructed airway, with intact protective reflexes and respiratory drive, is essential to avoid complications. In some procedures, e.g. dental, the airway may need to be shared with the surgeon.

  9. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  10. Vectorization in quantum chemistry

    International Nuclear Information System (INIS)

    Saunders, V.R.

    1987-01-01

    It is argued that the optimal vectorization algorithm for many steps (and sub-steps) in a typical ab initio calculation of molecular electronic structure is quite strongly dependent on the target vector machine. Details such as the availability (or lack) of a given vector construct in the hardware, vector startup times and asymptotic rates must all be considered when selecting the optimal algorithm. Illustrations are drawn from: gaussian integral evaluation, fock matrix construction, 4-index transformation of molecular integrals, direct-CI methods, the matrix multiply operation. A cross comparison of practical implementations on the CDC Cyber 205, the Cray-IS and Cray-XMP machines is presented. To achieve portability while remaining optimal on a wide range of machines it is necessary to code all available algorithms in a machine independent manner, and to select the appropriate algorithm using a procedure which is based on machine dependent parameters. Most such parameters concern the timing of certain vector loop kernals, which can usually be derived from a 'bench-marking' routine executed prior to the calculation proper

  11. Vector Fields on Product Manifolds

    OpenAIRE

    Kurz, Stefan

    2011-01-01

    This short report establishes some basic properties of smooth vector fields on product manifolds. The main results are: (i) On a product manifold there always exists a direct sum decomposition into horizontal and vertical vector fields. (ii) Horizontal and vertical vector fields are naturally isomorphic to smooth families of vector fields defined on the factors. Vector fields are regarded as derivations of the algebra of smooth functions.

  12. Bunyavirus-Vector Interactions

    Directory of Open Access Journals (Sweden)

    Kate McElroy Horne

    2014-11-01

    Full Text Available The Bunyaviridae family is comprised of more than 350 viruses, of which many within the Hantavirus, Orthobunyavirus, Nairovirus, Tospovirus, and Phlebovirus genera are significant human or agricultural pathogens. The viruses within the Orthobunyavirus, Nairovirus, and Phlebovirus genera are transmitted by hematophagous arthropods, such as mosquitoes, midges, flies, and ticks, and their associated arthropods not only serve as vectors but also as virus reservoirs in many cases. This review presents an overview of several important emerging or re-emerging bunyaviruses and describes what is known about bunyavirus-vector interactions based on epidemiological, ultrastructural, and genetic studies of members of this virus family.

  13. Sums and Gaussian vectors

    CERN Document Server

    Yurinsky, Vadim Vladimirovich

    1995-01-01

    Surveys the methods currently applied to study sums of infinite-dimensional independent random vectors in situations where their distributions resemble Gaussian laws. Covers probabilities of large deviations, Chebyshev-type inequalities for seminorms of sums, a method of constructing Edgeworth-type expansions, estimates of characteristic functions for random vectors obtained by smooth mappings of infinite-dimensional sums to Euclidean spaces. A self-contained exposition of the modern research apparatus around CLT, the book is accessible to new graduate students, and can be a useful reference for researchers and teachers of the subject.

  14. Duality in vector optimization

    CERN Document Server

    Bot, Radu Ioan

    2009-01-01

    This book presents fundamentals and comprehensive results regarding duality for scalar, vector and set-valued optimization problems in a general setting. After a preliminary chapter dedicated to convex analysis and minimality notions of sets with respect to partial orderings induced by convex cones a chapter on scalar conjugate duality follows. Then investigations on vector duality based on scalar conjugacy are made. Weak, strong and converse duality statements are delivered and connections to classical results from the literature are emphasized. One chapter is exclusively consecrated to the s

  15. Multithreading in vector processors

    Science.gov (United States)

    Evangelinos, Constantinos; Kim, Changhoan; Nair, Ravi

    2018-01-16

    In one embodiment, a system includes a processor having a vector processing mode and a multithreading mode. The processor is configured to operate on one thread per cycle in the multithreading mode. The processor includes a program counter register having a plurality of program counters, and the program counter register is vectorized. Each program counter in the program counter register represents a distinct corresponding thread of a plurality of threads. The processor is configured to execute the plurality of threads by activating the plurality of program counters in a round robin cycle.

  16. Matrix vector analysis

    CERN Document Server

    Eisenman, Richard L

    2005-01-01

    This outstanding text and reference applies matrix ideas to vector methods, using physical ideas to illustrate and motivate mathematical concepts but employing a mathematical continuity of development rather than a physical approach. The author, who taught at the U.S. Air Force Academy, dispenses with the artificial barrier between vectors and matrices--and more generally, between pure and applied mathematics.Motivated examples introduce each idea, with interpretations of physical, algebraic, and geometric contexts, in addition to generalizations to theorems that reflect the essential structur

  17. Free topological vector spaces

    OpenAIRE

    Gabriyelyan, Saak S.; Morris, Sidney A.

    2016-01-01

    We define and study the free topological vector space $\\mathbb{V}(X)$ over a Tychonoff space $X$. We prove that $\\mathbb{V}(X)$ is a $k_\\omega$-space if and only if $X$ is a $k_\\omega$-space. If $X$ is infinite, then $\\mathbb{V}(X)$ contains a closed vector subspace which is topologically isomorphic to $\\mathbb{V}(\\mathbb{N})$. It is proved that if $X$ is a $k$-space, then $\\mathbb{V}(X)$ is locally convex if and only if $X$ is discrete and countable. If $X$ is a metrizable space it is shown ...

  18. Scalar-vector bootstrap

    Energy Technology Data Exchange (ETDEWEB)

    Rejon-Barrera, Fernando [Institute for Theoretical Physics, University of Amsterdam,Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands); Robbins, Daniel [Department of Physics, Texas A& M University,TAMU 4242, College Station, TX 77843 (United States)

    2016-01-22

    We work out all of the details required for implementation of the conformal bootstrap program applied to the four-point function of two scalars and two vectors in an abstract conformal field theory in arbitrary dimension. This includes a review of which tensor structures make appearances, a construction of the projectors onto the required mixed symmetry representations, and a computation of the conformal blocks for all possible operators which can be exchanged. These blocks are presented as differential operators acting upon the previously known scalar conformal blocks. Finally, we set up the bootstrap equations which implement crossing symmetry. Special attention is given to the case of conserved vectors, where several simplifications occur.

  19. Avoiding Complications with MPFL Reconstruction.

    Science.gov (United States)

    Smith, Marvin K; Werner, Brian C; Diduch, David R

    2018-05-12

    To discuss the potentially significant complications associated with medial patellofemoral ligament (MPFL) reconstruction. Additionally, to review the most current and relevant literature with an emphasis on avoiding these potential complications. Multiple cadaveric studies have characterized the anatomy of the MPFL and the related morphologic abnormalities that contribute to recurrent lateral patellar instability. Such abnormalities include patella alta, excessive tibial tubercle to trochlear grove (TT-TG) distance, trochlear dysplasia, and malalignment. Recent studies have evaluated the clinical outcomes associated with the treatment of concomitant pathology in combination with MPFL reconstruction, which is critical in avoiding recurrent instability and complications. Although there remains a lack of consensus regarding various critical aspects of MPFL reconstruction, certain concepts remain imperative. Our preferred methods and rationales for surgical techniques are described. These include appropriate work up, a combination of procedures to address abnormal morphology, anatomical femoral insertion, safe and secure patellar fixation, appropriate graft length fixation, and thoughtful knee flexion during fixation.

  20. Avoidant personality disorder: current insights

    OpenAIRE

    Lampe,Lisa; Malhi,Gin

    2018-01-01

    Lisa Lampe,1 Gin S Malhi2 1Discipline of Psychiatry, University of Newcastle, Newcastle, NSW, Australia; 2Discipline of Psychiatry, University of Sydney, Sydney, NSW, Australia Abstract: Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective t...

  1. Pathogen avoidance by insect predators

    OpenAIRE

    Meyling, Nicolai V.; Ormond, Emma; Roy, Helen E.; Pell, Judith K.

    2008-01-01

    Insects can detect cues related to the risk of attack by their natural enemies. Pathogens are among the natural enemies of insects and entomopathogenic fungi attack a wide array of host species. Evidence documents that social insects in particular have adapted behavioural mechanisms to avoid infection by fungal pathogens. These mechanisms are referred to as 'behavioural resistance'. However, there is little evidence for similar adaptations in non-social insects. We have conducted experime...

  2. Avoidant personality disorder: current insights

    Directory of Open Access Journals (Sweden)

    Lampe L

    2018-03-01

    Full Text Available Lisa Lampe,1 Gin S Malhi2 1Discipline of Psychiatry, University of Newcastle, Newcastle, NSW, Australia; 2Discipline of Psychiatry, University of Sydney, Sydney, NSW, Australia Abstract: Avoidant personality disorder (AVPD is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD, schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. Keywords: avoidant personality disorder, social anxiety disorder, social cognition, psychotherapy, attachment

  3. Avoiding congestion in recommender systems

    International Nuclear Information System (INIS)

    Ren, Xiaolong; Lü, Linyuan; Liu, Runran; Zhang, Jianlin

    2014-01-01

    Recommender systems use the historical activities and personal profiles of users to uncover their preferences and recommend objects. Most of the previous methods are based on objects’ (and/or users’) similarity rather than on their difference. Such approaches are subject to a high risk of increasingly exposing users to a narrowing band of popular objects. As a result, a few objects may be recommended to an enormous number of users, resulting in the problem of recommendation congestion, which is to be avoided, especially when the recommended objects are limited resources. In order to quantitatively measure a recommendation algorithm's ability to avoid congestion, we proposed a new metric inspired by the Gini index, which is used to measure the inequality of the individual wealth distribution in an economy. Besides this, a new recommendation method called directed weighted conduction (DWC) was developed by considering the heat conduction process on a user–object bipartite network with different thermal conductivities. Experimental results obtained for three benchmark data sets showed that the DWC algorithm can effectively avoid system congestion, and greatly improve the novelty and diversity, while retaining relatively high accuracy, in comparison with the state-of-the-art methods. (paper)

  4. Biomarkers in inflammatory bowel diseases

    DEFF Research Database (Denmark)

    Bennike, Tue; Birkelund, Svend; Stensballe, Allan

    2014-01-01

    Unambiguous diagnosis of the two main forms of inflammatory bowel diseases (IBD): Ulcerative colitis (UC) and Crohn's disease (CD), represents a challenge in the early stages of the diseases. The diagnosis may be established several years after the debut of symptoms. Hence, protein biomarkers...... for early and accurate diagnostic could help clinicians improve treatment of the individual patients. Moreover, the biomarkers could aid physicians to predict disease courses and in this way, identify patients in need of intensive treatment. Patients with low risk of disease flares may avoid treatment...... with medications with the concomitant risk of adverse events. In addition, identification of disease and course specific biomarker profiles can be used to identify biological pathways involved in the disease development and treatment. Knowledge of disease mechanisms in general can lead to improved future...

  5. Estimation of vector velocity

    DEFF Research Database (Denmark)

    2000-01-01

    Using a pulsed ultrasound field, the two-dimensional velocity vector can be determined with the invention. The method uses a transversally modulated ultrasound field for probing the moving medium under investigation. A modified autocorrelation approach is used in the velocity estimation. The new...

  6. Production of lentiviral vectors

    Directory of Open Access Journals (Sweden)

    Otto-Wilhelm Merten

    2016-01-01

    Full Text Available Lentiviral vectors (LV have seen considerably increase in use as gene therapy vectors for the treatment of acquired and inherited diseases. This review presents the state of the art of the production of these vectors with particular emphasis on their large-scale production for clinical purposes. In contrast to oncoretroviral vectors, which are produced using stable producer cell lines, clinical-grade LV are in most of the cases produced by transient transfection of 293 or 293T cells grown in cell factories. However, more recent developments, also, tend to use hollow fiber reactor, suspension culture processes, and the implementation of stable producer cell lines. As is customary for the biotech industry, rather sophisticated downstream processing protocols have been established to remove any undesirable process-derived contaminant, such as plasmid or host cell DNA or host cell proteins. This review compares published large-scale production and purification processes of LV and presents their process performances. Furthermore, developments in the domain of stable cell lines and their way to the use of production vehicles of clinical material will be presented.

  7. Orthogonalisation of Vectors

    Indian Academy of Sciences (India)

    The Gram-Schmidt process is one of the first things one learns in a course ... We might want to stay as close to the experimental data as possible when converting these vectors to orthonormal ones demanded by the model. The process of finding the closest or- thonormal .... is obtained by writing the matrix A = [aI, an], then.

  8. From vectors to mnesors

    OpenAIRE

    Champenois, Gilles

    2007-01-01

    The mnesor theory is the adaptation of vectors to artificial intelligence. The scalar field is replaced by a lattice. Addition becomes idempotent and multiplication is interpreted as a selection operation. We also show that mnesors can be the foundation for a linear calculus.

  9. Calculus with vectors

    CERN Document Server

    Treiman, Jay S

    2014-01-01

    Calculus with Vectors grew out of a strong need for a beginning calculus textbook for undergraduates who intend to pursue careers in STEM. fields. The approach introduces vector-valued functions from the start, emphasizing the connections between one-variable and multi-variable calculus. The text includes early vectors and early transcendentals and includes a rigorous but informal approach to vectors. Examples and focused applications are well presented along with an abundance of motivating exercises. All three-dimensional graphs have rotatable versions included as extra source materials and may be freely downloaded and manipulated with Maple Player; a free Maple Player App is available for the iPad on iTunes. The approaches taken to topics such as the derivation of the derivatives of sine and cosine, the approach to limits, and the use of "tables" of integration have been modified from the standards seen in other textbooks in order to maximize the ease with which students may comprehend the material. Additio...

  10. On vector equilibrium problem

    Indian Academy of Sciences (India)

    [G] Giannessi F, Theorems of alternative, quadratic programs and complementarity problems, in: Variational Inequalities and Complementarity Problems (eds) R W Cottle, F Giannessi and J L Lions (New York: Wiley) (1980) pp. 151±186. [K1] Kazmi K R, Existence of solutions for vector optimization, Appl. Math. Lett. 9 (1996).

  11. Vector-borne Infections

    Centers for Disease Control (CDC) Podcasts

    2011-04-18

    This podcast discusses emerging vector-borne pathogens, their role as prominent contributors to emerging infectious diseases, how they're spread, and the ineffectiveness of mosquito control methods.  Created: 4/18/2011 by National Center for Emerging Zoonotic and Infectious Diseases (NCEZID).   Date Released: 4/27/2011.

  12. First experience of vectorizing electromagnetic physics models for detector simulation

    Energy Technology Data Exchange (ETDEWEB)

    Amadio, G. [Sao Paulo State U.; Apostolakis, J. [CERN; Bandieramonte, M. [Catania Astrophys. Observ.; Bianchini, C. [Mackenzie Presbiteriana U.; Bitzes, G. [CERN; Brun, R. [CERN; Canal, P. [Fermilab; Carminati, F. [CERN; Licht, J.de Fine [U. Copenhagen (main); Duhem, L. [Intel, Santa Clara; Elvira, D. [Fermilab; Gheata, A. [CERN; Jun, S. Y. [Fermilab; Lima, G. [Fermilab; Novak, M. [CERN; Presbyterian, M. [Bhabha Atomic Res. Ctr.; Shadura, O. [CERN; Seghal, R. [Bhabha Atomic Res. Ctr.; Wenzel, S. [CERN

    2015-12-23

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. The GeantV vector prototype for detector simulations has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth, parallelization needed to achieve optimal performance or memory access latency and speed. An additional challenge is to avoid the code duplication often inherent to supporting heterogeneous platforms. In this paper we present the first experience of vectorizing electromagnetic physics models developed for the GeantV project.

  13. First experience of vectorizing electromagnetic physics models for detector simulation

    International Nuclear Information System (INIS)

    Amadio, G; Bianchini, C; Apostolakis, J; Bitzes, G; Brun, R; Carminati, F; Gheata, A; Novak, M; Shadura, O; Wenzel, S; Bandieramonte, M; Canal, P; Elvira, D; Jun, S Y; Lima, G; Licht, J de Fine; Duhem, L; Presbyterian, M; Seghal, R

    2015-01-01

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. The GeantV vector prototype for detector simulations has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth, parallelization needed to achieve optimal performance or memory access latency and speed. An additional challenge is to avoid the code duplication often inherent to supporting heterogeneous platforms. In this paper we present the first experience of vectorizing electromagnetic physics models developed for the GeantV project. (paper)

  14. First experience of vectorizing electromagnetic physics models for detector simulation

    Science.gov (United States)

    Amadio, G.; Apostolakis, J.; Bandieramonte, M.; Bianchini, C.; Bitzes, G.; Brun, R.; Canal, P.; Carminati, F.; de Fine Licht, J.; Duhem, L.; Elvira, D.; Gheata, A.; Jun, S. Y.; Lima, G.; Novak, M.; Presbyterian, M.; Shadura, O.; Seghal, R.; Wenzel, S.

    2015-12-01

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. The GeantV vector prototype for detector simulations has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth, parallelization needed to achieve optimal performance or memory access latency and speed. An additional challenge is to avoid the code duplication often inherent to supporting heterogeneous platforms. In this paper we present the first experience of vectorizing electromagnetic physics models developed for the GeantV project.

  15. Curcumin in inflammatory diseases.

    Science.gov (United States)

    Shehzad, Adeeb; Rehman, Gauhar; Lee, Young Sup

    2013-01-01

    Curcumin (diferuloylmethane), a yellow coloring agent extracted from turmeric is also used as a remedy for the treatment and prevention of inflammatory diseases. Acute and chronic inflammation is a major factor in the progression of obesity, type II diabetes, arthritis, pancreatitis, cardiovascular, neurodegenerative and metabolic diseases, as well as certain types of cancer. Turmeric has a long history of use in Ayurvedic medicine for the treatment of inflammatory disorders. Recent studies on the efficacy and therapeutic applicability of turmeric have suggested that the active ingredient of tumeric is curcumin. Further, compelling evidence has shown that curcumin has the ability to inhibit inflammatory cell proliferation, invasion, and angiogenesis through multiple molecular targets and mechanisms of action. Curcumin is safe, non-toxic, and mediates its anti-inflammatory effects through the down-regulation of inflammatory transcription factors, cytokines, redox status, protein kinases, and enzymes that all promote inflammation. In addition, curcumin induces apoptosis through mitochondrial and receptor-mediated pathways, as well as activation of caspase cascades. In the current study, the anti-inflammatory effects of curcumin were evaluated relative to various chronic inflammatory diseases. Based on the available pharmacological data obtained from in vitro and in vivo research, as well as clinical trials, an opportunity exists to translate curcumin into clinics for the prevention of inflammatory diseases in the near future. Copyright © 2012 International Union of Biochemistry and Molecular Biology, Inc.

  16. Mechanism of avoiding little rip

    OpenAIRE

    ZHAI Xianghua; XI Ping

    2014-01-01

    The scalar phantom field Φ leads to various catastrophic fates of the universe including big rip,little rip and other future singularity depending on the choice of its potential.For example,little rip stems from a quadratic potential in general relativity.We suggest a new mechanism to avoid little rip in the 1/R gravity.The phantom field with different potentials,including quadratic,cubic and quantic potentials are studied via numerical calculation in the 1/R gravity with R2 correction.T...

  17. A multistage motion vector processing method for motion-compensated frame interpolation.

    Science.gov (United States)

    Huang, Ai- Mei; Nguyen, Truong Q

    2008-05-01

    In this paper, a novel, low-complexity motion vector processing algorithm at the decoder is proposed for motion-compensated frame interpolation or frame rate up-conversion. We address the problems of having broken edges and deformed structures in an interpolated frame by hierarchically refining motion vectors on different block sizes. Our method explicitly considers the reliability of each received motion vector and has the capability of preserving the structure information. This is achieved by analyzing the distribution of residual energies and effectively merging blocks that have unreliable motion vectors. The motion vector reliability information is also used as a prior knowledge in motion vector refinement using a constrained vector median filter to avoid choosing identical unreliable one. We also propose using chrominance information in our method. Experimental results show that the proposed scheme has better visual quality and is also robust, even in video sequences with complex scenes and fast motion.

  18. Avoidant personality disorder: current insights.

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the "severity continuum hypothesis", in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment.

  19. Avoidant personality disorder: current insights

    Science.gov (United States)

    Lampe, Lisa; Malhi, Gin S

    2018-01-01

    Avoidant personality disorder (AVPD) is a relatively common disorder that is associated with significant distress, impairment, and disability. It is a chronic disorder with an early age at onset and a lifelong impact. Yet it is underrecognized and poorly studied. Little is known regarding the most effective treatment. The impetus for research into this condition has waxed and waned, possibly due to concerns regarding its distinctiveness from other disorders, especially social anxiety disorder (SAD), schizoid personality disorder, and dependent personality disorder. The prevailing paradigm subscribes to the “severity continuum hypothesis”, in which AVPD is viewed essentially as a severe variant of SAD. However, areas of discontinuity have been described, and there is support for retaining AVPD as a distinct diagnostic category. Recent research has focused on the phenomenology of AVPD, factors of possible etiological significance such as early parenting experiences, attachment style, temperament, and cognitive processing. Self-concept, avoidant behavior, early attachments, and attachment style may represent points of difference from SAD that also have relevance to treatment. Additional areas of research not focused specifically on AVPD, including the literature on social cognition as it relates to attachment and personality style, report findings that are promising for future research aimed at better delineating AVPD and informing treatment. PMID:29563846

  20. Vector grammars and PN machines

    Institute of Scientific and Technical Information of China (English)

    蒋昌俊

    1996-01-01

    The concept of vector grammars under the string semantic is introduced.The dass of vector grammars is given,which is similar to the dass of Chomsky grammars.The regular vector grammar is divided further.The strong and weak relation between the vector grammar and scalar grammar is discussed,so the spectrum system graph of scalar and vector grammars is made.The equivalent relation between the regular vector grammar and Petri nets (also called PN machine) is pointed.The hybrid PN machine is introduced,and its language is proved equivalent to the language of the context-free vector grammar.So the perfect relation structure between vector grammars and PN machines is formed.

  1. Herpes simplex virus type 1-derived recombinant and amplicon vectors.

    Science.gov (United States)

    Fraefel, Cornel; Marconi, Peggy; Epstein, Alberto L

    2011-01-01

    Herpes simplex virus type 1 (HSV-1) is a human pathogen whose lifestyle is based on a long-term dual interaction with the infected host, being able to establish both lytic and latent infections. The virus genome is a 153 kbp double-stranded DNA molecule encoding more than 80 genes. The interest of HSV-1 as gene transfer vector stems from its ability to infect many different cell types, both quiescent and proliferating cells, the very high packaging capacity of the virus capsid, the outstanding neurotropic adaptations that this virus has evolved, and the fact that it never integrates into the cellular chromosomes, thus avoiding the risk of insertional mutagenesis. Two types of vectors can be derived from HSV-1, recombinant vectors and amplicon vectors, and different methodologies have been developed to prepare large stocks of each type of vector. This chapter summarizes (1) the two approaches most commonly used to prepare recombinant vectors through homologous recombination, either in eukaryotic cells or in bacteria, and (2) the two methodologies currently used to generate helper-free amplicon vectors, either using a bacterial artificial chromosome (BAC)-based approach or a Cre/loxP site-specific recombination strategy.

  2. Vehicle Based Vector Sensor

    Science.gov (United States)

    2015-09-28

    buoyant underwater vehicle with an interior space in which a length of said underwater vehicle is equal to one tenth of the acoustic wavelength...underwater vehicle with an interior space in which a length of said underwater vehicle is equal to one tenth of the acoustic wavelength; an...unmanned underwater vehicle that can function as an acoustic vector sensor. (2) Description of the Prior Art [0004] It is known that a propagating

  3. Reciprocity in Vector Acoustics

    Science.gov (United States)

    2017-03-01

    Green’s Theorem to the left hand side of Equation (3.2) converts it to a surface integral that vanishes for the impedance boundary conditions one...There are situations where this assumption does not hold, such as at boundaries between layers or in an inhomogeneous layer , because the density gradient...instead of requiring one model run for each source location. Application of the vector-scalar reciprocity principle is demonstrated with analytic

  4. Tensor Calculus: Unlearning Vector Calculus

    Science.gov (United States)

    Lee, Wha-Suck; Engelbrecht, Johann; Moller, Rita

    2018-01-01

    Tensor calculus is critical in the study of the vector calculus of the surface of a body. Indeed, tensor calculus is a natural step-up for vector calculus. This paper presents some pitfalls of a traditional course in vector calculus in transitioning to tensor calculus. We show how a deeper emphasis on traditional topics such as the Jacobian can…

  5. Intravenous immunoglobulin response in treatment-naïve chronic inflammatory demyelinating polyradiculoneuropathy

    NARCIS (Netherlands)

    Kuitwaard, Krista; Hahn, Angelika F.; Vermeulen, Marinus; Venance, Shannon L.; van Doorn, Pieter A.

    2015-01-01

    There is no consensus on which treatment should be used preferentially in individual patients with chronic inflammatory demyelinating polyneuropathy (CIDP). Patients unlikely to respond to intravenous immunoglobulin (IVIg) could be prescribed corticosteroids first to avoid high cost and a delayed

  6. Collision avoidance in robotic environments

    International Nuclear Information System (INIS)

    Kreifeldt, J.G.

    1984-01-01

    A generalized approach to the problem of collision avoidance in robotic environments is presented. This approach transforms the three dimensional but dynamic real-world changing geometric space of the robot in its environment into a multidimensional but static space such that any possible geometric arrangement of the robotic space becomes a point in hyperspace. Major advantages of this approach include clarification of and potential solution to the basic problem of finding optimized, collision free movements from an initial to a final configuration. A major disadvantage of the approach is related to computational and data storage problems. However these latter are technically solvable while the clarification of the control and guidance problem gained through the transformational approach and its general elucidation power remain prime conceptual tools for the problem of robot design and operation

  7. UAV formation control design with obstacle avoidance in dynamic three-dimensional environment.

    Science.gov (United States)

    Chang, Kai; Xia, Yuanqing; Huang, Kaoli

    2016-01-01

    This paper considers the artificial potential field method combined with rotational vectors for a general problem of multi-unmanned aerial vehicle (UAV) systems tracking a moving target in dynamic three-dimensional environment. An attractive potential field is generated between the leader and the target. It drives the leader to track the target based on the relative position of them. The other UAVs in the formation are controlled to follow the leader by the attractive control force. The repulsive force affects among the UAVs to avoid collisions and distribute the UAVs evenly on the spherical surface whose center is the leader-UAV. Specific orders or positions of the UAVs are not required. The trajectories of avoidance obstacle can be obtained through two kinds of potential field with rotation vectors. Every UAV can choose the optimal trajectory to avoid the obstacle and reconfigure the formation after passing the obstacle. Simulations study on UAV are presented to demonstrate the effectiveness of proposed method.

  8. Hierarchal scalar and vector tetrahedra

    International Nuclear Information System (INIS)

    Webb, J.P.; Forghani, B.

    1993-01-01

    A new set of scalar and vector tetrahedral finite elements are presented. The elements are hierarchal, allowing mixing of polynomial orders; scalar orders up to 3 and vector orders up to 2 are defined. The vector elements impose tangential continuity on the field but not normal continuity, making them suitable for representing the vector electric or magnetic field. Further, the scalar and vector elements are such that they can easily be used in the same mesh, a requirement of many quasi-static formulations. Results are presented for two 50 Hz problems: the Bath Cube, and TEAM Problem 7

  9. Leishmaniasis vector behaviour in Kenya

    International Nuclear Information System (INIS)

    Mutinga, M.J.

    1980-01-01

    Leishmaniasis in Kenya exists in two forms: cutaneous and visceral. The vectors of visceral leishmaniasis have been the subject of investigation by various researchers since World War II, when the outbreak of the disease was first noticed. The vectors of cutaneous leishmaniasis were first worked on only a decade ago after the discovery of the disease focus in Mt. Elgon. The vector behaviour of these diseases, namely Phlebotomus pedifer, the vector of cutaneous leishmaniasis, and Phlebotomus martini, the vector of visceral leishmaniasis, are discussed in detail. P. pedifer has been found to breed and bite inside caves, whereas P. martini mainly bites inside houses. (author)

  10. Some Algorithms for the Conditional Mean Vector and Covariance Matrix

    Directory of Open Access Journals (Sweden)

    John F. Monahan

    2006-08-01

    Full Text Available We consider here the problem of computing the mean vector and covariance matrix for a conditional normal distribution, considering especially a sequence of problems where the conditioning variables are changing. The sweep operator provides one simple general approach that is easy to implement and update. A second, more goal-oriented general method avoids explicit computation of the vector and matrix, while enabling easy evaluation of the conditional density for likelihood computation or easy generation from the conditional distribution. The covariance structure that arises from the special case of an ARMA(p, q time series can be exploited for substantial improvements in computational efficiency.

  11. Inflammatory Drug (NSAID)

    African Journals Online (AJOL)

    Inflammatory Drug (NSAID)-Induced Seizures in a Patient with HIV Infection ... interaction not supported by existing literature, and it is possible that the background HIV infection may have a role to .... Foods and Drug Administration and Control.

  12. Inflammatory Breast Cancer

    Science.gov (United States)

    ... Common Cancer Types Recurrent Cancer Common Cancer Types Bladder Cancer Breast Cancer Colorectal Cancer Kidney (Renal Cell) Cancer ... white women. Inflammatory breast tumors are frequently hormone receptor negative, which means they cannot be treated with ...

  13. Chronic inflammatory demyelinative polyneuropathy

    DEFF Research Database (Denmark)

    Said, Gérard; Krarup, Christian

    2013-01-01

    Chronic inflammatory demyelinative polyneuropathy (CIDP) is an acquired polyneuropathy presumably of immunological origin. It is characterized by a progressive or a relapsing course with predominant motor deficit. The diagnosis rests on the association of non-length-dependent predominantly motor...

  14. Genetic modification of lymphocytes by retrovirus-based vectors.

    Science.gov (United States)

    Suerth, Julia D; Schambach, Axel; Baum, Christopher

    2012-10-01

    The genetic modification of lymphocytes is an important topic in the emerging field of gene therapy. Many clinical trials targeting immunodeficiency syndromes or cancer have shown therapeutic benefit; further applications address inflammatory and infectious disorders. Retroviral vector development requires a detailed understanding of the interactions with the host. Most researchers have used simple gammaretroviral vectors to modify lymphocytes, either directly or via hematopoietic stem and progenitor cells. Lentiviral, spumaviral (foamyviral) and alpharetroviral vectors were designed to reduce the necessity for cell stimulation and to utilize potentially safer integration properties. Novel surface modifications (pseudotyping) and transgenes, built using synthetic components, expand the retroviral toolbox, altogether promising increased specificity and potency. Product consistency will be an important criterion for routine clinical use. Copyright © 2012. Published by Elsevier Ltd.

  15. Avoidant/Restrictive Food Intake Disorder

    Science.gov (United States)

    ... Eating Disorder Bulimia Nervosa Pica Rumination Disorder Avoidant/restrictive food intake disorder is characterized by eating very little food and/or avoiding eating certain foods. People with this disorder eat ...

  16. The Global Attack on Tax Avoidance

    OpenAIRE

    Franck, Gustav Grønborg; Runchel, Daniel Theis; Mac, Martin Tuannhien; Ahmed, Jahanzeeb; Bang, Lars Seneca

    2015-01-01

    The issue of tax avoidance has been subject for recommended regulations by the G20 countries in collaboration with OECD. We examine the usefulness of market failure theory to explain the economic and political issues of tax avoidance. We test our hypothesis using theory through a deductive approach incorporating content analysis to find convergence(s) between tax avoidance methods identified and the efforts of the G20 BEPS action plan to respond to those methods. The issue of tax avoidance...

  17. Tax Avoidance, Welfare Transfers, and Asset Prices

    OpenAIRE

    Denis Gorea

    2013-01-01

    Does tax avoidance have any implications for financial markets? This paper quantifies the general equilibrium implications of tax avoidance by setting up an incomplete markets production economy model in which households pay capital gains taxes and have access to tax avoidance technologies provided by financial institutions. I find that changes in the level of tax avoidance have disproportionate effects on different groups of agents and generally benefit the old, wealthy and high income house...

  18. Current vector control challenges in the fight against malaria.

    Science.gov (United States)

    Benelli, Giovanni; Beier, John C

    2017-10-01

    , presence of behavioral avoidance, high vector biodiversity, competitive and food web interactions, lack of insights on mosquito dispersal and mating behavior, and the impact of environmental changes on mosquito ecological traits. Overall, the trans-disciplinary cooperation among parasitologists and entomologists is crucial to ensure proper evaluation of the epidemiological impact triggered by novel mosquito vector control strategies. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Vector-borne diseases

    DEFF Research Database (Denmark)

    More, Simon J.; Bicout, Dominique; Bøtner, Anette

    2017-01-01

    After a request from the Europea n Commission, EFSA’s Panel on Animal Health and Welfaresummarised the main characteristics of 36 vector-borne disease s (VBDs) in 36 web-based storymaps.The risk of introduction in the EU through movement of livestock or pets was assessed for eac h of the36 VBDs......-agents for which the rate of introduction wasestimated to be very low, no further asse ssments were made. Due to the uncertainty related to someparameters used for the risk assessment or the instable or unpredictability disease situation in some ofthe source regions, it is recommended to update the assessment when...

  20. Vectors to success

    International Nuclear Information System (INIS)

    Otsason, J.

    1998-01-01

    The Vector Pipeline project linking the Chicago supply hub to markets in eastern Canada, the northeastern U.S. and the Mid-Atlantic states, is described. Subsidiary objectives of the promoters are to match market timing to upstream pipelines and market requirements, and to provide low cost expandability to complement upstream expandability. The presentation includes description of the project, costs, leased facilities, rates and tariffs, right of way considerations, storage facilities and a project schedule. Construction is to begin in March 1999 and the line should be in service in November 1999

  1. Conflict Avoidance in a University Context

    Science.gov (United States)

    Barsky, Allan E.; Wood, Lorinda

    2005-01-01

    This ethnographic study explores patterns of conflict avoidance among university students, professors, administrators and staff. Analysis of their narratives of conflict avoidance suggests that avoidance can be beneficial in some circumstances, depending upon personality issues, cost?benefit analysis, power imbalance, type of work, length of…

  2. Population avoidance in aimpoint selection

    International Nuclear Information System (INIS)

    Andre, C.G.

    1978-01-01

    In most past studies of the effectiveness of tactical nuclear weapons vs the amount of collateral damage produced (civilian casualties), civilians have been congregated into idealized shaped towns and cities, and criteria for city avoidance were usually formulated in terms relating to a town's population. This treatment was sufficient in those studies where weapon yields were so large that great numbers of civilians were almost always placed at risk. As further studies developed, demonstrating that real progress could be made in reducing the numbers of civilians potentially placed at risk in tactical nuclear warfare situations, the inadequacies of the present treatment became obvious. The need existed for a more detailed description of the distribution of civilians. The method described determines the number of civilians at risk for a weapon under consideration being detonated at a given point and displays a symbol relating to the numbers at risk on a map or a transparency that overlays a 1:50,000 map of the region. Thus, a weapons planner making the selection of aimpoints for inflicting the necessary military damage required has the means to reduce potential civilian casualties by properly choosing the weapon and aimpoints

  3. Vector-vector production in photon-photon interactions

    International Nuclear Information System (INIS)

    Ronan, M.T.

    1988-01-01

    Measurements of exclusive untagged /rho/ 0 /rho/ 0 , /rho//phi/, K/sup *//bar K//sup */, and /rho/ω production and tagged /rho/ 0 /rho/ 0 production in photon-photon interactions by the TPC/Two-Gamma experiment are reviewed. Comparisons to the results of other experiments and to models of vector-vector production are made. Fits to the data following a four quark model prescription for vector meson pair production are also presented. 10 refs., 9 figs

  4. Cannabis for inflammatory bowel disease.

    Science.gov (United States)

    Naftali, Timna; Mechulam, Raphael; Lev, Lihi Bar; Konikoff, Fred M

    2014-01-01

    The marijuana plant Cannabis sativa has been used for centuries as a treatment for a variety of ailments. It contains over 60 different cannabinoid compounds. Studies have revealed that the endocannabinoid system is involved in almost all major immune events. Cannabinoids may, therefore, be beneficial in inflammatory disorders. In murine colitis, cannabinoids decrease histologic and microscopic inflammation. In humans, cannabis has been used to treat a plethora of gastrointestinal problems, including anorexia, emesis, abdominal pain, diarrhea, and diabetic gastroparesis. Despite anecdotal reports on medical cannabis in inflammatory bowel disease (IBD), there are few controlled studies. In an observational study in 30 patients with Crohn's disease (CD), we found that medical cannabis was associated with improvement in disease activity and reduction in the use of other medications. In a more recent placebo-controlled study in 21 chronic CD patients, we showed a decrease in the CD activity index >100 in 10 of 11 subjects on cannabis compared to 4 of 10 on placebo. Complete remission was achieved in 5 of 11 subjects in the cannabis group and 1 of 10 in the placebo group. Yet, in an additional study, low-dose cannabidiol did not have an effect on CD activity. In summary, evidence is gathering that manipulating the endocannabinoid system can have beneficial effects in IBD, but further research is required to declare cannabinoids a medicine. We need to establish the specific cannabinoids, as well as appropriate medical conditions, optimal dose, and mode of administration, to maximize the beneficial effects while avoiding any potential harmful effects of cannabinoid use. © 2014 S. Karger AG, Basel.

  5. Vertical vector face lift.

    Science.gov (United States)

    Somoano, Brian; Chan, Joanna; Morganroth, Greg

    2011-01-01

    Facial rejuvenation using local anesthesia has evolved in the past decade as a safer option for patients seeking fewer complications and minimal downtime. Mini- and short-scar face lifts using more conservative incision lengths and extent of undermining can be effective in the younger patient with lower face laxity and minimal loose, elastotic neck skin. By incorporating both an anterior and posterior approach and using an incision length between the mini and more traditional face lift, the Vertical Vector Face Lift can achieve longer-lasting and natural results with lesser cost and risk. Submentoplasty and liposuction of the neck and jawline, fundamental components of the vertical vector face lift, act synergistically with superficial musculoaponeurotic system plication to reestablish a more youthful, sculpted cervicomental angle, even in patients with prominent jowls. Dramatic results can be achieved in the right patient by combining with other procedures such as injectable fillers, chin implants, laser resurfacing, or upper and lower blepharoplasties. © 2011 Wiley Periodicals, Inc.

  6. Vector control in leishmaniasis.

    Science.gov (United States)

    Kishore, K; Kumar, V; Kesari, S; Dinesh, D S; Kumar, A J; Das, P; Bhattacharya, S K

    2006-03-01

    Indoor residual spraying is a simple and cost effective method of controlling endophilic vectors and DDT remains the insecticide of choice for the control of leishmaniasis. However resistance to insecticide is likely to become more widespread in the population especially in those areas in which insecticide has been used for years. In this context use of slow release emulsified suspension (SRES) may be the best substitute. In this review spraying frequencies of DDT and new schedule of spray have been discussed. Role of biological control and environment management in the control of leishmaniasis has been emphasized. Allethrin (coil) 0.1 and 1.6 per cent prallethrin (liquid) have been found to be effective repellents against Phlebotomus argentipes, the vector of Indian kalaazar. Insecticide impregnated bednets is another area which requires further research on priority basis for the control of leishmaniasis. Role of satellite remote sensing for early prediction of disease by identifying the sandflygenic conditions cannot be undermined. In future synthetic pheromons can be exploited in the control of leishmaniasis.

  7. Experimental demonstration of vector E x vector B plasma divertor

    International Nuclear Information System (INIS)

    Strait, E.J.; Kerst, D.W.; Sprott, J.C.

    1977-01-01

    The vector E x vector B drift due to an applied radial electric field in a tokamak with poloidal divertor can speed the flow of plasma out of the scrape-off region, and provide a means of externally controlling the flow rate and thus the width of the density fall-off. An experiment in the Wisconsin levitated toroidal octupole, using vector E x vector B drifts alone, demonstrates divertor-like behavior, including 70% reduction of plasma density near the wall and 40% reduction of plasma flux to the wall, with no adverse effects on confinement of the main plasma

  8. Earthworm avoidance of silver nanomaterials over time

    DEFF Research Database (Denmark)

    Mariyadas, Jennifer; Amorim, Mónica J B; Jensen, John

    2018-01-01

    Avoidance behaviour offers a highly relevant information as it reveals the ability to avoid (or not) possible toxic compounds in the field, hence it provides information on reasons for the presence/absence in the field. The earthworm Eisenia fetida was used to study avoidance behaviour to four si...... exposure durations and showed a continuous higher avoidance with time (based on EC50 values). The AgNMs avoidance was in the order NM300Ksoil solution fraction that correlated with EC50 across materials....

  9. Testing of dogs with meningitis and meningoencephalitis of unknown etiology for vector-transmitted microorganisms

    OpenAIRE

    Lazzerini, Kali

    2016-01-01

    In many cases of inflammatory diseases of the central nervous system in dogs, no aetiological infectious agent can be found. These inflammatory conditions are thus named inflammations of unknown aetiology. Results of immunpathological studies imply that an antigen may trigger an autoimmune response (Hit-and-Run-Hypothesis). Serum was analyzed for antibodies against vector-transmitted pathogens and blood and cerebrospinal fluid for DNA of such infectious agents in order to further define th...

  10. Video Vectorization via Tetrahedral Remeshing.

    Science.gov (United States)

    Wang, Chuan; Zhu, Jie; Guo, Yanwen; Wang, Wenping

    2017-02-09

    We present a video vectorization method that generates a video in vector representation from an input video in raster representation. A vector-based video representation offers the benefits of vector graphics, such as compactness and scalability. The vector video we generate is represented by a simplified tetrahedral control mesh over the spatial-temporal video volume, with color attributes defined at the mesh vertices. We present novel techniques for simplification and subdivision of a tetrahedral mesh to achieve high simplification ratio while preserving features and ensuring color fidelity. From an input raster video, our method is capable of generating a compact video in vector representation that allows a faithful reconstruction with low reconstruction errors.

  11. Hyperbolic-symmetry vector fields.

    Science.gov (United States)

    Gao, Xu-Zhen; Pan, Yue; Cai, Meng-Qiang; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2015-12-14

    We present and construct a new kind of orthogonal coordinate system, hyperbolic coordinate system. We present and design a new kind of local linearly polarized vector fields, which is defined as the hyperbolic-symmetry vector fields because the points with the same polarization form a series of hyperbolae. We experimentally demonstrate the generation of such a kind of hyperbolic-symmetry vector optical fields. In particular, we also study the modified hyperbolic-symmetry vector optical fields with the twofold and fourfold symmetric states of polarization when introducing the mirror symmetry. The tight focusing behaviors of these vector fields are also investigated. In addition, we also fabricate micro-structures on the K9 glass surfaces by several tightly focused (modified) hyperbolic-symmetry vector fields patterns, which demonstrate that the simulated tightly focused fields are in good agreement with the fabricated micro-structures.

  12. Extended vector-tensor theories

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, Rampei; Naruko, Atsushi; Yoshida, Daisuke, E-mail: rampei@th.phys.titech.ac.jp, E-mail: naruko@th.phys.titech.ac.jp, E-mail: yoshida@th.phys.titech.ac.jp [Department of Physics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan)

    2017-01-01

    Recently, several extensions of massive vector theory in curved space-time have been proposed in many literatures. In this paper, we consider the most general vector-tensor theories that contain up to two derivatives with respect to metric and vector field. By imposing a degeneracy condition of the Lagrangian in the context of ADM decomposition of space-time to eliminate an unwanted mode, we construct a new class of massive vector theories where five degrees of freedom can propagate, corresponding to three for massive vector modes and two for massless tensor modes. We find that the generalized Proca and the beyond generalized Proca theories up to the quartic Lagrangian, which should be included in this formulation, are degenerate theories even in curved space-time. Finally, introducing new metric and vector field transformations, we investigate the properties of thus obtained theories under such transformations.

  13. Human Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots

    Directory of Open Access Journals (Sweden)

    Mazen Ghandour

    2017-06-01

    Full Text Available In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of the robots in implementing their tasks, especially when the robots navigate in crowded and dynamic environments, which include humans. Traditional collision avoidance methods deal with the human as a dynamic obstacle, without taking into consideration that the human will also try to avoid the robot, and this causes the people and the robot to get confused, especially in crowded social places such as restaurants, hospitals, and laboratories. To avoid such scenarios, a reactive-supervised collision avoidance system for mobile robots based on human-robot interaction is implemented. In this method, both the robot and the human will collaborate in generating the collision avoidance via interaction. The person will notify the robot about the avoidance direction via interaction, and the robot will search for the optimal collision-free path on the selected direction. In case that no people interacted with the robot, it will select the navigation path autonomously and select the path that is closest to the goal location. The humans will interact with the robot using gesture recognition and Kinect sensor. To build the gesture recognition system, two models were used to classify these gestures, the first model is Back-Propagation Neural Network (BPNN, and the second model is Support Vector Machine (SVM. Furthermore, a novel collision avoidance system for avoiding the obstacles is implemented and integrated with the HRI system. The system is tested on H20 robot from DrRobot Company (Canada and a set of experiments were implemented to report the performance of the system in interacting with the human and avoiding

  14. Optimality Conditions in Vector Optimization

    CERN Document Server

    Jiménez, Manuel Arana; Lizana, Antonio Rufián

    2011-01-01

    Vector optimization is continuously needed in several science fields, particularly in economy, business, engineering, physics and mathematics. The evolution of these fields depends, in part, on the improvements in vector optimization in mathematical programming. The aim of this Ebook is to present the latest developments in vector optimization. The contributions have been written by some of the most eminent researchers in this field of mathematical programming. The Ebook is considered essential for researchers and students in this field.

  15. Symmetric vectors and algebraic classification

    International Nuclear Information System (INIS)

    Leibowitz, E.

    1980-01-01

    The concept of symmetric vector field in Riemannian manifolds, which arises in the study of relativistic cosmological models, is analyzed. Symmetric vectors are tied up with the algebraic properties of the manifold curvature. A procedure for generating a congruence of symmetric fields out of a given pair is outlined. The case of a three-dimensional manifold of constant curvature (''isotropic universe'') is studied in detail, with all its symmetric vector fields being explicitly constructed

  16. Vector continued fractions using a generalized inverse

    International Nuclear Information System (INIS)

    Haydock, Roger; Nex, C M M; Wexler, Geoffrey

    2004-01-01

    A real vector space combined with an inverse (involution) for vectors is sufficient to define a vector continued fraction whose parameters consist of vector shifts and changes of scale. The choice of sign for different components of the vector inverse permits construction of vector analogues of the Jacobi continued fraction. These vector Jacobi fractions are related to vector and scalar-valued polynomial functions of the vectors, which satisfy recurrence relations similar to those of orthogonal polynomials. The vector Jacobi fraction has strong convergence properties which are demonstrated analytically, and illustrated numerically

  17. Principal-vector-directed fringe-tracking technique.

    Science.gov (United States)

    Zhang, Zhihui; Guo, Hongwei

    2014-11-01

    Fringe tracking is one of the most straightforward techniques for analyzing a single fringe pattern. This work presents a principal-vector-directed fringe-tracking technique. It uses Gaussian derivatives for estimating fringe gradients and uses hysteresis thresholding for segmenting singular points, thus improving the principal component analysis method. Using it allows us to estimate the principal vectors of fringes from a pattern with high noise. The fringe-tracking procedure is directed by these principal vectors, so that erroneous results induced by noise and other error-inducing factors are avoided. At the same time, the singular point regions of the fringe pattern are identified automatically. Using them allows us to determine paths through which the "seed" point for each fringe skeleton is easy to find, thus alleviating the computational burden in processing the fringe pattern. The results of a numerical simulation and experiment demonstrate this method to be valid.

  18. Inflammatory reaction in chondroblastoma

    International Nuclear Information System (INIS)

    Yamamura, Sigeki; Sato, Keiji; Sugiura, Hideshi; Iwata, Hisashi

    1996-01-01

    The objective of this study was to evaluate the inflammatory reaction accompanying chondroblastoma and to define the value of the finding in clinical practice. We reviewed the clinical, radiographic, and magnetic resonance (MR) findings in six patients with histologically proven chondroblastoma. In all cases, MR imaging showered marrow and soft tissue edema. In four of six cases, periosteal reaction related to intra-osseous edema was more clearly demonstrated on MR imaging than on radiographs. Follow-up MR studies after surgery were available in three patients and all showed disappearance of inflammatory responses such as marrow and soft tissue edema, and reactive synovitis. We propose that these inflammatory reactions of chondroblastomas are inportant signs for detecting residual tumor in recurrences after surgery, as well as for making a precise diagnosis. The MR changes may also be valuable in demonstrating eradication of the tumor. (orig./MG)

  19. Lung inflammatory pseudo tumor

    International Nuclear Information System (INIS)

    Veliz, Elizabeth; Leone, Gaetano; Cano, Fernando; Sanchez, Jaime

    2005-01-01

    The inflammatory pseudo tumor is a non neoplastic process characterized by an irregular growth of inflammatory cells. We described the case of a 38 year-old patient, she went to our institute for a in situ cervix cancer and left lung nodule without breathing symptoms; valued by neumology who did bronchoscopy with biopsy whose result was negative for malignancy. She went to surgery in where we find intraparenquima nodule in felt lingula of approximately 4 cms, we remove it; the result was: Inflammatory pseudotumor. This pathology is a not very frequent, it can develop in diverse regions of the organism, it is frequent in lung. The image tests are not specific for the diagnose, which it is possible only with the biopsy. The treatment is the complete resection. (The author)

  20. Inflammatory reaction in chondroblastoma

    Energy Technology Data Exchange (ETDEWEB)

    Yamamura, Sigeki [Dept. of Orthopedic Surgery, Nagoya Univ. School of Medicine (Japan); Sato, Keiji [Dept. of Orthopedic Surgery, Nagoya Univ. School of Medicine (Japan); Sugiura, Hideshi [Dept. of Orthopedic Surgery, Nagoya Univ. School of Medicine (Japan); Iwata, Hisashi [Dept. of Orthopedic Surgery, Nagoya Univ. School of Medicine (Japan)

    1996-05-01

    The objective of this study was to evaluate the inflammatory reaction accompanying chondroblastoma and to define the value of the finding in clinical practice. We reviewed the clinical, radiographic, and magnetic resonance (MR) findings in six patients with histologically proven chondroblastoma. In all cases, MR imaging showered marrow and soft tissue edema. In four of six cases, periosteal reaction related to intra-osseous edema was more clearly demonstrated on MR imaging than on radiographs. Follow-up MR studies after surgery were available in three patients and all showed disappearance of inflammatory responses such as marrow and soft tissue edema, and reactive synovitis. We propose that these inflammatory reactions of chondroblastomas are inportant signs for detecting residual tumor in recurrences after surgery, as well as for making a precise diagnosis. The MR changes may also be valuable in demonstrating eradication of the tumor. (orig./MG)

  1. Chameleon vector bosons

    International Nuclear Information System (INIS)

    Nelson, Ann E.; Walsh, Jonathan

    2008-01-01

    We show that for a force mediated by a vector particle coupled to a conserved U(1) charge, the apparent range and strength can depend on the size and density of the source, and the proximity to other sources. This chameleon effect is due to screening from a light charged scalar. Such screening can weaken astrophysical constraints on new gauge bosons. As an example we consider the constraints on chameleonic gauged B-L. We show that although Casimir measurements greatly constrain any B-L force much stronger than gravity with range longer than 0.1 μm, there remains an experimental window for a long-range chameleonic B-L force. Such a force could be much stronger than gravity, and long or infinite range in vacuum, but have an effective range near the surface of the earth which is less than a micron.

  2. Architecture and Vector Control

    DEFF Research Database (Denmark)

    von Seidlein, Lorenz; Knols, Bart GJ; Kirby, Matthew

    2012-01-01

    , closing of eaves and insecticide treated bednets. All of these interventions have an effect on the indoor climate. Temperature, humidity and airflow are critical for a comfortable climate. Air-conditioning and fans allow us to control indoor climate, but many people in Africa and Asia who carry the brunt...... of vector-borne diseases have no access to electricity. Many houses in the hot, humid regions of Asia have adapted to the environment, they are built of porous materials and are elevated on stilts features which allow a comfortable climate even in the presence of bednets and screens. In contrast, many...... buildings in Africa and Asia in respect to their indoor climate characteristics and finally, show how state-of-the-art 3D modelling can predict climate characteristics and help to optimize buildings....

  3. Covariant Lyapunov vectors

    International Nuclear Information System (INIS)

    Ginelli, Francesco; Politi, Antonio; Chaté, Hugues; Livi, Roberto

    2013-01-01

    Recent years have witnessed a growing interest in covariant Lyapunov vectors (CLVs) which span local intrinsic directions in the phase space of chaotic systems. Here, we review the basic results of ergodic theory, with a specific reference to the implications of Oseledets’ theorem for the properties of the CLVs. We then present a detailed description of a ‘dynamical’ algorithm to compute the CLVs and show that it generically converges exponentially in time. We also discuss its numerical performance and compare it with other algorithms presented in the literature. We finally illustrate how CLVs can be used to quantify deviations from hyperbolicity with reference to a dissipative system (a chain of Hénon maps) and a Hamiltonian model (a Fermi–Pasta–Ulam chain). This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Lyapunov analysis: from dynamical systems theory to applications’. (paper)

  4. Generalization of socially transmitted and instructed avoidance

    Directory of Open Access Journals (Sweden)

    Gemma eCameron

    2015-06-01

    Full Text Available Excessive avoidance behavior, in which an instrumental action prevents an upcoming aversive event, is a defining feature of anxiety disorders. Left unchecked, both fear and avoidance of potentially threatening stimuli may generalize to perceptually related stimuli and situations. The behavioral consequences of generalization mean that aversive learning experiences with specific threats may lead people to infer that classes of related stimuli are threatening, potentially dangerous, and need to be avoided, despite differences in physical form. Little is known about avoidance generalization in humans and the learning pathways by which it may be transmitted. In the present study, we compared two pathways to avoidance, instructions and social observation, on subsequent generalization of avoidance behavior, fear expectancy and physiological arousal. Participants first learned that one cue was a danger cue (conditioned stimulus, CS+ and another was a safety cue (CS-. Groups then were either instructed that a simple avoidance response in the presence of the CS+ cancelled upcoming shock presentations (instructed-learning group or observed a short movie showing a demonstrator performing the avoidance response to prevent shock (observational-learning group. During generalization testing, danger and safety cues were presented along with generalization stimuli that parametrically varied in perceptual similarity to the CS+. Reinstatement of fear and avoidance was also tested. Findings demonstrate, for the first time, generalization of socially transmitted and instructed avoidance: both groups showed comparable generalization gradients in fear expectancy, avoidance behavior and arousal. Return of fear was evident, suggesting that generalized avoidance remains persistent following extinction testing. The utility of the present paradigm for research on avoidance generalization is discussed.

  5. Vasculitis and inflammatory arthritis.

    Science.gov (United States)

    Watts, Richard A; Scott, David G I

    2016-10-01

    Vasculitis has been described in most types of inflammatory arthritis. The best described and most widely recognised form is rheumatoid vasculitis. The incidence of systemic rheumatoid vasculitis has declined significantly following the general early use of methotrexate in the 1990s, and it is now a rare form of vasculitis. Treatment of rheumatoid vasculitis is conventionally with glucocorticoids and cyclophosphamide, but there is an increasing role for rituximab similar to that in other types of vasculitis. Despite these developments the mortality of rheumatoid vasculitis remains high. Vasculitis in other types of inflammatory arthritis is less well described and the treatment remains empirical. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. T cells in vascular inflammatory diseases

    Directory of Open Access Journals (Sweden)

    Lucas L Lintermans

    2014-10-01

    Full Text Available Inflammation of the human vasculature is a manifestation of many different diseases ranging from systemic autoimmune diseases to chronic inflammatory diseases, in which multiple types of immune cells are involved. For both autoimmune diseases and chronic inflammatory diseases several observations support a key role for T lymphocytes in these disease pathologies, but the underlying mechanisms are poorly understood. Previous studies in several autoimmune diseases have demonstrated a significant role for a specific subset of CD4+ T cells termed effector memory T cells. This expanded population of effector memory T cells may contribute to tissue injury and disease progression. These cells exert multiple pro-inflammatory functions through the release of effector cytokines. Many of these cytokines have been detected in the inflammatory lesions and participate in the vasculitic reaction, contributing to recruitment of macrophages, neutrophils, dendritic cells, NK cells, B cells and T cells. In addition, functional impairment of regulatory T cells paralyzes anti-inflammatory effects in vasculitic disorders. Interestingly, activation of effector memory T cells in uniquely dependent on the voltage-gated Kv1.3 potassium channel providing an anchor for specific drug targeting. In this review, we focus on the CD4+ T cells in the context of vascular inflammation and describe the evidence supporting the role of different T cell subsets in vascular inflammation. Selective targeting of pathogenic effector memory T cells might enable a more tailored therapeutic approach that avoids unwanted adverse side effects of generalized immunosuppression by modulating the effector functions of T cell responses to inhibit the development of vascular inflammation.

  7. Flocking Control of Multiple Mobile Agents with the Rules of Avoiding Collision

    Directory of Open Access Journals (Sweden)

    Hongtao Zhou

    2015-01-01

    Full Text Available This paper investigates the flocking and the coordinative control problems of multiple mobile agents with the rules of avoiding collision. We propose a set of control laws using hysteresis in adding new links and applying new potential function to guarantee that the fragmentation of the network can be avoided, under which all agents approach a common velocity vector, and asymptotically converge to a fixed value of interagent distances and collisions between agents can be avoided throughout the motion. Furthermore, we extend the flocking algorithm to solve the flocking situation of the group with a virtual leader agent. The laws can make all agents asymptotically approach the virtual leader and collisions can be avoided between agents in the motion evolution. Finally, some numerical simulations are showed to illustrate the theoretical results.

  8. Support vector machines and generalisation in HEP

    Science.gov (United States)

    Bevan, Adrian; Gamboa Goñi, Rodrigo; Hays, Jon; Stevenson, Tom

    2017-10-01

    We review the concept of Support Vector Machines (SVMs) and discuss examples of their use in a number of scenarios. Several SVM implementations have been used in HEP and we exemplify this algorithm using the Toolkit for Multivariate Analysis (TMVA) implementation. We discuss examples relevant to HEP including background suppression for H → τ + τ - at the LHC with several different kernel functions. Performance benchmarking leads to the issue of generalisation of hyper-parameter selection. The avoidance of fine tuning (over training or over fitting) in MVA hyper-parameter optimisation, i.e. the ability to ensure generalised performance of an MVA that is independent of the training, validation and test samples, is of utmost importance. We discuss this issue and compare and contrast performance of hold-out and k-fold cross-validation. We have extended the SVM functionality and introduced tools to facilitate cross validation in TMVA and present results based on these improvements.

  9. Inflammatory injury to the neonatal brain – what can we do?

    Directory of Open Access Journals (Sweden)

    Noa eOfek-shlomai

    2014-04-01

    Full Text Available Abstract Perinatal brain damage is one of the leading causes of life long disability. This damage could be hypoxic-ischemic, inflammatory or both.This mini-review discusses different interventions aiming at minimizing inflammatory processes in the neonatal brain, both before and after insult. Current options of anti-inflammatory measures for neonates remain quite limited. We describe current anti-inflammatory intervention strategies such as avoiding perinatal infection and inflammation, and reducing exposure to inflammatory processes. We describe the known effects of anti-inflammatory drugs such as steroids, antibiotics, and indomethacin, and the possible anti-inflammatory role of other substances such as IL-1receptor antagonists, erythropoietin, caffeine, estradiol, insulin like growth factor and melatonin as well as endogenous protectors, and genetic regulation of inflammation. If successful, these may decrease mortality and long term morbidity among term and preterm infants.

  10. Simplified Representation of Vector Fields

    NARCIS (Netherlands)

    Telea, Alexandru; Wijk, Jarke J. van

    1999-01-01

    Vector field visualization remains a difficult task. Although many local and global visualization methods for vector fields such as flow data exist, they usually require extensive user experience on setting the visualization parameters in order to produce images communicating the desired insight. We

  11. Estimation of Motion Vector Fields

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    1993-01-01

    This paper presents an approach to the estimation of 2-D motion vector fields from time varying image sequences. We use a piecewise smooth model based on coupled vector/binary Markov random fields. We find the maximum a posteriori solution by simulated annealing. The algorithm generate sample...... fields by means of stochastic relaxation implemented via the Gibbs sampler....

  12. GPU Accelerated Vector Median Filter

    Science.gov (United States)

    Aras, Rifat; Shen, Yuzhong

    2011-01-01

    Noise reduction is an important step for most image processing tasks. For three channel color images, a widely used technique is vector median filter in which color values of pixels are treated as 3-component vectors. Vector median filters are computationally expensive; for a window size of n x n, each of the n(sup 2) vectors has to be compared with other n(sup 2) - 1 vectors in distances. General purpose computation on graphics processing units (GPUs) is the paradigm of utilizing high-performance many-core GPU architectures for computation tasks that are normally handled by CPUs. In this work. NVIDIA's Compute Unified Device Architecture (CUDA) paradigm is used to accelerate vector median filtering. which has to the best of our knowledge never been done before. The performance of GPU accelerated vector median filter is compared to that of the CPU and MPI-based versions for different image and window sizes, Initial findings of the study showed 100x improvement of performance of vector median filter implementation on GPUs over CPU implementations and further speed-up is expected after more extensive optimizations of the GPU algorithm .

  13. Archimedeanization of ordered vector spaces

    OpenAIRE

    Emelyanov, Eduard Yu.

    2014-01-01

    In the case of an ordered vector space with an order unit, the Archimedeanization method has been developed recently by V.I Paulsen and M. Tomforde. We present a general version of the Archimedeanization which covers arbitrary ordered vector spaces.

  14. Renal inflammatory myofibroblastic tumor

    DEFF Research Database (Denmark)

    Heerwagen, S T; Jensen, C; Bagi, P

    2007-01-01

    Renal inflammatory myofibroblastic tumor (IMT) is a rare soft-tissue tumor of controversial etiology with a potential for local recurrence after incomplete surgical resection. The radiological findings in renal IMT are not well described. We report two cases in adults with a renal mass treated...

  15. Pelvic Inflammatory Disease (PID)

    Science.gov (United States)

    ... a serious condition, in women. 1 in 8 women with a history of PID experience difficulties getting pregnant. You can prevent PID if you know how to protect yourself. What is PID? Pelvic inflammatory disease is an infection of a woman’s reproductive organs. It is a complication often caused ...

  16. Inflammatory bowel disease epidemiology

    DEFF Research Database (Denmark)

    Burisch, Johan; Munkholm, Pia

    2013-01-01

    The occurrence of inflammatory bowel disease (IBD) is increasing worldwide, yet the reasons remain unknown. New therapeutic approaches have been introduced in medical IBD therapy, but their impact on the natural history of IBD remains uncertain. This review will summarize the recent findings...

  17. Integration of Weather Avoidance and Traffic Separation

    Science.gov (United States)

    Consiglio, Maria C.; Chamberlain, James P.; Wilson, Sara R.

    2011-01-01

    This paper describes a dynamic convective weather avoidance concept that compensates for weather motion uncertainties; the integration of this weather avoidance concept into a prototype 4-D trajectory-based Airborne Separation Assurance System (ASAS) application; and test results from a batch (non-piloted) simulation of the integrated application with high traffic densities and a dynamic convective weather model. The weather model can simulate a number of pseudo-random hazardous weather patterns, such as slow- or fast-moving cells and opening or closing weather gaps, and also allows for modeling of onboard weather radar limitations in range and azimuth. The weather avoidance concept employs nested "core" and "avoid" polygons around convective weather cells, and the simulations assess the effectiveness of various avoid polygon sizes in the presence of different weather patterns, using traffic scenarios representing approximately two times the current traffic density in en-route airspace. Results from the simulation experiment show that the weather avoidance concept is effective over a wide range of weather patterns and cell speeds. Avoid polygons that are only 2-3 miles larger than their core polygons are sufficient to account for weather uncertainties in almost all cases, and traffic separation performance does not appear to degrade with the addition of weather polygon avoidance. Additional "lessons learned" from the batch simulation study are discussed in the paper, along with insights for improving the weather avoidance concept. Introduction

  18. Vector superconductivity in cosmic strings

    International Nuclear Information System (INIS)

    Dvali, G.R.; Mahajan, S.M.

    1992-03-01

    We argue that in most realistic cases, the usual Witten-type bosonic superconductivity of the cosmic string is automatically (independent of the existence of superconducting currents) accompanied by the condensation of charged gauge vector bosons in the core giving rise to a new vector type superconductivity. The value of the charged vector condensate is related with the charged scalar expectation value, and vanishes only if the latter goes to zero. The mechanism for the proposed vector superconductivity, differing fundamentally from those in the literature, is delineated using the simplest realistic example of the two Higgs doublet standard model interacting with the extra cosmic string. It is shown that for a wide range of parameters, for which the string becomes scalarly superconducting, W boson condensates (the sources of vector superconductivity) are necessarily excited. (author). 14 refs

  19. Anisotropic cosmological solutions in massive vector theories

    Energy Technology Data Exchange (ETDEWEB)

    Heisenberg, Lavinia [Institute for Theoretical Studies, ETH Zurich, Clausiusstrasse 47, 8092 Zurich (Switzerland); Kase, Ryotaro; Tsujikawa, Shinji, E-mail: Lavinia.heisenberg@googlemail.com, E-mail: r.kase@rs.tus.ac.jp, E-mail: shinji@rs.kagu.tus.ac.jp [Department of Physics, Faculty of Science, Tokyo University of Science, 1-3, Kagurazaka, Shinjuku-ku, Tokyo 162-8601 (Japan)

    2016-11-01

    In beyond-generalized Proca theories including the extension to theories higher than second order, we study the role of a spatial component v of a massive vector field on the anisotropic cosmological background. We show that, as in the case of the isotropic cosmological background, there is no additional ghostly degrees of freedom associated with the Ostrogradski instability. In second-order generalized Proca theories we find the existence of anisotropic solutions on which the ratio between the anisotropic expansion rate Σ and the isotropic expansion rate H remains nearly constant in the radiation-dominated epoch. In the regime where Σ/ H is constant, the spatial vector component v works as a dark radiation with the equation of state close to 1/3. During the matter era, the ratio Σ/ H decreases with the decrease of v . As long as the conditions |Σ| || H and v {sup 2} || φ{sup 2} are satisfied around the onset of late-time cosmic acceleration, where φ is the temporal vector component, we find that the solutions approach the isotropic de Sitter fixed point (Σ = 0 = v ) in accordance with the cosmic no-hair conjecture. In the presence of v and Σ the early evolution of the dark energy equation of state w {sub DE} in the radiation era is different from that in the isotropic case, but the approach to the isotropic value w {sub DE}{sup (iso)} typically occurs at redshifts z much larger than 1. Thus, apart from the existence of dark radiation, the anisotropic cosmological dynamics at low redshifts is similar to that in isotropic generalized Proca theories. In beyond-generalized Proca theories the only consistent solution to avoid the divergence of a determinant of the dynamical system corresponds to v = 0, so Σ always decreases in time.

  20. Anisotropic cosmological solutions in massive vector theories

    International Nuclear Information System (INIS)

    Heisenberg, Lavinia; Kase, Ryotaro; Tsujikawa, Shinji

    2016-01-01

    In beyond-generalized Proca theories including the extension to theories higher than second order, we study the role of a spatial component v of a massive vector field on the anisotropic cosmological background. We show that, as in the case of the isotropic cosmological background, there is no additional ghostly degrees of freedom associated with the Ostrogradski instability. In second-order generalized Proca theories we find the existence of anisotropic solutions on which the ratio between the anisotropic expansion rate Σ and the isotropic expansion rate H remains nearly constant in the radiation-dominated epoch. In the regime where Σ/ H is constant, the spatial vector component v works as a dark radiation with the equation of state close to 1/3. During the matter era, the ratio Σ/ H decreases with the decrease of v . As long as the conditions |Σ| || H and v 2 || φ 2 are satisfied around the onset of late-time cosmic acceleration, where φ is the temporal vector component, we find that the solutions approach the isotropic de Sitter fixed point (Σ = 0 = v ) in accordance with the cosmic no-hair conjecture. In the presence of v and Σ the early evolution of the dark energy equation of state w DE in the radiation era is different from that in the isotropic case, but the approach to the isotropic value w DE (iso) typically occurs at redshifts z much larger than 1. Thus, apart from the existence of dark radiation, the anisotropic cosmological dynamics at low redshifts is similar to that in isotropic generalized Proca theories. In beyond-generalized Proca theories the only consistent solution to avoid the divergence of a determinant of the dynamical system corresponds to v = 0, so Σ always decreases in time.

  1. Emerging vector borne diseases – incidence through vectors

    Directory of Open Access Journals (Sweden)

    Sara eSavic

    2014-12-01

    Full Text Available Vector borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowdays, in intercontinetal countries, there is a struggle with emerging diseases which have found their way to appear through vectors. Vector borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector borne infectious diseases and disease outbreaks. It could affect the range and popultion of pathogens, host and vectors, transmission season, etc. Reliable surveilance for diseases that are most likely to emerge is required. Canine vector borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, erlichiosis, leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fudamental role at primeraly prevention and then treatment of vector borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases.During a four year period, from 2009-2013, a total number of 551 dog samples were analysed for vector borne diseases (borreliosis, babesiosis, erlichiosis, anaplasmosis, dirofilariosis and leishmaniasis in routine laboratory work. The analysis were done by serological tests – ELISA for borreliosis, dirofilariosis and leishmaniasis, modified Knott test for dirofilariosis and blood smear for babesiosis, erlichiosis and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on avarege more then half of the samples

  2. Bearing estimation with acoustic vector-sensor arrays

    International Nuclear Information System (INIS)

    Hawkes, M.; Nehorai, A.

    1996-01-01

    We consider direction-of-arrival (DOA) estimation using arrays of acoustic vector sensors in free space, and derive expressions for the Cramacute er-Rao bound on the DOA parameters when there is a single source. The vector-sensor array is seen to have improved performance over the traditional scalar-sensor (pressure-sensor) array for two distinct reasons: its elements have an inherent directional sensitivity and the array makes a greater number of measurements. The improvement is greatest for small array apertures and low signal-to-noise ratios. Examination of the conventional beamforming and Capon DOA estimators shows that vector-sensor arrays can completely resolve the bearing, even with a linear array, and can remove the ambiguities associated with spatial undersampling. We also propose and analyze a diversely-oriented array of velocity sensors that possesses some of the advantages of the vector-sensor array without the increase in hardware and computation. In addition, in certain scenarios it can avoid problems with spatially correlated noise that the vector-sensor array may suffer. copyright 1996 American Institute of Physics

  3. A Demonstration of Approach and Avoidance Conflicts

    Science.gov (United States)

    Terry, W. Scott

    2010-01-01

    Choosing between 2 unpleasant alternatives (Would you rather be less intelligent or less attractive?) is more difficult than choosing between two desirable options (Would you rather be more intelligent or more attractive?). Here I describe a classroom demonstration of avoidance-avoidance conflicts. Students make a series of approach-approach and…

  4. Effects of IFRS adoption on tax avoidance

    Directory of Open Access Journals (Sweden)

    Renata Nogueira Braga

    Full Text Available ABSTRACT This study investigates the association between mandatory International Financial Reporting Standards (IFRS adoption and corporate tax avoidance. In this study, tax avoidance is defined as a reduction in the effective corporate income tax rate through tax planning activities, whether these are legal, questionable, or even illegal. Three measures of tax avoidance are used and factors at the country and firm level (that have already been associated with tax avoidance in prior research are controlled. Using samples that range from 9,389 to 15,423 publicly-traded companies from 35 countries, covering 1999 to 2014, it is found that IFRS adoption is associated with higher levels of corporate tax avoidance, even when the level of book-tax conformity required in the countries and the volume of accruals are controlled, both of which are considered potential determinants of this relationship. Furthermore, the results suggest that after IFRS adoption, firms in higher book-tax conformity environments engage more in tax avoidance than firms in lower book-tax conformity environments. It is also identified that engagement in tax avoidance after IFRS adoption derives not only from accruals management, but also from practices that do not involve accruals. The main conclusion is that companies engage more in tax avoidance after mandatory IFRS adoption.

  5. Enhancing poxvirus vectors vaccine immunogenicity.

    Science.gov (United States)

    García-Arriaza, Juan; Esteban, Mariano

    2014-01-01

    Attenuated recombinant poxvirus vectors expressing heterologous antigens from pathogens are currently at various stages in clinical trials with the aim to establish their efficacy. This is because these vectors have shown excellent safety profiles, significant immunogenicity against foreign expressed antigens and are able to induce protective immune responses. In view of the limited efficacy triggered by some poxvirus strains used in clinical trials (i.e, ALVAC in the RV144 phase III clinical trial for HIV), and of the restrictive replication capacity of the highly attenuated vectors like MVA and NYVAC, there is a consensus that further improvements of these vectors should be pursuit. In this review we considered several strategies that are currently being implemented, as well as new approaches, to improve the immunogenicity of the poxvirus vectors. This includes heterologous prime/boost protocols, use of co-stimulatory molecules, deletion of viral immunomodulatory genes still present in the poxvirus genome, enhancing virus promoter strength, enhancing vector replication capacity, optimizing expression of foreign heterologous sequences, and the combined use of adjuvants. An optimized poxvirus vector triggering long-lasting immunity with a high protective efficacy against a selective disease should be sought.

  6. Stable piecewise polynomial vector fields

    Directory of Open Access Journals (Sweden)

    Claudio Pessoa

    2012-09-01

    Full Text Available Let $N={y>0}$ and $S={y<0}$ be the semi-planes of $mathbb{R}^2$ having as common boundary the line $D={y=0}$. Let $X$ and $Y$ be polynomial vector fields defined in $N$ and $S$, respectively, leading to a discontinuous piecewise polynomial vector field $Z=(X,Y$. This work pursues the stability and the transition analysis of solutions of $Z$ between $N$ and $S$, started by Filippov (1988 and Kozlova (1984 and reformulated by Sotomayor-Teixeira (1995 in terms of the regularization method. This method consists in analyzing a one parameter family of continuous vector fields $Z_{epsilon}$, defined by averaging $X$ and $Y$. This family approaches $Z$ when the parameter goes to zero. The results of Sotomayor-Teixeira and Sotomayor-Machado (2002 providing conditions on $(X,Y$ for the regularized vector fields to be structurally stable on planar compact connected regions are extended to discontinuous piecewise polynomial vector fields on $mathbb{R}^2$. Pertinent genericity results for vector fields satisfying the above stability conditions are also extended to the present case. A procedure for the study of discontinuous piecewise vector fields at infinity through a compactification is proposed here.

  7. Chikungunya Virus–Vector Interactions

    Directory of Open Access Journals (Sweden)

    Lark L. Coffey

    2014-11-01

    Full Text Available Chikungunya virus (CHIKV is a mosquito-borne alphavirus that causes chikungunya fever, a severe, debilitating disease that often produces chronic arthralgia. Since 2004, CHIKV has emerged in Africa, Indian Ocean islands, Asia, Europe, and the Americas, causing millions of human infections. Central to understanding CHIKV emergence is knowledge of the natural ecology of transmission and vector infection dynamics. This review presents current understanding of CHIKV infection dynamics in mosquito vectors and its relationship to human disease emergence. The following topics are reviewed: CHIKV infection and vector life history traits including transmission cycles, genetic origins, distribution, emergence and spread, dispersal, vector competence, vector immunity and microbial interactions, and co-infection by CHIKV and other arboviruses. The genetics of vector susceptibility and host range changes, population heterogeneity and selection for the fittest viral genomes, dual host cycling and its impact on CHIKV adaptation, viral bottlenecks and intrahost diversity, and adaptive constraints on CHIKV evolution are also discussed. The potential for CHIKV re-emergence and expansion into new areas and prospects for prevention via vector control are also briefly reviewed.

  8. Higher threat avoidance costs reduce avoidance behaviour which in turn promotes fear extinction in humans.

    Science.gov (United States)

    Rattel, Julina A; Miedl, Stephan F; Blechert, Jens; Wilhelm, Frank H

    2017-09-01

    Theoretical models specifying the underlying mechanisms of the development and maintenance of anxiety and related disorders state that fear responses acquired through classical Pavlovian conditioning are maintained by repeated avoidance behaviour; thus, it is assumed that avoidance prevents fear extinction. The present study investigated behavioural avoidance decisions as a function of avoidance costs in a naturalistic fear conditioning paradigm. Ecologically valid avoidance costs - manipulated between participant groups - were represented via time-delays during a detour in a gamified computer task. After differential acquisitions of shock-expectancy to a predictive conditioned stimulus (CS+), participants underwent extinction where they could either take a risky shortcut, while anticipating shock signaled by the CS+, or choose a costly avoidance option (lengthy detour); thus, they were faced with an approach-avoidance conflict. Groups with higher avoidance costs (longer detours) showed lower proportions of avoiders. Avoiders gave heightened shock-expectancy ratings post-extinction, demonstrating 'protecting from extinction', i.e. failure to extinguish. Moreover, there was an indirect effect of avoidance costs on protection from extinction through avoidance behaviour. No moderating role of trait-anxiety was found. Theoretical implications of avoidance behaviour are discussed, considering the involvement of instrumental learning in the maintenance of fear responses. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Violation of vector dominance in the vector manifestation

    International Nuclear Information System (INIS)

    Sasaki, Chihiro

    2003-01-01

    The vector manifestation (VM) is a new pattern for realizing the chiral symmetry in QCD. In the VM, the massless vector meson becomes the chiral partner of pion at the critical point, in contrast with the restoration based on the linear sigma model. Including the intrinsic temperature dependences of the parameters of the hidden local symmetry (HLS) Lagrangian determined from the underlying QCD through the Wilsonian matching together with the hadronic thermal corrections, we present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion. We find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analysis on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson. (author)

  10. The systemic inflammatory response syndrome.

    Science.gov (United States)

    Robertson, Charles M; Coopersmith, Craig M

    2006-04-01

    The systemic inflammatory response syndrome (SIRS) is the body's response to an infectious or noninfectious insult. Although the definition of SIRS refers to it as an "inflammatory" response, it actually has pro- and anti-inflammatory components. This review outlines the pathophysiology of SIRS and highlights potential targets for future therapeutic intervention in patients with this complex entity.

  11. Emerging Vector-Borne Diseases - Incidence through Vectors.

    Science.gov (United States)

    Savić, Sara; Vidić, Branka; Grgić, Zivoslav; Potkonjak, Aleksandar; Spasojevic, Ljubica

    2014-01-01

    Vector-borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowadays, in intercontinental countries, there is a struggle with emerging diseases, which have found their way to appear through vectors. Vector-borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens, and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector-borne infectious diseases and disease outbreaks. It could affect the range and population of pathogens, host and vectors, transmission season, etc. Reliable surveillance for diseases that are most likely to emerge is required. Canine vector-borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, ehrlichiosis, and leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fundamental role at primarily prevention and then treatment of vector-borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases. During a 4-year period, from 2009 to 2013, a total number of 551 dog samples were analyzed for vector-borne diseases (borreliosis, babesiosis, ehrlichiosis, anaplasmosis, dirofilariosis, and leishmaniasis) in routine laboratory work. The analysis was done by serological tests - ELISA for borreliosis, dirofilariosis, and leishmaniasis, modified Knott test for dirofilariosis, and blood smear for babesiosis, ehrlichiosis, and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on average more then half of the samples

  12. On the Witt vector Frobenius

    DEFF Research Database (Denmark)

    Davis, Christopher James; Kedlaya, Kiran

    2014-01-01

    We study the kernel and cokernel of the Frobenius map on the p-typical Witt vectors of a commutative ring, not necessarily of characteristic p. We give many equivalent conditions to surjectivity of the Frobenius map on both finite and infinite length Witt vectors. In particular, surjectivity...... on finite Witt vectors turns out to be stable under certain integral extensions; this provides a clean formulation of a strong generalization of Faltings’s almost purity theorem from p-adic Hodge theory, incorporating recent improvements by Kedlaya–Liu and by Scholze....

  13. Vector boson scattering at CLIC

    Energy Technology Data Exchange (ETDEWEB)

    Kilian, Wolfgang; Fleper, Christian [Department Physik, Universitaet Siegen, 57068 Siegen (Germany); Reuter, Juergen [DESY Theory Group, 22603 Hamburg (Germany); Sekulla, Marco [Institut fuer Theoretische Physik, Karlsruher Institut fuer Technologie, 76131 Karlsruhe (Germany)

    2016-07-01

    Linear colliders operating in a range of multiple TeV are able to investigate the details of vector boson scattering and electroweak symmetry breaking. We calculate cross sections with the Monte Carlo generator WHIZARD for vector boson scattering processes at the future linear e{sup +} e{sup -} collider CLIC. By finding suitable cuts, the vector boson scattering signal processes are isolated from the background. Finally, we are able to determine exclusion sensitivities on the non-Standard Model parameters of the relevant dimension eight operators.

  14. Vector control of induction machines

    CERN Document Server

    Robyns, Benoit

    2012-01-01

    After a brief introduction to the main law of physics and fundamental concepts inherent in electromechanical conversion, ""Vector Control of Induction Machines"" introduces the standard mathematical models for induction machines - whichever rotor technology is used - as well as several squirrel-cage induction machine vector-control strategies. The use of causal ordering graphs allows systematization of the design stage, as well as standardization of the structure of control devices. ""Vector Control of Induction Machines"" suggests a unique approach aimed at reducing parameter sensitivity for

  15. Vectors of rickettsiae in Africa.

    Science.gov (United States)

    Bitam, Idir

    2012-12-01

    Vector-borne diseases are caused by parasites, bacteria, or viruses transmitted by the bites of hematophagous arthropods. In Africa, there has been a recent emergence of new diseases and the re-emergence of existing diseases, usually with changes in disease epidemiology (e.g., geographical distribution, prevalence, and pathogenicity). In Africa, rickettsioses are recognized as important emerging vector-borne infections in humans. Rickettsial diseases are transmitted by different types of arthropods, ticks, fleas, lice, and mites. This review will examine the roles of these different arthropod vectors and their geographical distributions. Copyright © 2012 Elsevier GmbH. All rights reserved.

  16. Recommendation on vectors and vector-transmitted diseases

    OpenAIRE

    Netherlands Food and Consumer Product Safety Authority

    2009-01-01

    In view of their increasing risk of introduction and their possible implications in causing major disease outbreaks, vectors, as well as vector-transmitted diseases like dengue, West Nile disease, Lyme disease and bluetongue need to be recognised as a threat to public and animal health and to the economy, also in the Netherlands. There has been an increase in the incidence of these diseases in the past two to three decades. Climate changes and changes in the use of land, water managemen...

  17. Vector manifestation and violation of vector dominance in hot matter

    International Nuclear Information System (INIS)

    Harada, Masayasu; Sasaki, Chihiro

    2004-01-01

    We show the details of the calculation of the hadronic thermal corrections to the two-point functions in the effective field theory of QCD for pions and vector mesons based on the hidden local symmetry (HLS) in hot matter using the background field gauge. We study the temperature dependence of the pion velocity in the low-temperature region determined from the hadronic thermal corrections, and show that, due to the presence of the dynamical vector meson, the pion velocity is smaller than the speed of the light already at one-loop level, in contrast to the result obtained in the ordinary chiral perturbation theory including only the pion at one-loop. Including the intrinsic temperature dependences of the parameters of the HLS Lagrangian determined from the underlying QCD through the Wilsonian matching, we show how the vector manifestation (VM), in which the massless vector meson becomes the chiral partner of pion, is realized at the critical temperature. We present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion: we find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analyses on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson

  18. Vector independent transmission of the vector-borne bluetongue virus.

    Science.gov (United States)

    van der Sluijs, Mirjam Tineke Willemijn; de Smit, Abraham J; Moormann, Rob J M

    2016-01-01

    Bluetongue is an economically important disease of ruminants. The causative agent, Bluetongue virus (BTV), is mainly transmitted by insect vectors. This review focuses on vector-free BTV transmission, and its epizootic and economic consequences. Vector-free transmission can either be vertical, from dam to fetus, or horizontal via direct contract. For several BTV-serotypes, vertical (transplacental) transmission has been described, resulting in severe congenital malformations. Transplacental transmission had been mainly associated with live vaccine strains. Yet, the European BTV-8 strain demonstrated a high incidence of transplacental transmission in natural circumstances. The relevance of transplacental transmission for the epizootiology is considered limited, especially in enzootic areas. However, transplacental transmission can have a substantial economic impact due to the loss of progeny. Inactivated vaccines have demonstrated to prevent transplacental transmission. Vector-free horizontal transmission has also been demonstrated. Since direct horizontal transmission requires close contact of animals, it is considered only relevant for within-farm spreading of BTV. The genetic determinants which enable vector-free transmission are present in virus strains circulating in the field. More research into the genetic changes which enable vector-free transmission is essential to better evaluate the risks associated with outbreaks of new BTV serotypes and to design more appropriate control measures.

  19. In situ preparation of magnetic nonviral gene vectors and magnetofection in vitro

    International Nuclear Information System (INIS)

    Shi Yunfeng; Pang Yan; Su Yue; Zhu Xinyuan; Yan Deyue; Zhou Linzhu; Xiao Wangchuan; Wang Xiaoliang; Gu Hongchen; Wang Ruibin; Li Huiqin; Zhu Bangshang

    2010-01-01

    Magnetic nonviral gene vectors were in situ prepared in the presence of ferrous salts and hyperbranched poly(ethylenimine)s (HPEI) with different molecular weights. HPEI, one of the most promising nonviral vectors, was not only utilized as the nanoreactor and stabilizer to prepare magnetic nanoparticles, but also skillfully used as a base supplier to avoid introducing alkali hydroxide or ammonia. Magnetic nonviral gene vectors with various magnetite contents and saturation magnetizations were obtained by changing the weight ratio of HPEI to FeSO 4 ·7H 2 O and the molecular weight of HPEI. MTT assays suggested that the resulting magnetite/HPEI gene vectors had lower cytotoxicity compared with pure HPEI. The magnetite/HPEI nonviral gene vectors were used for magnetofection. It was found that the luciferase expression level mediated by magnetite/HPEI in COS-7 cells under a magnetic gradient field was approximately 13-fold greater than that of standard HPEI transfection.

  20. The Role of Model Fidelity in Model Predictive Control Based Hazard Avoidance in Unmanned Ground Vehicles Using Lidar Sensors

    Science.gov (United States)

    2013-03-08

    34 VPH : A New Laser Radar Based Obstacle Avoidance Method for Intelligent Mobile Robots", Proceedings of World Congress on Intelligent Control and...Automation, Hangzhou, China, 5, pp. 4681- 4685. [9] Gong, J., Duan, Y., Man, Y., and Xiong, G., 2007, " VPH +: An Enhanced Vector Polar Histogram Method

  1. Vectorization at the KENO-IV code

    International Nuclear Information System (INIS)

    Asai, K.; Higuchi, K.; Katakura, J.

    1986-01-01

    The multigroup criticality safety code KENO-IV has been vectorized and tested on the FACOM VP-100 vector processor. At first, the vectorized KENO-IV on a scalar processor was slower than the original one by a factor of 1.4 because of the overhead introduced by vectorization. Making modifications of algorithms and techniques for vectorization, the vectorized version has become faster than the original one by a factor of 1.4 on the vector processor. For further speedup of the code, some improvements on compiler and hardware, especially on addition of Monte Carlo pipelines to the vector processor, are discussed

  2. Introduction to matrices and vectors

    CERN Document Server

    Schwartz, Jacob T

    2001-01-01

    In this concise undergraduate text, the first three chapters present the basics of matrices - in later chapters the author shows how to use vectors and matrices to solve systems of linear equations. 1961 edition.

  3. GRE Enzymes for Vector Analysis

    Data.gov (United States)

    U.S. Environmental Protection Agency — Microbial enzyme data that were collected during the 2004-2006 EMAP-GRE program. These data were then used by Moorhead et al (2016) in their ecoenzyme vector...

  4. Scanning vector Hall probe microscopy

    International Nuclear Information System (INIS)

    Cambel, V.; Gregusova, D.; Fedor, J.; Kudela, R.; Bending, S.J.

    2004-01-01

    We have developed a scanning vector Hall probe microscope for mapping magnetic field vector over magnetic samples. The microscope is based on a micromachined Hall sensor and the cryostat with scanning system. The vector Hall sensor active area is ∼5x5 μm 2 . It is realized by patterning three Hall probes on the tilted faces of GaAs pyramids. Data from these 'tilted' Hall probes are used to reconstruct the full magnetic field vector. The scanning area of the microscope is 5x5 mm 2 , space resolution 2.5 μm, field resolution ∼1 μT Hz -1/2 at temperatures 10-300 K

  5. 3D vector flow imaging

    DEFF Research Database (Denmark)

    Pihl, Michael Johannes

    The main purpose of this PhD project is to develop an ultrasonic method for 3D vector flow imaging. The motivation is to advance the field of velocity estimation in ultrasound, which plays an important role in the clinic. The velocity of blood has components in all three spatial dimensions, yet...... are (vx, vy, vz) = (-0.03, 95, 1.0) ± (9, 6, 1) cm/s compared with the expected (0, 96, 0) cm/s. Afterwards, 3D vector flow images from a cross-sectional plane of the vessel are presented. The out of plane velocities exhibit the expected 2D circular-symmetric parabolic shape. The experimental results...... verify that the 3D TO method estimates the complete 3D velocity vectors, and that the method is suitable for 3D vector flow imaging....

  6. 3-D Vector Flow Imaging

    DEFF Research Database (Denmark)

    Holbek, Simon

    , if this significant reduction in the element count can still provide precise and robust 3-D vector flow estimates in a plane. The study concludes that the RC array is capable of estimating precise 3-D vector flow both in a plane and in a volume, despite the low channel count. However, some inherent new challenges...... ultrasonic vector flow estimation and bring it a step closer to a clinical application. A method for high frame rate 3-D vector flow estimation in a plane using the transverse oscillation method combined with a 1024 channel 2-D matrix array is presented. The proposed method is validated both through phantom...... hampers the task of real-time processing. In a second study, some of the issue with the 2-D matrix array are solved by introducing a 2-D row-column (RC) addressing array with only 62 + 62 elements. It is investigated both through simulations and via experimental setups in various flow conditions...

  7. Transcriptional Silencing of Retroviral Vectors

    DEFF Research Database (Denmark)

    Lund, Anders Henrik; Duch, M.; Pedersen, F.S.

    1996-01-01

    . Extinction of long-term vector expression has been observed after implantation of transduced hematopoietic cells as well as fibroblasts, myoblasts and hepatocytes. Here we review the influence of vector structure, integration site and cell type on transcriptional silencing. While down-regulation of proviral...... transcription is known from a number of cellular and animal models, major insight has been gained from studies in the germ line and embryonal cells of the mouse. Key elements for the transfer and expression of retroviral vectors, such as the viral transcriptional enhancer and the binding site for the t......RNA primer for reverse transcription may have a major influence on transcriptional silencing. Alterations of these elements of the vector backbone as well as the use of internal promoter elements from housekeeping genes may contribute to reduce transcriptional silencing. The use of cell culture and animal...

  8. High Accuracy Vector Helium Magnetometer

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed HAVHM instrument is a laser-pumped helium magnetometer with both triaxial vector and omnidirectional scalar measurement capabilities in a single...

  9. Ecology: avoidance of disease by social lobsters.

    Science.gov (United States)

    Behringer, Donald C; Butler, Mark J; Shields, Jeffrey D

    2006-05-25

    Transmissible pathogens are the bane of social animals, so they have evolved behaviours to decrease the probability of infection. There is no record, however, of social animals avoiding diseased individuals of their own species in the wild. Here we show how healthy, normally gregarious Caribbean spiny lobsters (Panulirus argus) avoid conspecifics that are infected with a lethal virus. Early detection and avoidance of infected, though not yet infectious, individuals by healthy lobsters confers a selective advantage and highlights the importance of host behaviour in disease transmission among natural populations.

  10. An exotic composite vector boson

    International Nuclear Information System (INIS)

    Akama, Keiichi; Hattori, Takashi; Yasue, Masaki.

    1990-08-01

    An exotic composite vector boson, V, is introduced in two dynamical models of composite quarks, leptons, W and Z. One is based on four Fermi interactions, in which composite vector bosons are regarded as fermion-antifermion bound states and the other is based on the confining SU(2) L gauge model, in which they are given by scalar-antiscalar bound states. Both approaches describe the same effective interactions for the sector of composite quarks, leptons, W, Z, γ and V. (author)

  11. Microneedle-mediated delivery of viral vectored vaccines.

    Science.gov (United States)

    Zaric, Marija; Ibarzo Yus, Bárbara; Kalcheva, Petya Petrova; Klavinskis, Linda Sylvia

    2017-10-01

    Microneedle array platforms are a promising technology for vaccine delivery, due to their ease of administration with no sharp waste generated, small size, possibility of targeted delivery to the specified skin depth and efficacious delivery of different vaccine formulations, including viral vectors. Areas covered: Attributes and challenges of the most promising viral vector candidates that have advanced to the clinic and that have been leveraged for skin delivery by microneedles; The importance of understanding the immunobiology of antigen-presenting cells in the skin, in particular dendritic cells, in order to generate further improved skin vaccination strategies; recent studies where viral vectors expressing various antigens have been coupled with microneedle technology to examine their potential for improved vaccination. Expert opinion: Simple, economic and efficacious vaccine delivery methods are needed to improve health outcomes and manage possible outbreaks of new emerging viruses. Understanding what innate/inflammatory signals are required to induce both immediate and long-term responses remains a major hurdle in the development of the effective vaccines. One approach to meet these needs is microneedle-mediated viral vector vaccination. In order for this technology to fulfil this potential the industry must invest significantly to further develop its design, production, biosafety, delivery and large-scale manufacturing.

  12. Vectoring of parallel synthetic jets

    Science.gov (United States)

    Berk, Tim; Ganapathisubramani, Bharathram; Gomit, Guillaume

    2015-11-01

    A pair of parallel synthetic jets can be vectored by applying a phase difference between the two driving signals. The resulting jet can be merged or bifurcated and either vectored towards the actuator leading in phase or the actuator lagging in phase. In the present study, the influence of phase difference and Strouhal number on the vectoring behaviour is examined experimentally. Phase-locked vorticity fields, measured using Particle Image Velocimetry (PIV), are used to track vortex pairs. The physical mechanisms that explain the diversity in vectoring behaviour are observed based on the vortex trajectories. For a fixed phase difference, the vectoring behaviour is shown to be primarily influenced by pinch-off time of vortex rings generated by the synthetic jets. Beyond a certain formation number, the pinch-off timescale becomes invariant. In this region, the vectoring behaviour is determined by the distance between subsequent vortex rings. We acknowledge the financial support from the European Research Council (ERC grant agreement no. 277472).

  13. Versatile generation of optical vector fields and vector beams using a non-interferometric approach.

    Science.gov (United States)

    Tripathi, Santosh; Toussaint, Kimani C

    2012-05-07

    We present a versatile, non-interferometric method for generating vector fields and vector beams which can produce all the states of polarization represented on a higher-order Poincaré sphere. The versatility and non-interferometric nature of this method is expected to enable exploration of various exotic properties of vector fields and vector beams. To illustrate this, we study the propagation properties of some vector fields and find that, in general, propagation alters both their intensity and polarization distribution, and more interestingly, converts some vector fields into vector beams. In the article, we also suggest a modified Jones vector formalism to represent vector fields and vector beams.

  14. Single-cycle adenovirus vectors in the current vaccine landscape.

    Science.gov (United States)

    Barry, Michael

    2018-02-01

    Traditional inactivated and protein vaccines generate strong antibodies, but struggle to generate T cell responses. Attenuated pathogen vaccines generate both, but risk causing the disease they aim to prevent. Newer gene-based vaccines drive both responses and avoid the risk of infection. While these replication-defective (RD) vaccines work well in small animals, they can be weak in humans because they do not replicate antigen genes like more potent replication-competent (RC) vaccines. RC vaccines generate substantially stronger immune responses, but also risk causing their own infections. To circumvent these problems, we developed single-cycle adenovirus (SC-Ad) vectors that amplify vaccine genes, but that avoid the risk of infection. This review will discuss these vectors and their prospects for use as vaccines. Areas covered: This review provides a background of different types of vaccines. The benefits of gene-based vaccines and their ability to replicate antigen genes are described. Adenovirus vectors are discussed and compared to other vaccine types. Replication-defective, single-cycle, and replication-competent Ad vaccines are compared. Expert commentary: The potential utility of these vaccines are discussed when used against infectious diseases and as cancer vaccines. We propose a move away from replication-defective vaccines towards more robust replication-competent or single-cycle vaccines.

  15. Toddlers at the Table: Avoiding Power Struggles

    Science.gov (United States)

    ... Search English Español Toddlers at the Table: Avoiding Power Struggles KidsHealth / For Parents / Toddlers at the Table: ... common concerns into opportunities to teach healthy eating habits. Most Toddlers Are Picky Eaters Many toddlers express ...

  16. How to avoid overheating during exercise

    Science.gov (United States)

    ... patientinstructions/000865.htm How to avoid overheating during exercise To use the sharing features on this page, ... condition can get heat illness. Stay Cool During Exercise Try these tips to help prevent heat-related ...

  17. Food Waste Avoidance Actions in Food Retailing

    DEFF Research Database (Denmark)

    Kulikovskaja, Viktorija; Aschemann-Witzel, Jessica

    2017-01-01

    Food waste occurs throughout the entire food supply chain, from production to consumption of food in households. Retailers are in a unique position to contribute to food waste avoidance, not only by minimizing the amount of waste in their distribution channels but also by influencing consumer...... attitudes and behaviors. This explorative study aims to identify which food waste avoidance actions are conducted by retailers in Denmark, to which extent, and how they vary across food categories and supermarket chain. Based on an analysis of secondary and empirical data collected via observations...... at retail stores, the authors identify 22 food waste avoidance actions in Danish retail. The results provide new insights into food waste avoidance in retail. Based on the findings, suggestions for further research directions are developed that should serve to identify the most efficient customer targeted...

  18. Directional Collision Avoidance in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2004-01-01

    This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and data packets in channel access...

  19. Foods to Avoid or Limit during Pregnancy

    Science.gov (United States)

    ... Global Map Premature Birth Report Cards Careers Archives Pregnancy Before or between pregnancies Nutrition, weight & fitness Prenatal ... during pregnancy Foods to avoid or limit during pregnancy E-mail to a friend Please fill in ...

  20. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  1. Dual Eligibles and Potentially Avoidable Hospitalizations

    Data.gov (United States)

    U.S. Department of Health & Human Services — About 25 percent of the hospitalizations for dual eligible beneficiaries in 2005 were potentially avoidable. Medicare and Medicaid spending for those potentially...

  2. Avoiding Anemia: Boost Your Red Blood Cells

    Science.gov (United States)

    ... Issues Subscribe January 2014 Print this issue Avoiding Anemia Boost Your Red Blood Cells En español Send ... Disease When Blood Cells Bend Wise Choices Preventing Anemia To prevent or treat iron-deficiency anemia: Eat ...

  3. ADVERTISING AVOIDANCE PADA IKLAN DI MEDIA TELEVISI

    OpenAIRE

    Indah Dwi Pratama; Ujang Sumarwan; Hari Wijayanto

    2016-01-01

    One factor that can interfere with the absorption rate of viewers on television advertisement is advertising avoidance which shows the difference between the number of viewers who watch advertisement programs and the number of viewers who watch television programs. The factors that affect advertising avoidance include the demography of the viewers (gender, age, area of residence, and social economic status, or SES), advertising attributes (the television stations, order of ads, genre of the p...

  4. Banking deregulation and corporate tax avoidance

    Directory of Open Access Journals (Sweden)

    Bill B. Francis

    2017-06-01

    Full Text Available We investigate whether tax avoidance substitutes for external financing. We exploit interstate banking deregulation as a quasi-external shock to examine whether firms engage in less tax avoidance after banking deregulation, because of cheaper and easier access to credit from banks. We find no empirical evidence to support this substitutive relation, even for firms with higher financial constraints or firms with higher external financing dependence.

  5. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  6. Pathological demand avoidance: Exploring the behavioural profile.

    OpenAIRE

    O Nions, E.; Viding, E.; Greven, C. U.; Ronald, A.; Happé, F.

    2014-01-01

    'Pathological Demand Avoidance' is a term increasingly used by practitioners in the United Kingdom. It was coined to describe a profile of obsessive resistance to everyday demands and requests, with a tendency to resort to 'socially manipulative' behaviour, including outrageous or embarrassing acts. Pathological demand avoidance is thought to share aspects of social impairment with autism spectrum disorders, but autism spectrum disorder-appropriate strategies, such as routine and repetition, ...

  7. Decays of the vector glueball

    Science.gov (United States)

    Giacosa, Francesco; Sammet, Julia; Janowski, Stanislaus

    2017-06-01

    We calculate two- and three-body decays of the (lightest) vector glueball into (pseudo)scalar, (axial-)vector, as well as pseudovector and excited vector mesons in the framework of a model of QCD. While absolute values of widths cannot be predicted because the corresponding coupling constants are unknown, some interesting branching ratios can be evaluated by setting the mass of the yet hypothetical vector glueball to 3.8 GeV as predicted by quenched lattice QCD. We find that the decay mode ω π π should be one of the largest (both through the decay chain O →b1π →ω π π and through the direct coupling O →ω π π ). Similarly, the (direct and indirect) decay into π K K*(892 ) is sizable. Moreover, the decays into ρ π and K*(892 )K are, although subleading, possible and could play a role in explaining the ρ π puzzle of the charmonium state ψ (2 S ) thanks to a (small) mixing with the vector glueball. The vector glueball can be directly formed at the ongoing BESIII experiment as well as at the future PANDA experiment at the FAIR facility. If the width is sufficiently small (≲100 MeV ) it should not escape future detection. It should be stressed that the employed model is based on some inputs and simplifying assumptions: the value of glueball mass (at present, the quenched lattice value is used), the lack of mixing of the glueball with other quarkonium states, and the use of few interaction terms. It then represents a first step toward the identification of the main decay channels of the vector glueball, but shall be improved when corresponding experimental candidates and/or new lattice results will be available.

  8. [Dermatological features of auto-inflammatory recurrent fevers].

    Science.gov (United States)

    Escudier, A; Mauvais, F-X; Bastard, P; Boussard, C; Jaoui, A; Koskas, V; Lecoq, E; Michel, A; Orcel, M-C; Truelle, P-E; Wohrer, D; Piram, M

    2018-02-01

    Auto-inflammatory diseases are characterized by unexplained and recurrent attacks of systemic inflammation often involving the skin, joints, or serosal membranes. They are due to a dysfunction or dysregulation of the innate immunity, which is the first line of defense against pathogens. Early recognition of these diseases by the clinician, especially by pediatricians encountering such pathologies in pediatric patients, is primordial to avoid complications. Skin manifestations, common in most auto-inflammatory diseases, are helpful for prompt diagnosis. After a brief physiopathological review, we will describe auto-inflammatory recurrent fevers by their main dermatological presentations: urticarial lesions, neutrophilic dermatoses, panniculitis, other maculopapular eruptions, dyskeratosis, skin vasculitis, and oral aphthous. We finally suggest a decision tree to help clinicians better target genetic exams in patients with recurrent fevers and dermatological manifestations. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  9. Local Patch Vectors Encoded by Fisher Vectors for Image Classification

    Directory of Open Access Journals (Sweden)

    Shuangshuang Chen

    2018-02-01

    Full Text Available The objective of this work is image classification, whose purpose is to group images into corresponding semantic categories. Four contributions are made as follows: (i For computational simplicity and efficiency, we directly adopt raw image patch vectors as local descriptors encoded by Fisher vector (FV subsequently; (ii For obtaining representative local features within the FV encoding framework, we compare and analyze three typical sampling strategies: random sampling, saliency-based sampling and dense sampling; (iii In order to embed both global and local spatial information into local features, we construct an improved spatial geometry structure which shows good performance; (iv For reducing the storage and CPU costs of high dimensional vectors, we adopt a new feature selection method based on supervised mutual information (MI, which chooses features by an importance sorting algorithm. We report experimental results on dataset STL-10. It shows very promising performance with this simple and efficient framework compared to conventional methods.

  10. Learning with LOGO: Logo and Vectors.

    Science.gov (United States)

    Lough, Tom; Tipps, Steve

    1986-01-01

    This is the first of a two-part series on the general concept of vector space. Provides tool procedures to allow investigation of vector properties, vector addition and subtraction, and X and Y components. Lists several sources of additional vector ideas. (JM)

  11. Inflammatory bowel disease.

    Science.gov (United States)

    Gibson, Peter R; Iser, John

    2005-04-01

    Inflammatory bowel disease (IBD) is increasing in frequency in Australia. General practitioners play an important role in early diagnosis and in a multidisciplinary approach to managing such patients. Keeping abreast of evolving concepts, particularly in treatment, is challenging. This article aims to address key issues in diagnosis and management to better equip general practitioners for their role in multidisciplinary management of patients with IBD. Making the diagnosis can be difficult, but is facilitated by appropriate clinical suspicion and sensible judgment as to who undergoes diagnostic tests such as colonoscopy. Treatment of ulcerative colitis has changed little in recent years, except for our improved ability to deliver mesalazine to the large bowel via the recent availability of several oral and rectal preparations. Prevention of relapse using these is an important strategy in the majority of patients. Treatment of Crohn disease is changing due to more realistic concepts of the natural history of the disease and the development of new, powerful anti-inflammatory therapies. Attention to issues other than intestinal inflammation such as nutrition, education and counselling, remain important in achieving optimal management.

  12. Inflammatory breast cancer

    International Nuclear Information System (INIS)

    Wagnerova, M.

    2012-01-01

    Inflammatory breast cancer (IBC) is an extremely aggressive disease that progresses rapidly and carries a very grim prognosis. It is characterized by erythema, rapid enlargement of the breast, skin ridging, and a characteristics peau d´orange appearance of the skin secondary to dermal lymphatic tumor involvement. Although a palpable tumor may not by present, about 55% to 85% of patient will present with metastases to the axillary or supraclavicular lymph nodes. Diagnosis of IBC is made on the basis of these clinical characteristics, as well as histologic verification of carcinoma. Accurate diagnosis is critically important, as multimodal therapy can significantly improve outcome if instituted early enough. Primary systemic treatment (neoadjuvant, induction, initials) is standard treatment for inflammatory breast cancer. If treatment response is not satisfactory it is necessary to look for new treatment regimens with different concept of dose intensity, density and sequence of treatment. In the neoadjuvant setting it is possible to employ all targeted and non-targeted therapies as was shown in a number of clinical trials. (author)

  13. Elliptic-symmetry vector optical fields.

    Science.gov (United States)

    Pan, Yue; Li, Yongnan; Li, Si-Min; Ren, Zhi-Cheng; Kong, Ling-Jun; Tu, Chenghou; Wang, Hui-Tian

    2014-08-11

    We present in principle and demonstrate experimentally a new kind of vector fields: elliptic-symmetry vector optical fields. This is a significant development in vector fields, as this breaks the cylindrical symmetry and enriches the family of vector fields. Due to the presence of an additional degrees of freedom, which is the interval between the foci in the elliptic coordinate system, the elliptic-symmetry vector fields are more flexible than the cylindrical vector fields for controlling the spatial structure of polarization and for engineering the focusing fields. The elliptic-symmetry vector fields can find many specific applications from optical trapping to optical machining and so on.

  14. ADVERTISING AVOIDANCE PADA IKLAN DI MEDIA TELEVISI

    Directory of Open Access Journals (Sweden)

    Indah Dwi Pratama

    2016-01-01

    Full Text Available One factor that can interfere with the absorption rate of viewers on television advertisement is advertising avoidance which shows the difference between the number of viewers who watch advertisement programs and the number of viewers who watch television programs. The factors that affect advertising avoidance include the demography of the viewers (gender, age, area of residence, and social economic status, or SES, advertising attributes (the television stations, order of ads, genre of the program, and advertising sector, and competition (DayPart. The study attempted to measure the level of advertising avoidance in Indonesia and its relation to various factors that influence it by using the secondary data generated by Nielsen Audience Measurement Indonesia through Television Audience Measurement (TAM. The methods utilized consisted of the t-test independent sample, one way ANOVA, Tukey, Kruskal Wallis, and Dunn Bonferoni. The result showed that the level of advertising avoidance in Indonesia reached by 23%, with relatively similar results to the other studies in various countries. The hypothesis test results also showed a significant relationship between the advertising avoidance and demographic variables, advertising attributes, and competitions affecting this avoidance. On one hand, the findings of the study are expected to be useful for the advertisers to plan their advertisements on television so that they become more effective and efficient. On the other hand, television stations can utilize these findings as a development strategy to expand their audience segmentation and to accommodate the needs of the advertisers more optimally.Keywords: advertising avoidance, television advertisement, TAM, ANOVA, Tukey

  15. A generalized nonlocal vector calculus

    Science.gov (United States)

    Alali, Bacim; Liu, Kuo; Gunzburger, Max

    2015-10-01

    A nonlocal vector calculus was introduced in Du et al. (Math Model Meth Appl Sci 23:493-540, 2013) that has proved useful for the analysis of the peridynamics model of nonlocal mechanics and nonlocal diffusion models. A formulation is developed that provides a more general setting for the nonlocal vector calculus that is independent of particular nonlocal models. It is shown that general nonlocal calculus operators are integral operators with specific integral kernels. General nonlocal calculus properties are developed, including nonlocal integration by parts formula and Green's identities. The nonlocal vector calculus introduced in Du et al. (Math Model Meth Appl Sci 23:493-540, 2013) is shown to be recoverable from the general formulation as a special example. This special nonlocal vector calculus is used to reformulate the peridynamics equation of motion in terms of the nonlocal gradient operator and its adjoint. A new example of nonlocal vector calculus operators is introduced, which shows the potential use of the general formulation for general nonlocal models.

  16. Generalized Selection Weighted Vector Filters

    Directory of Open Access Journals (Sweden)

    Rastislav Lukac

    2004-09-01

    Full Text Available This paper introduces a class of nonlinear multichannel filters capable of removing impulsive noise in color images. The here-proposed generalized selection weighted vector filter class constitutes a powerful filtering framework for multichannel signal processing. Previously defined multichannel filters such as vector median filter, basic vector directional filter, directional-distance filter, weighted vector median filters, and weighted vector directional filters are treated from a global viewpoint using the proposed framework. Robust order-statistic concepts and increased degree of freedom in filter design make the proposed method attractive for a variety of applications. Introduced multichannel sigmoidal adaptation of the filter parameters and its modifications allow to accommodate the filter parameters to varying signal and noise statistics. Simulation studies reported in this paper indicate that the proposed filter class is computationally attractive, yields excellent performance, and is able to preserve fine details and color information while efficiently suppressing impulsive noise. This paper is an extended version of the paper by Lukac et al. presented at the 2003 IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing (NSIP '03 in Grado, Italy.

  17. Image Vector Quantization codec indexes filtering

    Directory of Open Access Journals (Sweden)

    Lakhdar Moulay Abdelmounaim

    2012-01-01

    Full Text Available Vector Quantisation (VQ is an efficient coding algorithm that has been widely used in the field of video and image coding, due to its fast decoding efficiency. However, the indexes of VQ are sometimes lost because of signal interference during the transmission. In this paper, we propose an efficient estimation method to conceal and recover the lost indexes on the decoder side, to avoid re-transmitting the whole image again. If the image or video has the limitation of a period of validity, re-transmitting the data wastes the resources of time and network bandwidth. Therefore, using the originally received correct data to estimate and recover the lost data is efficient in time-constrained situations, such as network conferencing or mobile transmissions. In nature images, the pixels are correlated with their neighbours and VQ partitions the image into sub-blocks and quantises them to the indexes that are transmitted; the correlation between adjacent indexes is very strong. There are two parts of the proposed method. The first is pre-processing and the second is an estimation process. In pre-processing, we modify the order of codevectors in the VQ codebook to increase the correlation among the neighbouring vectors. We then use a special filtering method in the estimation process. Using conventional VQ to compress the Lena image and transmit it without any loss of index can achieve a PSNR of 30.429 dB on the decoder. The simulation results demonstrate that our method can estimate the indexes to achieve PSNR values of 29.084 and 28.327 dB when the loss rate is 0.5% and 1%, respectively.

  18. Robust point matching via vector field consensus.

    Science.gov (United States)

    Jiayi Ma; Ji Zhao; Jinwen Tian; Yuille, Alan L; Zhuowen Tu

    2014-04-01

    In this paper, we propose an efficient algorithm, called vector field consensus, for establishing robust point correspondences between two sets of points. Our algorithm starts by creating a set of putative correspondences which can contain a very large number of false correspondences, or outliers, in addition to a limited number of true correspondences (inliers). Next, we solve for correspondence by interpolating a vector field between the two point sets, which involves estimating a consensus of inlier points whose matching follows a nonparametric geometrical constraint. We formulate this a maximum a posteriori (MAP) estimation of a Bayesian model with hidden/latent variables indicating whether matches in the putative set are outliers or inliers. We impose nonparametric geometrical constraints on the correspondence, as a prior distribution, using Tikhonov regularizers in a reproducing kernel Hilbert space. MAP estimation is performed by the EM algorithm which by also estimating the variance of the prior model (initialized to a large value) is able to obtain good estimates very quickly (e.g., avoiding many of the local minima inherent in this formulation). We illustrate this method on data sets in 2D and 3D and demonstrate that it is robust to a very large number of outliers (even up to 90%). We also show that in the special case where there is an underlying parametric geometrical model (e.g., the epipolar line constraint) that we obtain better results than standard alternatives like RANSAC if a large number of outliers are present. This suggests a two-stage strategy, where we use our nonparametric model to reduce the size of the putative set and then apply a parametric variant of our approach to estimate the geometric parameters. Our algorithm is computationally efficient and we provide code for others to use it. In addition, our approach is general and can be applied to other problems, such as learning with a badly corrupted training data set.

  19. High stability vector-based direct power control for DFIG-based wind turbine

    DEFF Research Database (Denmark)

    Zhu, Rongwu; Chen, Zhe; Wu, Xiaojie

    2015-01-01

    This paper proposes an improved vector-based direct power control (DPC) strategy for the doubly-fed induction generator (DFIG)-based wind energy conversion system. Based on the small signal model, the proposed DPC improves the stability of the DFIG, and avoids the DFIG operating in the marginal...

  20. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  1. DNA Minicircle Technology Improves Purity of Adeno-associated Viral Vector Preparations

    Directory of Open Access Journals (Sweden)

    Maria Schnödt

    2016-01-01

    Full Text Available Adeno-associated viral (AAV vectors are considered as one of the most promising delivery systems in human gene therapy. In addition, AAV vectors are frequently applied tools in preclinical and basic research. Despite this success, manufacturing pure AAV vector preparations remains a difficult task. While empty capsids can be removed from vector preparations owing to their lower density, state-of-the-art purification strategies as of yet failed to remove antibiotic resistance genes or other plasmid backbone sequences. Here, we report the development of minicircle (MC constructs to replace AAV vector and helper plasmids for production of both, single-stranded (ss and self-complementary (sc AAV vectors. As bacterial backbone sequences are removed during MC production, encapsidation of prokaryotic plasmid backbone sequences is avoided. This is of particular importance for scAAV vector preparations, which contained an unproportionally high amount of plasmid backbone sequences (up to 26.1% versus up to 2.9% (ssAAV. Replacing standard packaging plasmids by MC constructs not only allowed to reduce these contaminations below quantification limit, but in addition improved transduction efficiencies of scAAV preparations up to 30-fold. Thus, MC technology offers an easy to implement modification of standard AAV packaging protocols that significantly improves the quality of AAV vector preparations.

  2. [Lymphoplasmacytic inflammatory pseudotumor of the liver].

    Science.gov (United States)

    Valdivielso Córtazar, E; Yáñez López, J A; Yáñez Gónzalez-Dopeso, L; Diz-Lois Palomares, M; González Conde, B; Alonso Aguirre, P

    2016-01-01

    We present the case of a middle-aged woman with antecedents of cholecystectomy and several episodes of resi-dual coledocolitiasis resolved endoscopically. She attended Emergency Services due to a new clinical picture of abdo-minal pain and alteration of hepatic enzymes. Image tests showed lesions that suggested hepatic abscesses without ruling out a malign origin. Given this doubt it was decided to carry out a thick needle biopsy obtaining a diagnosis of an inflammatory pseudotumour of the liver related to IgG4-related disease. This is an infrequent entity but must be taken into consideration because - unlike malign pathology, which is the main differential diagnosis - its behaviour is benign, with a good evolution with medical treatment. That is why a suitable diagnosis is vital to avoid aggressive, diagnostic-therapeutic procedures.

  3. Harm avoidance and disability in old age.

    Science.gov (United States)

    Wilson, Robert S; Buchman, Aron S; Arnold, Steven E; Shah, Raj C; Tang, Yuxiao; Bennett, David A

    2006-01-01

    The relation of personality to disability in old age is not well understood. The authors examined the relation of harm avoidance, a trait indicating a tendency to worry, fear uncertainty, be shy, and tire easily, to disability in a group of 474 older persons without dementia. Participants completed the 35-item Harm Avoidance scale. Disability was assessed with the Rosow-Breslau scale, a self-report measure of physical mobility. Performance-based tests of lower limb functions were also administered from which composite measures of gait, balance, and strength were derived. In a logistic regression model controlled for age, sex, education, and lower limb function, persons with high levels of harm avoidance were nearly three times as likely to report mobility limitations as persons with low levels, and these effects largely reflected fatigability and fear of uncertainty. The association of harm avoidance with disability was not explained or modified by frailty, physical activity, depressive symptoms, neuroticism, extraversion, or cognition. The results suggest that harm avoidance is associated with disability in old age.

  4. Rape avoidance behavior among Slovak women.

    Science.gov (United States)

    Prokop, Pavol

    2013-05-28

    Rape has been a recurrent adaptive problem for many species, including humans. Rape is costly to women in terms of disease transmission, partner abandonment, and unwanted pregnancy (among other costs). Therefore, behavioral strategies which allow women to avoid coercive men may have been favored by selection. In line with this evolutionary reasoning, the current research documented that physically stronger women and those in a committed romantic relationship reported more rape avoidance behavior. In addition, virgin women tended to perform more rape avoidance behavior compared with their non-virgin counterparts. Women with high conception risk perceived themselves as physically stronger, which may protect them against a potential rapist. Fear of unwanted pregnancy from rape decreased as age increased, reflecting higher fertility among younger participants. However, older women reported more rape avoidance behavior, which contradicts evolutionary predictions. The results provide some support for evolutionary hypotheses of rape avoidance behavior which suggest that woman's perception of rape is influenced by parental investment and perceived physical condition.

  5. DNA elasticity: topology of self-avoidance

    International Nuclear Information System (INIS)

    Samuel, Joseph; Sinha, Supurna; Ghosh, Abhijit

    2006-01-01

    We present a theoretical treatment of DNA stretching and twisting experiments, in which we discuss global topological subtleties of self-avoiding ribbons and provide an underlying justification for the worm-like rod chain (WLRC) model proposed by Bouchiat and Mezard. Some theoretical points regarding the WLRC model are clarified: the 'local writhe formula' and the use of an adjustable cut-off parameter to 'regularize' the model. Our treatment brings out the precise relation between the worm-like chain (WLC), the paraxial worm-like chain (PWLC) and the WLRC models. We describe the phenomenon of 'topological untwisting' and the resulting collapse of link sectors in the WLC model and note that this leads to a free energy profile periodic in the applied link. This periodicity disappears when one takes into account the topology of self-avoidance or at large stretch forces (paraxial limit). We note that the difficult non-local notion of self-avoidance can be replaced (in an approximation) by the simpler local notion of 'south avoidance'. This gives an explanation for the efficacy of the approach of Bouchiat and Mezard in explaining the 'hat curves' using the WLRC model, which is a south avoiding model. We propose a new class of experiments to probe the continuous transition between the periodic and aperiodic behaviour of the free energy

  6. Management of arthropod pathogen vectors in North America: Minimizing adverse effects on pollinators

    Science.gov (United States)

    Ginsberg, Howard; Bargar, Timothy A.; Hladik, Michelle L.; Lubelczyk, Charles

    2017-01-01

    Tick and mosquito management is important to public health protection. At the same time, growing concerns about declines of pollinator species raise the question of whether vector control practices might affect pollinator populations. We report the results of a task force of the North American Pollinator Protection Campaign (NAPPC) that examined potential effects of vector management practices on pollinators, and how these programs could be adjusted to minimize negative effects on pollinating species. The main types of vector control practices that might affect pollinators are landscape manipulation, biocontrol, and pesticide applications. Some current practices already minimize effects of vector control on pollinators (e.g., short-lived pesticides and application-targeting technologies). Nontarget effects can be further diminished by taking pollinator protection into account in the planning stages of vector management programs. Effects of vector control on pollinator species often depend on specific local conditions (e.g., proximity of locations with abundant vectors to concentrations of floral resources), so planning is most effective when it includes collaborations of local vector management professionals with local experts on pollinators. Interventions can then be designed to avoid pollinators (e.g., targeting applications to avoid blooming times and pollinator nesting habitats), while still optimizing public health protection. Research on efficient targeting of interventions, and on effects on pollinators of emerging technologies, will help mitigate potential deleterious effects on pollinators in future management programs. In particular, models that can predict effects of integrated pest management on vector-borne pathogen transmission, along with effects on pollinator populations, would be useful for collaborative decision-making.

  7. Peer conflict avoidance: associations with loneliness, social anxiety, and social avoidance.

    Science.gov (United States)

    Johnson, H D; LaVoie, J C; Spenceri, M C; Mahoney-Wernli, M A

    2001-02-01

    Failure to resolve peer conflict is associated with children's reports of loneliness, social anxiety, and social avoidance. Although these relationships are well established, researchers have not examined the association between the avoidance of peer conflict and various adjustment characteristics. The current study examined the association between avoidance of conflict and measures of loneliness, social anxiety, and social avoidance for 59 pupils in Grade 4 (31 boys and 28 girls) and 47 in Grade 8 (22 boys and 25 girls). Volunteers indicated that conflict avoidance based on autonomy, e.g., independence issues, and interpersonal issues, e.g., closeness and cohesion, was associated with scores on loneliness for boys and girls, respectively. Conflict avoidance for emotional and physical well-being and fear of punishment was associated with increased reports of loneliness and social anxiety for children in Grade 4.

  8. Toward lattice fractional vector calculus

    Science.gov (United States)

    Tarasov, Vasily E.

    2014-09-01

    An analog of fractional vector calculus for physical lattice models is suggested. We use an approach based on the models of three-dimensional lattices with long-range inter-particle interactions. The lattice analogs of fractional partial derivatives are represented by kernels of lattice long-range interactions, where the Fourier series transformations of these kernels have a power-law form with respect to wave vector components. In the continuum limit, these lattice partial derivatives give derivatives of non-integer order with respect to coordinates. In the three-dimensional description of the non-local continuum, the fractional differential operators have the form of fractional partial derivatives of the Riesz type. As examples of the applications of the suggested lattice fractional vector calculus, we give lattice models with long-range interactions for the fractional Maxwell equations of non-local continuous media and for the fractional generalization of the Mindlin and Aifantis continuum models of gradient elasticity.

  9. Gauge Theories of Vector Particles

    Science.gov (United States)

    Glashow, S. L.; Gell-Mann, M.

    1961-04-24

    The possibility of generalizing the Yang-Mills trick is examined. Thus we seek theories of vector bosons invariant under continuous groups of coordinate-dependent linear transformations. All such theories may be expressed as superpositions of certain "simple" theories; we show that each "simple theory is associated with a simple Lie algebra. We may introduce mass terms for the vector bosons at the price of destroying the gauge-invariance for coordinate-dependent gauge functions. The theories corresponding to three particular simple Lie algebras - those which admit precisely two commuting quantum numbers - are examined in some detail as examples. One of them might play a role in the physics of the strong interactions if there is an underlying super-symmetry, transcending charge independence, that is badly broken. The intermediate vector boson theory of weak interactions is discussed also. The so-called "schizon" model cannot be made to conform to the requirements of partial gauge-invariance.

  10. Search for intermediate vector bosons

    International Nuclear Information System (INIS)

    Cline, D.B.; Rubbia, C.; van der Meer, S.

    1982-01-01

    Over the past 15 years a new class of unified theories has been developed to describe the forces acting between elementary particles. The most successful of the new theories establishes a link between electromagnetism and the weak force. A crucial prediction of this unified electroweak theory is the existence of three massive particles called intermediate vector bosons. If these intermediate vector bosons exist and if they have properties attributed to them by electroweak theory, they should soon be detected, as the world's first particle accelerator with enough energy to create such particles has recently been completed at the European Organization for Nuclear Research (CERN) in Geneva. The accelerator has been converted to a colliding beam machine in which protons and antiprotons collide head on. According to electroweak theory, intermediate vector bosons can be created in proton-antiproton collisions. (SC)

  11. Search for intermediate vector bosons

    International Nuclear Information System (INIS)

    Klajn, D.B.; Rubbia, K.; Meer, S.

    1983-01-01

    Problem of registration and search for intermediate vector bosons is discussed. According to weak-current theory there are three intermediate vector bosons with +1(W + )-1(W - ) and zero (Z 0 ) electric charges. It was suggested to conduct the investigation into particles in 1976 by cline, Rubbia and Makintair using proton-antiproton beams. Major difficulties of the experiment are related to the necessity of formation of sufficient amount of antiparticles and the method of antiproton beam ''cooling'' for the purpose of reduction of its random movements. The stochastic method was suggested by van der Meer in 1968 as one of possible cooling methods. Several large detectors were designed for searching intermediate vector bosons

  12. Down-regulation of inflammatory mediator synthesis and infiltration of inflammatory cells by MMP-3 in experimentally induced rat pulpitis.

    Science.gov (United States)

    Takimoto, Koyo; Kawashima, Nobuyuki; Suzuki, Noriyuki; Koizumi, Yu; Yamamoto, Mioko; Nakashima, Misako; Suda, Hideaki

    2014-09-01

    Matrix metalloproteinase (MMP)-3 is a member of the MMP family that degrades the extracellular matrix. Application of MMP-3 to injured pulp tissue induces angiogenesis and wound healing, but its anti-inflammatory effects are still unclear. Here, we evaluated the anti-inflammatory functions of MMP-3 in vitro and in vivo. Nitric oxide and inflammatory mediator synthesis in macrophages activated by lipopolysaccharide (LPS) was measured in the presence or absence of MMP-3. The mouse Mmp3 (mMmp3) expression vector containing full length cDNA sequence of mMmp3 or cDNA sequence of mMmp3 missing the signal peptide and pro-peptide regions was transfected to RAW264, a mouse macrophage cell line, and NO synthesis and inflammatory mediator expression were evaluated. Pulpal inflammation was histologically and immunohistochemically evaluated in a rat model of incisor pulpitis induced by the application of LPS for 9 hours in the presence or absence of MMP-3. NO and pro-inflammatory mediator synthesis promoted by LPS was significantly down-regulated by MMP-3 in vitro. The full length of mMmp3 down-regulated the LPS-induced NO synthesis and chemical mediator mRNA expression, however the mMmp3 missing the signal peptide failed to block the NO synthesis induced by LPS. The numbers of major histocompatibility complex class II+ and CD68+ cells, which infiltrated into the rat incisor pulp tissues in response to the topical application of LPS, were significantly decreased by the application of MMP-3 in vivo. These results indicate that MMP-3 possesses anti-inflammatory functions, suggesting its potential utility as an anti-inflammatory agent for pulpal inflammation. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  13. A Transient Dopamine Signal Represents Avoidance Value and Causally Influences the Demand to Avoid

    Science.gov (United States)

    Pultorak, Katherine J.; Schelp, Scott A.; Isaacs, Dominic P.; Krzystyniak, Gregory

    2018-01-01

    Abstract While an extensive literature supports the notion that mesocorticolimbic dopamine plays a role in negative reinforcement, recent evidence suggests that dopamine exclusively encodes the value of positive reinforcement. In the present study, we employed a behavioral economics approach to investigate whether dopamine plays a role in the valuation of negative reinforcement. Using rats as subjects, we first applied fast-scan cyclic voltammetry (FSCV) to determine that dopamine concentration decreases with the number of lever presses required to avoid electrical footshock (i.e., the economic price of avoidance). Analysis of the rate of decay of avoidance demand curves, which depict an inverse relationship between avoidance and increasing price, allows for inference of the worth an animal places on avoidance outcomes. Rapidly decaying demand curves indicate increased price sensitivity, or low worth placed on avoidance outcomes, while slow rates of decay indicate reduced price sensitivity, or greater worth placed on avoidance outcomes. We therefore used optogenetics to assess how inducing dopamine release causally modifies the demand to avoid electrical footshock in an economic setting. Increasing release at an avoidance predictive cue made animals more sensitive to price, consistent with a negative reward prediction error (i.e., the animal perceives they received a worse outcome than expected). Increasing release at avoidance made animals less sensitive to price, consistent with a positive reward prediction error (i.e., the animal perceives they received a better outcome than expected). These data demonstrate that transient dopamine release events represent the value of avoidance outcomes and can predictably modify the demand to avoid. PMID:29766047

  14. Synthetic Aperture Vector Flow Imaging

    DEFF Research Database (Denmark)

    Villagómez Hoyos, Carlos Armando

    The main objective of this project was to continue the development of a synthetic aperture vector flow estimator. This type of estimator is capable of overcoming two of the major limitations in conventional ultrasound systems: 1) the inability to scan large region of interest with high temporal......, this thesis showed that novel information can be obtained with vector velocity methods providing quantitative estimates of blood flow and insight into the complexity of the hemodynamics dynamics. This could give the clinician a new tool in assessment and treatment of a broad range of diseases....

  15. Vector mesons and chiral symmetry

    International Nuclear Information System (INIS)

    Ecker, G.

    1989-01-01

    The ambiguities in the off-shell behaviour of spin-1 exchange can be resolved to O(p 4 ) in the chiral low-energy expansion if the asymptotic behaviour of QCD is properly incorporated. As a consequence, the chiral version of vector (and axial-vector) meson dominance is model independent. Additional high-energy constraints motivated by QCD determine the V,A resonance couplings uniquely. In particular, QCD in its effective chiral realization sucessfully predicts Γ(ρ→2π). 10 refs. (Author)

  16. Topological vector spaces and distributions

    CERN Document Server

    Horvath, John

    2012-01-01

    ""The most readable introduction to the theory of vector spaces available in English and possibly any other language.""-J. L. B. Cooper, MathSciNet ReviewMathematically rigorous but user-friendly, this classic treatise discusses major modern contributions to the field of topological vector spaces. The self-contained treatment includes complete proofs for all necessary results from algebra and topology. Suitable for undergraduate mathematics majors with a background in advanced calculus, this volume will also assist professional mathematicians, physicists, and engineers.The precise exposition o

  17. Learning with Support Vector Machines

    CERN Document Server

    Campbell, Colin

    2010-01-01

    Support Vectors Machines have become a well established tool within machine learning. They work well in practice and have now been used across a wide range of applications from recognizing hand-written digits, to face identification, text categorisation, bioinformatics, and database marketing. In this book we give an introductory overview of this subject. We start with a simple Support Vector Machine for performing binary classification before considering multi-class classification and learning in the presence of noise. We show that this framework can be extended to many other scenarios such a

  18. Generation of arbitrary vector beams

    Science.gov (United States)

    Perez-Garcia, Benjamin; López-Mariscal, Carlos; Hernandez-Aranda, Raul I.; Gutiérrez-Vega, Julio C.

    2017-08-01

    Optical vector beams arise from point to point spatial variations of the electric component of an electromagnetic field over the transverse plane. In this work, we present a novel experimental technique to generate arbitrary vec- tor beams, and provide sufficient evidence to validate their state of polarization. This technique takes advantage of the capability of a Spatial Light Modulator to simultaneously generate two components of an electromagnetic field by halving the screen of the device and subsequently recombining them in a Sagnac interferometer. Our experimental results show the versatility and robustness of this technique for the generation of vector beams.

  19. Word-level recognition of multifont Arabic text using a feature vector matching approach

    Science.gov (United States)

    Erlandson, Erik J.; Trenkle, John M.; Vogt, Robert C., III

    1996-03-01

    Many text recognition systems recognize text imagery at the character level and assemble words from the recognized characters. An alternative approach is to recognize text imagery at the word level, without analyzing individual characters. This approach avoids the problem of individual character segmentation, and can overcome local errors in character recognition. A word-level recognition system for machine-printed Arabic text has been implemented. Arabic is a script language, and is therefore difficult to segment at the character level. Character segmentation has been avoided by recognizing text imagery of complete words. The Arabic recognition system computes a vector of image-morphological features on a query word image. This vector is matched against a precomputed database of vectors from a lexicon of Arabic words. Vectors from the database with the highest match score are returned as hypotheses for the unknown image. Several feature vectors may be stored for each word in the database. Database feature vectors generated using multiple fonts and noise models allow the system to be tuned to its input stream. Used in conjunction with database pruning techniques, this Arabic recognition system has obtained promising word recognition rates on low-quality multifont text imagery.

  20. Neuroimmune regulation of inflammatory responses in inflammatory bowel disease

    NARCIS (Netherlands)

    Rijnierse, Anneke

    2006-01-01

    The term inflammatory bowel disease (IBD) is used to describe chronic inflammatory conditions of the gastro-intestinal tract. Patients suffer from abdominal pain, diarrhea, rectal bleeding and a substantial personal burden. The etiology of IBD is gradually being unraveled but remains a complex

  1. An avoidance layer in hierarchical process control

    International Nuclear Information System (INIS)

    De Callatay, A.

    1994-01-01

    A project of layered software architecture is proposed: a safety-critical real-time non-stop simple kernel system includes a layer avoiding threatening actions from operators or programs in other control systems. Complex process-control applications (such as fuzzy systems) are useful for the smooth operation of the system, optimum productivity, efficient diagnostics, and safe management of degraded modes of operation. Defects in these complex process-control applications do not have an impact on safety if their commands have first to be accepted by a safety-critical module. The development, testing, and certification of complex applications computed in the outside layers can be made simpler and less expensive than for those in the kernel. Avoidance systems use rule-base systems having negative fuzzy conditions and actions. Animal and human behaviour cannot be explained without active avoidance

  2. New apparatus for training the avoidance reaction.

    Science.gov (United States)

    Tikal, K

    1988-01-01

    A new apparatus for active avoidance training in rats consists of a short, wide runway which can be tilted from a horizontal to vertical position. One half of the electrifiable grid floor is covered by a nonconducting sheet. For brightness (black-white) discrimination training a white walled goal box can be inserted into the runway and shifted from left to right during training. Avoidance training of 24 rats (female Wistar SPF) required 14.1 +/- 2.6 (mean +/- SEM) to-criterion trials (9/10) and was completed in less than 4 min. Brightness discrimination training required 21.3 +/- 2.1 to-criterion trials and the time of training did not exceed 12 min. The retention of the acquired responses was very good in both cases. The main advantage of the apparatus is very rapid acquisition of the one-way and discriminated avoidance without the necessity of manual manipulation of the animal.

  3. Engaging Math-Avoidant College Students

    Directory of Open Access Journals (Sweden)

    M. Paul Latiolais

    2009-07-01

    Full Text Available This paper is an informal, personal account of how we, as two college teachers, became interested in math anxiety, decided to explore it amongst students at our institution in order to inform our teaching, and became convinced that the massive problem is math avoidance. We tried discussion groups, but few students attended, although those that did made useful suggestions. Thus informed, we designed an innovative course, Confronting College Mathematics as a Humanities course with the possibility of credit toward the math requirement, but it was undersubscribed in its first offering and had to be canceled. How can we get college students who avoid math to break through the barrier of math avoidance? We have now begun to explore a new approach: Second Life, where students can engage math—and quantitative literacy—virtually, and anonymously.

  4. Quantifying and resolving multiple vector transformants in S. cerevisiae plasmid libraries.

    Science.gov (United States)

    Scanlon, Thomas C; Gray, Elizabeth C; Griswold, Karl E

    2009-11-20

    transformed yeast cells have important implications for yeast library screens. The quantitative information described herein should increase awareness of this issue, and the rapid sequencing approach developed for these studies should be widely useful for identifying multiple vector transformants and avoiding complications associated with cells that have acquired more than one unique plasmid.

  5. Quantifying and resolving multiple vector transformants in S. cerevisiae plasmid libraries

    Directory of Open Access Journals (Sweden)

    Gray Elizabeth C

    2009-11-01

    previously unrecognized prevalence and persistence of multiply transformed yeast cells have important implications for yeast library screens. The quantitative information described herein should increase awareness of this issue, and the rapid sequencing approach developed for these studies should be widely useful for identifying multiple vector transformants and avoiding complications associated with cells that have acquired more than one unique plasmid.

  6. Pediatric Inflammatory Bowel Diseases

    DEFF Research Database (Denmark)

    Lauritzen, Didde; Andreassen, Bente Utoft; Heegaard, Niels Henrik H

    2018-01-01

    Background: Kidney disease has been reported in adults with inflammatory bowel disease (IBD) and is regarded an extraintestinal manifestation or more rarely a side effect of the medical treatment. Methods: In this cross-sectional study we describe the extent of kidney pathology in a cohort of 56...... children with IBD. Blood and urine samples were analyzed for markers of kidney disease and ultrasonography was performed to evaluate pole-to-pole kidney length. Results: We found that 25% of the patients had either previously reported kidney disease or ultrasonographic signs of chronic kidney disease...... are at risk of chronic kidney disease, and the risk seems to be increased with the severity of the disease....

  7. Inflammatory biomarkers and cancer

    DEFF Research Database (Denmark)

    Rasmussen, Line Jee Hartmann; Schultz, Martin; Gaardsting, Anne

    2017-01-01

    and previous cancer diagnoses compared to patients who were not diagnosed with cancer. Previous cancer, C-reactive protein (CRP) and suPAR were significantly associated with newly diagnosed cancer during follow-up in multiple logistic regression analyses adjusted for age, sex and CRP. Neither any of the PRRs......In Denmark, patients with serious nonspecific symptoms and signs of cancer (NSSC) are referred to the diagnostic outpatient clinics (DOCs) where an accelerated cancer diagnostic program is initiated. Various immunological and inflammatory biomarkers have been associated with cancer, including...... soluble urokinase plasminogen activator receptor (suPAR) and the pattern recognition receptors (PRRs) pentraxin-3, mannose-binding lectin, ficolin-1, ficolin-2 and ficolin-3. We aimed to evaluate these biomarkers and compare their diagnostic ability to classical biomarkers for diagnosing cancer...

  8. Temporal aggregation in first order cointegrated vector autoregressive models

    DEFF Research Database (Denmark)

    La Cour, Lisbeth Funding; Milhøj, Anders

    We study aggregation - or sample frequencies - of time series, e.g. aggregation from weekly to monthly or quarterly time series. Aggregation usually gives shorter time series but spurious phenomena, in e.g. daily observations, can on the other hand be avoided. An important issue is the effect of ...... of aggregation on the adjustment coefficient in cointegrated systems. We study only first order vector autoregressive processes for n dimensional time series Xt, and we illustrate the theory by a two dimensional and a four dimensional model for prices of various grades of gasoline...

  9. Temporal aggregation in first order cointegrated vector autoregressive

    DEFF Research Database (Denmark)

    la Cour, Lisbeth Funding; Milhøj, Anders

    2006-01-01

    We study aggregation - or sample frequencies - of time series, e.g. aggregation from weekly to monthly or quarterly time series. Aggregation usually gives shorter time series but spurious phenomena, in e.g. daily observations, can on the other hand be avoided. An important issue is the effect of ...... of aggregation on the adjustment coefficient in cointegrated systems. We study only first order vector autoregressive processes for n dimensional time series Xt, and we illustrate the theory by a two dimensional and a four dimensional model for prices of various grades of gasoline....

  10. Information Dilemmas and Blame-Avoidance Strategies

    DEFF Research Database (Denmark)

    Erik, Baekkeskov; Rubin, Olivier

    2017-01-01

    from day one about 2009 H1N1 flu. To explore why, this article links crisis information dilemmas to blame avoidance concepts from democratic political theories. We argue that greater Chinese transparency about infectious disease response reflects evolution in blame avoidance, from heavy reliance...... on information control to insulating leaders by using technical experts and agencies as 'lightning rods.' In 2003, the Chinese strategy of information containment and secrecy backfired, and the Chinese leadership eventually received blame at home and internationally for crisis mismanagement. In 2009, China put...... in place public health specialists and institutions as responsible for H1N1 information and responses, thereby insulating the top-tier leadership....

  11. Trajectory Optimization for Spacecraft Collision Avoidance

    Science.gov (United States)

    2013-09-01

    Parabolic e > 1 Hyperbolic The RAAN, Ω, measures the angle between the vernal equinox eastward to the line of nodes, n, shown in Figure 3 and...Methods. Indirect Methods focus on derivation of first-order necessary conditions using the Calculus of Variations . These conditions are then used to...either the final or initial states. They may be given as a set of equality or inequality constraints. A state vector that does not violate any

  12. Scalar Calibration of Vector Magnetometers

    DEFF Research Database (Denmark)

    Merayo, José M.G.; Brauer, Peter; Primdahl, Fritz

    2000-01-01

    The calibration parameters of a vector magnetometer are estimated only by the use of a scalar reference magnetometer. The method presented in this paper differs from those previously reported in its linearized parametrization. This allows the determination of three offsets or signals in the absence...

  13. Parallel Sparse Matrix - Vector Product

    DEFF Research Database (Denmark)

    Alexandersen, Joe; Lazarov, Boyan Stefanov; Dammann, Bernd

    This technical report contains a case study of a sparse matrix-vector product routine, implemented for parallel execution on a compute cluster with both pure MPI and hybrid MPI-OpenMP solutions. C++ classes for sparse data types were developed and the report shows how these class can be used...

  14. Reference vectors in economic choice

    Directory of Open Access Journals (Sweden)

    Teycir Abdelghani GOUCHA

    2013-07-01

    Full Text Available In this paper the introduction of notion of reference vector paves the way for a combination of classical and social approaches in the framework of referential preferences given by matrix groups. It is shown that individual demand issue from rational decision does not depend on that reference.

  15. The consequences of poor vectorization

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    This talk briefly discusses the vectorization problem and how it impacts scientific and engineering systems. A simple cost model of designing such system in context of different phases of software lifetime is considered. Finally a concept for scalable solution is presented.

  16. The Large Vector Multiplet Action

    OpenAIRE

    Ryb, Itai

    2007-01-01

    We discuss possible actions for the d=2, N=(2,2) large vector multiplet that gauges isometries of generalized Kahler geometries. We explore two scenarios that allow us to write kinetic and superpotential terms for the scalar field-strengths, and write kinetic terms for the spinor invariants that can introduce topological terms for the connections.

  17. Portfolio Analysis for Vector Calculus

    Science.gov (United States)

    Kaplan, Samuel R.

    2015-01-01

    Classic stock portfolio analysis provides an applied context for Lagrange multipliers that undergraduate students appreciate. Although modern methods of portfolio analysis are beyond the scope of vector calculus, classic methods reinforce the utility of this material. This paper discusses how to introduce classic stock portfolio analysis in a…

  18. Vector ecology of equine piroplasmosis

    Science.gov (United States)

    Equine piroplasmosis (EP) is a disease of equidae including horses, donkeys, mules and zebras caused by either of two protozoan parasites, Theileria equi or Babesia caballi. These parasites are biologically transmitted between hosts via tick-vectors and although they have inherent differences, they ...

  19. Vector-meson dominance revisited

    Directory of Open Access Journals (Sweden)

    Terschlüsen Carla

    2012-12-01

    Full Text Available The interaction of mesons with electromagnetism is often well described by the concept of vector-meson dominance (VMD. However, there are also examples where VMD fails. A simple chiral Lagrangian for pions, rho and omega mesons is presented which can account for the respective agreement and disagreement between VMD and phenomenology in the sector of light mesons.

  20. Vector fields on nonorientable surfaces

    Directory of Open Access Journals (Sweden)

    Ilie Barza

    2003-01-01

    X, and the space of vector fields on X are proved by using a symmetrisation process. An example related to the normal derivative on the border of the Möbius strip supports the nontriviality of the concepts introduced in this paper.

  1. Distribution amplitudes of vector mesons

    Energy Technology Data Exchange (ETDEWEB)

    Braun, V.M. [Regensburg Univ. (Germany). Inst. fuer Theoretische Physik; Broemmel, D. [Deutsches Elektronen-Synchrotron, Hamburg (Germany); Goeckeler, M. [Regensburg Univ. (DE). Inst. fuer Theoretische Physik] (and others)

    2007-11-15

    Results are presented for the lowest moment of the distribution amplitude for the K{sup *} vector meson. Both longitudinal and transverse moments are investigated. We use two flavours of O(a) improved Wilson fermions, together with a non-perturbative renormalisation of the matrix element. (orig.)

  2. Rewarding peak avoidance: the Dutch 'Spitsmijden' projects

    NARCIS (Netherlands)

    Knockaert, J.; Bakens, J.; Ettema, D.F.; Verhoef, E.

    2011-01-01

    The Dutch road network is becoming increasingly congested. In late 2006, a group of companies, universities and government institutions established the Spitsmijden project. ‘Spitsmijden’ is the Dutch term for ‘avoiding the peak’. This joint initiative aimed to identify and assess a short-term

  3. The Netherlands Bird Avoidance Model, Final Report

    NARCIS (Netherlands)

    Shamoun-Baranes, J.; Bouten, W.; Sierdsema, H.; van Belle, J.; van Gasteren, J.R.; van Loon, E.E.

    2006-01-01

    The NL-BAM was developed as a web-based decision support tool to be used by the bird hazard avoidance experts in the ecology unit of the Royal Netherlands Air Force. The NL-BAM will be used together with the ROBIN 4 radar system to provide BirdTAMS, for real time warnings and flight planning and to

  4. Employer Attitudes towards Peak Hour Avoidance

    NARCIS (Netherlands)

    Vonk Noordegraaf, D.M.; Annema, J.A.

    2012-01-01

    Peak Hour Avoidance is a relatively new Dutch mobility management measure. To reduce congestion frequent car drivers are given a financial reward for reducing the proportion of trips that they make during peak hours on a specific motorway section. Although previous studies show that employers are

  5. Employer attitudes towards peak hour avoidance

    NARCIS (Netherlands)

    Noordegraaf, D.M.V.; Annema, J.A.

    2012-01-01

    Peak Hour Avoidance is a relatively new Dutch mobility management measure. To reduce congestion frequent car drivers are given a financial reward for reducing the proportion of trips that they make during peak hours on a specific motorway section. Although previous studies show that employers are

  6. Avoidance Motivation and Conservation of Energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K. W.

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  7. Avoidance motivation and conservation of energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K W

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  8. Pathological Demand Avoidance: Exploring the Behavioural Profile

    Science.gov (United States)

    O'Nions, Elizabeth; Viding, Essi; Greven, Corina U; Ronald, Angelica; Happé, Francesca

    2014-01-01

    "Pathological Demand Avoidance" is a term increasingly used by practitioners in the United Kingdom. It was coined to describe a profile of obsessive resistance to everyday demands and requests, with a tendency to resort to "socially manipulative" behaviour, including outrageous or embarrassing acts. Pathological demand…

  9. ALUMINUM AVOIDANCE BY MUCUNA-PRURIENS

    NARCIS (Netherlands)

    HAIRIAH, K; VANNOORDWIJK, M; STULEN, [No Value; KUIPER, PJC

    The hypothesis was tested that the avoidance of acid subsoil by the velvet bean Mucuna pruriens is based on a mechanism acting on the whole root system rather than on individual roots. In a split-root experiment with circulating nutrient solution the growth of plants with Al-containing (+/+) or

  10. Audit incorporating avoidability and appropriate intervention can ...

    African Journals Online (AJOL)

    Audit incorporating avoidability and appropriate intervention can significantly decrease perinatal mortality. H. R. G. Ward, G. R. Howarth, O. J. N. Jennings,. R. C. Pattinson .... 6 months) and seven interns. The study was .... maternity care notes study: a randomized control trial to assess the effects of giving expectant mothers ...

  11. Hydrofluoric acid on dentin should be avoided.

    NARCIS (Netherlands)

    Loomans, B.A.C.; Mine, A.; Roeters, F.J.M.; Opdam, N.J.M.; Munck, J. De; Huysmans, M.C.D.N.J.M.; Meerbeek, B. Van

    2010-01-01

    Hydrofluoric acid can be used for intra-oral repair of restorations. Contamination of tooth substrate with hydrofluoric acid cannot always be avoided. OBJECTIVES: To investigate the bonding effectiveness to hydrofluoric acid contaminated dentin by, micro-tensile bond strength testing, SEM and TEM.

  12. Women Coping with a Partner's Sexual Avoidance.

    Science.gov (United States)

    Renshaw, Domeena C.

    2001-01-01

    Discusses the complexities of sexual avoidance, or Hypoactive Sexual Desire (HSD), a previously neglected aspect of a couple's relationship. Suggests that learning from a therapist to accept and enjoy other forms of sexual exchange can open up new horizons of physical and emotional intimacy. (Contains 17 references.) (GCP)

  13. Obstacle detection and avoiding of quadcopter

    Science.gov (United States)

    Wang, Dizhong; Lin, Jiajian

    2017-10-01

    Recent years, the flight control technology over quadcopter has been boosted vigorously and acquired the comprehensive application in a variety of industries. However, it is prominent for there to be problems existed in the stable and secure flight with the development of its autonomous flight. Through comparing with the characteristics of ultrasonic ranging and laser Time-of-Flight(abbreviated to ToF) distance as well as vision measurement and its related sensors, the obstacle detection and identification sensors need to be installed in order to effectively enhance the safety flying for aircraft, which is essential for avoiding the dangers around the surroundings. That the major sensors applied to objects perception at present are distance measuring instruments which based on the principle and application of non-contact detection technology . Prior to acknowledging the general principles of flight and obstacle avoiding, the aerodynamics modeling of the quadcopter and its object detection means has been initially determined on this paper. Based on such premise, this article emphasized on describing and analyzing the research on obstacle avoiding technology and its application status, and making an expectation for the trend of its development after analyzing the primary existing problems concerning its accuracy object avoidance.

  14. Traveler's guide to avoiding infectious diseases

    Science.gov (United States)

    ... to-date information, please visit the Centers for Disease Control and Prevention's (CDC) website -- www.cdc.gov/zika . To prevent getting the Zika virus, take steps to avoid mosquito bites. Sexual transmission of the virus can be prevented by using condoms ...

  15. An Examination of Avoided Costs in Utah

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark; Wiser, Ryan

    2005-01-07

    The Utah Wind Working Group (UWWG) believes there are currently opportunities to encourage wind power development in the state by seeking changes to the avoided cost tariff paid to qualifying facilities (QFs). These opportunities have arisen as a result of a recent renegotiation of Pacificorp's Schedule 37 tariff for wind QFs under 3 MW, as well as an ongoing examination of Pacificorp's Schedule 38 tariff for wind QFs larger than 3 MW. It is expected that decisions made regarding Schedule 38 will also impact Schedule 37. Through the Laboratory Technical Assistance Program (Lab TAP), the UWWG has requested (through the Utah Energy Office) that LBNL provide technical assistance in determining whether an alternative method of calculating avoided costs that has been officially adopted in Idaho would lead to higher QF payments in Utah, and to discuss the pros and cons of this method relative to the methodology recently adopted under Schedule 37 in Utah. To accomplish this scope of work, I begin by summarizing the current method of calculating avoided costs in Utah (per Schedule 37) and Idaho (the ''surrogate avoided resource'' or SAR method). I then compare the two methods both qualitatively and quantitatively. Next I present Pacificorp's four main objections to the use of the SAR method, and discuss the reasonableness of each objection. Finally, I conclude with a few other potential considerations that might add value to wind QFs in Utah.

  16. Approach and avoidance in fear of spiders

    NARCIS (Netherlands)

    Rinck, M.; Becker, E.S.

    2007-01-01

    We examined attitudes towards spiders by employing an Approach-Avoidance Task, in which participants respond to pictures by pulling a joystick towards themselves or by pushing it away from themselves. For spider fearfuls, this stimulus–response assignment is either compatible (push spiders away) or

  17. FORUM Achieving weight loss and avoiding obesity

    African Journals Online (AJOL)

    The efficacy of diets advocating extreme macronutrient manipulation has been reviewed extensively. Studies involving participation for 12 months or longer revealed that diet adherence, length of intervention and level of calorie. ISSUES IN MEDICINE. Achieving weight loss and avoiding obesity. Maria Elizabeth Catsicas.

  18. Learn to Avoid or Overcome Leadership Obstacles

    Science.gov (United States)

    D'Auria, John

    2015-01-01

    Leadership is increasingly recognized as an important factor in moving schools forward, yet we have been relatively random in how we prepare and support them. Four obstacles often block or diminish their effectiveness. Avoiding or overcoming each of these requires an underlying set of skills and knowledge that we believe can be learned and…

  19. PENGARUH CORPORATE GOVERNANCE TERHADAP TAX AVOIDANCE

    Directory of Open Access Journals (Sweden)

    Nuralifmida Ayu Annisa

    2012-05-01

    Full Text Available This study aims to find out how the influence of the corporate governance of tax avoidanceactivity in companies listed on Indonesia Stock Exchange in 2008. The samples are publiclytraded company listed on the Indonesia Stock Exchange in 2008 as many as 200 companies. Thisstudy uses data analysis and regression analysis of the elements of corporate governance and taxavoidance. The results of this study show that the elements of corporate governance that consist ofaudit quality and audit committee significantly influence the activity of tax avoidance as measuredusing proxy book tax gap. Other results show that the tax avoidance activity as measured withproxy book tax gap are not affected significantly by institutional ownership and board ofcommissioners. Limitation of this study is not to use each type of industries as control variable socan’t identify the direct effect from type of industry on tax avoidance. Another limitation of thisstudy is use corporate governance’s proxy separately, so it can’t capture the full effect ofcorporate governance. Keywords:corporate governance, ownership structure, board of commissioners, audit committee,tax avoidance, book tax gap.

  20. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  1. Wake Vortex Avoidance System and Method

    Science.gov (United States)

    Shams, Qamar A. (Inventor); Zuckerwar, Allan J. (Inventor); Knight, Howard K. (Inventor)

    2017-01-01

    A wake vortex avoidance system includes a microphone array configured to detect low frequency sounds. A signal processor determines a geometric mean coherence based on the detected low frequency sounds. A display displays wake vortices based on the determined geometric mean coherence.

  2. Reasonable Avoidability, Responsibility and Lifestyle Diseases

    DEFF Research Database (Denmark)

    Andersen, Martin Marchman

    2012-01-01

    In “Health, Luck and Justice” Shlomi Segall argues for a luck egalitarian approach to justice in health care. As the basis for a just distribution he suggests a principle of Reasonable Avoidability, which he takes to imply that we do not have justice-based reasons to treat diseases brought about...

  3. Simple Obstacle Avoidance Algorithm for Rehabilitation Robots

    NARCIS (Netherlands)

    Stuyt, Floran H.A.; Römer, GertWillem R.B.E.; Stuyt, Harry .J.A.

    2007-01-01

    The efficiency of a rehabilitation robot is improved by offering record-and-replay to operate the robot. While automatically moving to a stored target (replay) collisions of the robot with obstacles in its work space must be avoided. A simple, though effective, generic and deterministic algorithm

  4. Avoidable cancers in the Nordic countries. Occupation

    DEFF Research Database (Denmark)

    Dreyer, L; Andersen, A; Pukkala, E

    1997-01-01

    around the year 2000, with 1,890 among men and fewer than 25 among women. The proportions that could be avoided if industrial carcinogens were eliminated would be 70% of mesotheliomas, 20% of cancers of the nasal cavity and sinuses, 12% of lung cancers, 5% of laryngeal cancers, 2% of urinary bladder...

  5. Vectors and Rotations in 3-Dimensions: Vector Algebra for the C++ Programmer

    Science.gov (United States)

    2016-12-01

    release; distribution is unlimited. 1. Introduction This report describes 2 C++ classes: a Vector class for performing vector algebra in 3-dimensional...ARL-TR-7894•DEC 2016 US Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier...Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier Survivability/Lethality

  6. Myopic Regret Avoidance: Feedback Avoidance and Learning in Repeated Decision Making

    Science.gov (United States)

    Reb, Jochen; Connolly, Terry

    2009-01-01

    Decision makers can become trapped by "myopic regret avoidance" in which rejecting feedback to avoid short-term "outcome regret" (regret associated with counterfactual outcome comparisons) leads to reduced learning and greater long-term regret over continuing poor decisions. In a series of laboratory experiments involving repeated choices among…

  7. A collision avoidance model for two-pedestrian groups: Considering random avoidance patterns

    Science.gov (United States)

    Zhou, Zhuping; Cai, Yifei; Ke, Ruimin; Yang, Jiwei

    2017-06-01

    Grouping is a common phenomenon in pedestrian crowds and group modeling is still an open challenging problem. When grouping pedestrians avoid each other, different patterns can be observed. Pedestrians can keep close with group members and avoid other groups in cluster. Also, they can avoid other groups separately. Considering this randomness in avoidance patterns, we propose a collision avoidance model for two-pedestrian groups. In our model, the avoidance model is proposed based on velocity obstacle method at first. Then grouping model is established using Distance constrained line (DCL), by transforming DCL into the framework of velocity obstacle, the avoidance model and grouping model are successfully put into one unified calculation structure. Within this structure, an algorithm is developed to solve the problem when solutions of the two models conflict with each other. Two groups of bidirectional pedestrian experiments are designed to verify the model. The accuracy of avoidance behavior and grouping behavior is validated in the microscopic level, while the lane formation phenomenon and fundamental diagrams is validated in the macroscopic level. The experiments results show our model is convincing and has a good expansibility to describe three or more pedestrian groups.

  8. Ranking Support Vector Machine with Kernel Approximation

    Directory of Open Access Journals (Sweden)

    Kai Chen

    2017-01-01

    Full Text Available Learning to rank algorithm has become important in recent years due to its successful application in information retrieval, recommender system, and computational biology, and so forth. Ranking support vector machine (RankSVM is one of the state-of-art ranking models and has been favorably used. Nonlinear RankSVM (RankSVM with nonlinear kernels can give higher accuracy than linear RankSVM (RankSVM with a linear kernel for complex nonlinear ranking problem. However, the learning methods for nonlinear RankSVM are still time-consuming because of the calculation of kernel matrix. In this paper, we propose a fast ranking algorithm based on kernel approximation to avoid computing the kernel matrix. We explore two types of kernel approximation methods, namely, the Nyström method and random Fourier features. Primal truncated Newton method is used to optimize the pairwise L2-loss (squared Hinge-loss objective function of the ranking model after the nonlinear kernel approximation. Experimental results demonstrate that our proposed method gets a much faster training speed than kernel RankSVM and achieves comparable or better performance over state-of-the-art ranking algorithms.

  9. Ranking Support Vector Machine with Kernel Approximation.

    Science.gov (United States)

    Chen, Kai; Li, Rongchun; Dou, Yong; Liang, Zhengfa; Lv, Qi

    2017-01-01

    Learning to rank algorithm has become important in recent years due to its successful application in information retrieval, recommender system, and computational biology, and so forth. Ranking support vector machine (RankSVM) is one of the state-of-art ranking models and has been favorably used. Nonlinear RankSVM (RankSVM with nonlinear kernels) can give higher accuracy than linear RankSVM (RankSVM with a linear kernel) for complex nonlinear ranking problem. However, the learning methods for nonlinear RankSVM are still time-consuming because of the calculation of kernel matrix. In this paper, we propose a fast ranking algorithm based on kernel approximation to avoid computing the kernel matrix. We explore two types of kernel approximation methods, namely, the Nyström method and random Fourier features. Primal truncated Newton method is used to optimize the pairwise L2-loss (squared Hinge-loss) objective function of the ranking model after the nonlinear kernel approximation. Experimental results demonstrate that our proposed method gets a much faster training speed than kernel RankSVM and achieves comparable or better performance over state-of-the-art ranking algorithms.

  10. Measuring Patients’ Attachment Avoidance in Psychotherapy: Development of the Attachment Avoidance in Therapy Scale (AATS

    Directory of Open Access Journals (Sweden)

    András Láng

    2012-11-01

    Full Text Available A new scale measuring patient-therapist attachment avoidance was developed. Attachment Avoidance in Therapy Scale is a new measure based on the Bartholomew model of adult attachment (Bartholomew & Horowitz, 1991 and the Experience in Close Relationships Scale (Brennan, Clark, & Shaver, 1998 to measure patients’ attachment avoidance towards therapists. With 112 patient-therapist dyads participating in the study, validation of a preliminary scale – measuring both attachment anxiety and attachment avoidance in therapy – took place using therapists’ evaluations of patients’ relational behavior and patients’ self-reports about their attitude toward psychotherapy. Analysis of the data revealed six underlying scales. Results showed all six scales to be reliable. Validation of scales measuring attachment anxiety failed. The importance of Attachment Avoidance in Therapy Scale and its subscales is discussed.

  11. Bursting neurons and ultrasound avoidance in crickets

    Directory of Open Access Journals (Sweden)

    Gary eMarsat

    2012-07-01

    Full Text Available Decision making in invertebrates often relies on simple neural circuits composed of only a few identified neurons. The relative simplicity of these circuits makes it possible to identify the key computation and neural properties underlying decisions. In this review, we summarize recent research on the neural basis of ultrasound avoidance in crickets, a response that allows escape from echolocating bats. The key neural property shaping behavioral output is high-frequency bursting of an identified interneuron, AN2, which carries information about ultrasound stimuli from receptor neurons to the brain. AN2's spike train consists of clusters of spikes –bursts– that may be interspersed with isolated, non-burst spikes. AN2 firing is necessary and sufficient to trigger avoidance steering but only high-rate firing, such as occurs in bursts, evokes this response. AN2 bursts are therefore at the core of the computation involved in deciding whether or not to steer away from ultrasound. Bursts in AN2 are triggered by synaptic input from nearly synchronous bursts in ultrasound receptors. Thus the population response at the very first stage of sensory processing –the auditory receptor- already differentiates the features of the stimulus that will trigger a behavioral response from those that will not. Adaptation, both intrinsic to AN2 and within ultrasound receptors, scales the burst-generating features according to the stimulus statistics, thus filtering out background noise and ensuring that bursts occur selectively in response to salient peaks in ultrasound intensity. Furthermore AN2’s sensitivity to ultrasound varies adaptively with predation pressure, through both developmental and evolutionary mechanisms. We discuss how this key relationship between bursting and the triggering of avoidance behavior is also observed in other invertebrate systems such as the avoidance of looming visual stimuli in locusts or heat avoidance in beetles.

  12. Inflammatory pathways of importance for management of inflammatory bowel disease

    DEFF Research Database (Denmark)

    Pedersen, Jannie; Coskun, Mehmet; Soendergaard, Christoffer

    2014-01-01

    Inflammatory bowel disease (IBD) is a group of chronic disorders of the gastrointestinal tract comprising Crohn's disease (CD) and ulcerative colitis (UC). Their etiologies are unknown, but they are characterised by an imbalanced production of pro-inflammatory mediators, e.g., tumor necrosis factor......-inflammatory cytokines, antibodies targeting integrins, and small anti-adhesion molecules that block adhesion between leukocytes and the intestinal vascular endothelium, reducing their infiltration into the inflamed mucosa. In this review we have elucidated the major signaling pathways of clinical importance for IBD...

  13. Root resorption: Focus on signs and symptoms of importance for avoiding root resorption during orthodontic treatment

    Directory of Open Access Journals (Sweden)

    Inger Kjaer

    2014-01-01

    Full Text Available Introduction: This paper summarizes the different conditions, which have a well-known influence on the resorption of tooth roots, exemplified by trauma and orthodontic treatment. The concept of the paper is to summarize and explain symptoms and signs of importance for avoiding resorption during orthodontic treatment. The Hypothesis: The hypothesis in this paper is that three different tissue layers covering the root in the so-called periroot sheet can explain signs and symptoms of importance for avoiding root resorption during orthodontic treatment. These different tissue layers are; outermost - an ectodermal tissue layer (Malassez′s epithelium, a middle layer - composed by the collagen-mesodermal tissue layer, and an innermost root-close innervation layer. Abnormalities in one of these tissue layers are thought to cause inflammatory processes in the periodontal membrane comparable to inflammatory processes provoked by trauma and orthodontic pressure. Inflammatory reactions are followed by resorptive processes in the periroot sheet and along the root surface. Evaluation of the Hypothesis: Different morphologies in the dentition are signs of abnormal epithelium or an abnormal mesodermal layer. It has formerly been demonstrated how demyelinization of the myelin sheaths in the peripheral nerves close to the root provoke resorption. Accordingly, conditions affecting these tissue layers can be associated not only with different morphologies but also with general symptoms and diseases (e.g., ectodermal dysplasia and hypophosphatasia.

  14. Nonseparable closed vector subspaces of separable topological vector spaces

    Czech Academy of Sciences Publication Activity Database

    Kąkol, Jerzy; Leiderman, A. G.; Morris, S. A.

    2017-01-01

    Roč. 182, č. 1 (2017), s. 39-47 ISSN 0026-9255 R&D Projects: GA ČR GF16-34860L Institutional support: RVO:67985840 Keywords : locally convex topological vector space * separable topological space Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.716, year: 2016 https://link.springer.com/article/10.1007%2Fs00605-016-0876-2

  15. Idiopathic inflammatory myositis.

    Science.gov (United States)

    Tieu, Joanna; Lundberg, Ingrid E; Limaye, Vidya

    2016-02-01

    Knowledge on idiopathic inflammatory myopathy (IIM) has evolved with the identification of myositis-associated and myositis-specific antibodies, development of histopathological classification and the recognition of how these correlate with clinical phenotype and response to therapy. In this paper, we outline key advances in diagnosis and histopathology, including the more recent identification of antibodies associated with immune-mediated necrotising myopathy (IMNM) and inclusion body myositis (IBM). Ongoing longitudinal observational cohorts allow further classification of these patients with IIM, their predicted clinical course and response to specific therapies. Registries have been developed worldwide for this purpose. A challenging aspect in IIM, a multisystem disease with multiple clinical subtypes, has been defining disease status and clinically relevant improvement. Tools for assessing activity and damage are now recognised to be important in determining disease activity and guiding therapeutic decision-making. The International Myositis Assessment and Clinical Studies (IMACS) group has developed such tools for use in research and clinical settings. There is limited evidence for specific treatment strategies in IIM. With significant development in the understanding of IIM and improved classification, longitudinal observational cohorts and trials using validated outcome measures are necessary, to provide important information for evidence-based care in the clinical setting. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  16. Transversals of Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    Vector fields in the complex plane are defined by assigning the vector determined by the value P(z) to each point z in the complex plane, where P is a polynomial of one complex variable. We consider special families of so-called rotated vector fields that are determined by a polynomial multiplied...... by rotational constants. Transversals are a certain class of curves for such a family of vector fields that represent the bifurcation states for this family of vector fields. More specifically, transversals are curves that coincide with a homoclinic separatrix for some rotation of the vector field. Given...... a concrete polynomial, it seems to take quite a bit of work to prove that it is generic, i.e. structurally stable. This has been done for a special class of degree d polynomial vector fields having simple equilibrium points at the d roots of unity, d odd. In proving that such vector fields are generic...

  17. Research on embedded automobile collision avoidance system

    Directory of Open Access Journals (Sweden)

    TAO Feng

    2016-08-01

    Full Text Available Taking ARM embedded Linux operating system as the development platform,combined with AVR microcontroller,while optimizing the ranging algorithm and using air ultrasonic transducer,the measurement range of which can be up to 50 meter,this paper designs a high-precision,range far,low price,various models suitable automobile collision avoidance warning system.The system adopts Forlinx OK6410 development board for the master.AVR microcontroller is responsible for taking the data of traveling distance between vehicles,and with the ARM development board via RS232 communication transfers vehicle′s distance and speed information to the ARM development boards.The system uses the established collision avoidance model to get alarm information.Experiments show that the system can accurately send out alarm information within a certain range.It is innovative and practical.

  18. How to avoid deferred-compensation troubles.

    Science.gov (United States)

    Freeman, Todd I

    2005-06-01

    Executive compensation packages have long included stock options and deferred compensation plans in order to compete for talent. Last year, Congress passed a law in response to the Enron debacle, in which executives were perceived to be protecting their deferred compensation at the expense of employees, creditors, and investors. The new law is designed to protect companies and their shareholders from being raided by the very executives that guided the company to financial ruin. Physicians who are part owners of medical practices need to know about the changes in the law regarding deferred compensation and how to avoid costly tax penalties. This article discusses how the changes affect medical practices as well as steps physician-owned clinics can take to avoid the risk of penalty, such as freezing deferred compensation and creating a new deferred compensation plan.

  19. Avoidant Personality Disorder: a Current Review.

    Science.gov (United States)

    Weinbrecht, Anna; Schulze, Lars; Boettcher, Johanna; Renneberg, Babette

    2016-03-01

    This review focuses on recent research on diagnostic aspects, etiology, and treatment of avoidant personality disorder (AVPD). Current studies stress the close relation between AVPD and social anxiety disorder, the influence of genetic factors in the development of AVPD, and the relative stability of symptoms. Treatment approaches should target the pervasive patterns of social inhibition, feelings of inadequacy, and hypersensitivity to negative evaluation. Empirical evidence for cognitive-behavior and schema therapy is promising. Few other therapeutic approaches have been developed, but until now, these have only been investigated in case studies. We conclude that AVPD qualifies as a neglected disorder and that more research specifically on avoidant personality disorder symptoms and its treatment is needed.

  20. Optical Flow based Robot Obstacle Avoidance

    Directory of Open Access Journals (Sweden)

    Kahlouche Souhila

    2008-11-01

    Full Text Available In this paper we try to develop an algorithm for visual obstacle avoidance of autonomous mobile robot. The input of the algorithm is an image sequence grabbed by an embedded camera on the B21r robot in motion. Then, the optical flow information is extracted from the image sequence in order to be used in the navigation algorithm. The optical flow provides very important information about the robot environment, like: the obstacles disposition, the robot heading, the time to collision and the depth. The strategy consists in balancing the amount of left and right side flow to avoid obstacles, this technique allows robot navigation without any collision with obstacles. The robustness of the algorithm will be showed by some examples.

  1. Construction dispute research conceptualisation, avoidance and resolution

    CERN Document Server

    2014-01-01

    There are three specific purposes of Construction Dispute Research. First, this volume aims to summarise studies on construction dispute. Second, apart from the theoretical constructs, where appropriate empirical tests are also included. This approach serves to go beyond the commonly used anecdotal approach for the subject matters. Third, it is the sincere hope of the authors that this book will help shaping research agenda of construction dispute.  The studies are mostly framed from a management perspective drawing on methods and concepts in contract law, economics, psychology and management science.   The book has twenty chapters that are arranged in four parts covering conceptualisation, avoidance, negotiation and mediation. Part 1 is devoted for dispute conceptualisation. A building is only as strong as its foundation. Thus it is no better start to study construction dispute by conceptualisation. The theme of Part 2 is dispute avoidance. The conventional wisdom of ‘prevention is better than cure’ se...

  2. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  3. Integrated Inflammatory Stress (ITIS) Model

    DEFF Research Database (Denmark)

    Bangsgaard, Elisabeth O.; Hjorth, Poul G.; Olufsen, Mette S.

    2017-01-01

    maintains a long-term level of the stress hormone cortisol which is also anti-inflammatory. A new integrated model of the interaction between these two subsystems of the inflammatory system is proposed and coined the integrated inflammatory stress (ITIS) model. The coupling mechanisms describing....... A constant activation results in elevated levels of the variables in the model while a prolonged change of the oscillations in ACTH and cortisol concentrations is the most pronounced result of different LPS doses predicted by the model....

  4. Problems of vector Lagrangians in field theories

    International Nuclear Information System (INIS)

    Krivsky, I.Yu.; Simulik, V.M.

    1997-01-01

    A vector Lagrange approach to the Dirac spinor field and the relationship between the vector Lagrangians for the spinor and electromagnetic fields are considered. A vector Lagrange approach for the system of interacting electromagnetic B=(B μ υ)=(E-bar,H-bar) and spinor Ψ fields is constructed. New Lagrangians (scalar and vector) for electromagnetic field in terms of field strengths are found. The foundations of two new QED models are formulated

  5. Lentiviral vectors in cancer immunotherapy.

    Science.gov (United States)

    Oldham, Robyn Aa; Berinstein, Elliot M; Medin, Jeffrey A

    2015-01-01

    Basic science advances in cancer immunotherapy have resulted in various treatments that have recently shown success in the clinic. Many of these therapies require the insertion of genes into cells to directly kill them or to redirect the host's cells to induce potent immune responses. Other analogous therapies work by modifying effector cells for improved targeting and enhanced killing of tumor cells. Initial studies done using γ-retroviruses were promising, but safety concerns centered on the potential for insertional mutagenesis have highlighted the desire to develop other options for gene delivery. Lentiviral vectors (LVs) have been identified as potentially more effective and safer alternative delivery vehicles. LVs are now in use in clinical trials for many different types of inherited and acquired disorders, including cancer. This review will discuss current knowledge of LVs and the applications of this viral vector-based delivery vehicle to cancer immunotherapy.

  6. Travel and disease vector ticks.

    Science.gov (United States)

    McGarry, John W

    2011-03-01

    There are approximately twenty species of hard (ixodid) ticks worldwide that frequently affect human populations, many of which are associated with serious, sometimes fatal disease(s). When a tick travel souvenir is presented in the clinic, the risk must be immediately assessed by identifying the tick in question, ascertaining its disease vector status and determining if there has been the opportunity for the transfer of potential pathogens. This short review on identification of disease vector ticks and aspects of blood feeding and disease transmission includes the results of an examination of 59 specimens removed from UK domestic travellers and international travellers between 2002 and 2010. Sixteen tick species belonging to six genera were recorded and almost all showed evidence of blood feeding, which appears to contradict the view that because of their size, adult ticks are found early and therefore present an insignificant risk. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. Online Learning of Commission Avoidant Portfolio Ensembles

    OpenAIRE

    Uziel, Guy; El-Yaniv, Ran

    2016-01-01

    We present a novel online ensemble learning strategy for portfolio selection. The new strategy controls and exploits any set of commission-oblivious portfolio selection algorithms. The strategy handles transaction costs using a novel commission avoidance mechanism. We prove a logarithmic regret bound for our strategy with respect to optimal mixtures of the base algorithms. Numerical examples validate the viability of our method and show significant improvement over the state-of-the-art.

  8. Detect and Avoid (DAA) Automation Maneuver Study

    Science.gov (United States)

    2017-02-01

    GUY A. FRENCH JOSEPH C. PRICE, MAJ, USAF Work Unit Manager Acting Chief, Supervisory Control and Cognition Branch Supervisory Control and Cognition...19a. NAME OF RESPONSIBLE PERSON (Monitor) a. REPORT Unclassified b. ABSTRACT Unclassified c. THIS PAGE Unclassified Guy French 19b. TELEPHONE...the ability to detect and safely avoid other aircraft in flight ( Cook & Davis, 2013). In order to increase UAS flight safety and support UAS

  9. Tax avoidance: Definition and prevention issues

    Directory of Open Access Journals (Sweden)

    Anđelković Mileva

    2014-01-01

    Full Text Available The problem of resolving issues pertaining to tax avoidance, and particularly its aggressive forms, has been the focal point of discussion among tax scholars which is increasingly gaining attention of politicians alike. As opposed to tax evasion (which is illegal, the phenomenon of tax avoidance calls for careful consideration of state fiscal interests and a highly precise demarcation of the thin line between the acceptable and unacceptable conduct. In many contemporary states, tax avoidance (which implies a formal behaviour of tax payers within the limits of tax legislation but contrary to the tax regulation objectives is declared to be illegitimate. State authorities do not want to tolerate such activity, which results in tax payers' reduction or avoidance of tax liabilities. We should also bear in mind that all tax payers have the tax planning option at their disposal, by means of which they make sure that they do not pay more tax than they are legally obliged to. However, in case they skilfully use the tax regulation flaws and loopholes for the sole purpose of tax evasion, and/or resort to misrepresentation and deceptive constructs, they are considered to be exceeding the limits of acceptable tax behaviour. In comparison to the specific anti-abuse measures which have been built into some national tax legislations, there is a growing number of states that introduce the general anti-abuse legislations, which is based on judicial doctrines or statutory legislation. Yet, there is a notable difference among the envisaged anti-abuse measures depending on whether the national legislation is based on the Anglo-American or European-Continental legal system. The efficiency of applying these general anti-abuse rules in taxation largely rests on their interpretation as well as on their relationship with the principle of legality.

  10. Avoiding Local Optima with Interactive Evolutionary Robotics

    Science.gov (United States)

    2012-07-09

    the top of a flight of stairs selects for climbing ; suspending the robot and the target object above the ground and creating rungs between the two will...REPORT Avoiding Local Optimawith Interactive Evolutionary Robotics 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: The main bottleneck in evolutionary... robotics has traditionally been the time required to evolve robot controllers. However with the continued acceleration in computational resources, the

  11. The International Double Taxation – Avoiding Methods

    OpenAIRE

    Nicoleta Barbuta-Misu

    2009-01-01

    The paper presents the main causes that determine double taxation, its forms, i.e. the economicdouble taxation and the international legal double taxation, the need for eliminating the double taxation andavoiding methods. In the presentation of the avoidance methods have been used practical examples forcomparison of the tax advantages for income beneficiary between: the total exemption method andprogressive exemption method, on the one hand, and total crediting method and ordinary crediting m...

  12. Functional neuroimaging of avoidance habits in OCD

    Science.gov (United States)

    Gillan, Claire M; Apergis-Schoute, Annemieke M; Morein-Zamir, Sharon; Urcelay, Gonzalo P; Sule, Akeem; Fineberg, Naomi A; Sahakian, Barbara J; Robbins, Trevor W

    2016-01-01

    Objective The goal of this study was to determine the neural correlates of excessive habit formation in obsessive-compulsive disorder (OCD). We aimed to (i) test for neurobiological convergence with the known pathophysiology of OCD and (ii) infer, based on abnormalities in brain activation, whether these habits arise from dysfunction in the goal-directed or habit system. Method Thirty-seven OCD patients and 33 controls learned to avoid shocks while undergoing a functional Magnetic Resonance Imaging (fMRI) scan. Following 4 blocks of training, we tested if the avoidance response had become a habit by removing the threat of shock and measuring continued avoidance. We tested for task-related differences in brain activity in 3 ROIs, the caudate, putamen and medial orbitofrontal cortex at a statistical threshold of phabit formation in OCD patients, which was associated with hyper-activation in the caudate. Activation in this region was also associated with subjective ratings of increased urge to perform habits. The OCD group, as a whole, showed hyper-activation in the medial orbitofrontal cortex (mOFC) during the acquisition of avoidance, however this did not relate directly to habit formation. Conclusions OCD patients exhibited excessive habits that were associated with hyper-activation in a key region implicated in the pathophysiology of OCD, the caudate nucleus. Prior studies suggest that this region is important for goal-directed behavior, suggesting that habit-forming biases in OCD may be a result of impairments in this system, rather than differences in the build up of stimulus-response habits themselves. PMID:25526600

  13. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    The increasing demand to integrate unmanned aircraft systems (UAS) into the national airspace is motivated by the rapid growth of the UAS industry, especially small UAS weighing less than 55 pounds. Their use however has been limited by the Federal Aviation Administration regulations due to collision risk they pose, safety and regulatory concerns. Therefore, before civil aviation authorities can approve routine UAS flight operations, UAS must be equipped with sense-and-avoid technology comparable to the see-and-avoid requirements for manned aircraft. The sense-and-avoid problem includes several important aspects including regulatory and system-level requirements, design specifications and performance standards, intruder detecting and tracking, collision risk assessment, and finally path planning and collision avoidance. In this dissertation, our primary focus is on developing an collision detection, risk assessment and avoidance framework that is computationally affordable and suitable to run on-board small UAS. To begin with, we address the minimum sensing range for the sense-and-avoid (SAA) system. We present an approximate close form analytical solution to compute the minimum sensing range to safely avoid an imminent collision. The approach is then demonstrated using a radar sensor prototype that achieves the required minimum sensing range. In the area of collision risk assessment and collision prediction, we present two approaches to estimate the collision risk of an encounter scenario. The first is a deterministic approach similar to those been developed for Traffic Alert and Collision Avoidance (TCAS) in manned aviation. We extend the approach to account for uncertainties of state estimates by deriving an analytic expression to propagate the error variance using Taylor series approximation. To address unanticipated intruders maneuvers, we propose an innovative probabilistic approach to quantify likely intruder trajectories and estimate the probability of

  14. Disease Vector Ecology Profile: Ecuador

    Science.gov (United States)

    1998-12-01

    years occurred in Peru in the northern departments bordering Ecuador in 1992-1994. Sylvatic plague is endemic in the southern provinces of Loja and... Ecuador ) Micrurus bocourti (Pacific lowlands of western Ecuador ) Micrurus catamayensis (Catamayo Valley, Loja Province) Micrurus dumerilii spp...Disease Vector Ecology Profile Ecuador -~· ""’ -.. ~ """ Defense Pest Management Information Analysis Center’ Armed Forces Pest Management

  15. Plebotomine Vectors of Human Disease.

    Science.gov (United States)

    1984-12-30

    incriminated as vectors of Leishmania mexicana among rodents and/or humans from Mexico to the Amazon Basin. Specimens referable to L. olmeca olmeca...in the format similar to that given for the species group baityi included in this report. Additional phlebotomines from Tanzania, Brazil, Peru and...species group baityi included in this report. Additional phlebotomines from Tanzania, Brazil, Peru and Venezuela were slide-mounted and added to the

  16. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il; Jain, Mayank; Kazandjieva, Maria A.; Levis, Philip

    2010-01-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  17. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il

    2010-10-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  18. Acute carbon dioxide avoidance in Caenorhabditis elegans.

    Science.gov (United States)

    Hallem, Elissa A; Sternberg, Paul W

    2008-06-10

    Carbon dioxide is produced as a by-product of cellular respiration by all aerobic organisms and thus serves for many animals as an important indicator of food, mates, and predators. However, whether free-living terrestrial nematodes such as Caenorhabditis elegans respond to CO2 was unclear. We have demonstrated that adult C. elegans display an acute avoidance response upon exposure to CO2 that is characterized by the cessation of forward movement and the rapid initiation of backward movement. This response is mediated by a cGMP signaling pathway that includes the cGMP-gated heteromeric channel TAX-2/TAX-4. CO2 avoidance is modulated by multiple signaling molecules, including the neuropeptide Y receptor NPR-1 and the calcineurin subunits TAX-6 and CNB-1. Nutritional status also modulates CO2 responsiveness via the insulin and TGFbeta signaling pathways. CO2 response is mediated by a neural circuit that includes the BAG neurons, a pair of sensory neurons of previously unknown function. TAX-2/TAX-4 function in the BAG neurons to mediate acute CO2 avoidance. Our results demonstrate that C. elegans senses and responds to CO2 using multiple signaling pathways and a neural network that includes the BAG neurons and that this response is modulated by the physiological state of the worm.

  19. Traffic jam driving with NMV avoidance

    Science.gov (United States)

    Milanés, Vicente; Alonso, Luciano; Villagrá, Jorge; Godoy, Jorge; de Pedro, Teresa; Oria, Juan P.

    2012-08-01

    In recent years, the development of advanced driver assistance systems (ADAS) - mainly based on lidar and cameras - has considerably improved the safety of driving in urban environments. These systems provide warning signals for the driver in the case that any unexpected traffic circumstance is detected. The next step is to develop systems capable not only of warning the driver but also of taking over control of the car to avoid a potential collision. In the present communication, a system capable of autonomously avoiding collisions in traffic jam situations is presented. First, a perception system was developed for urban situations—in which not only vehicles have to be considered, but also pedestrians and other non-motor-vehicles (NMV). It comprises a differential global positioning system (DGPS) and wireless communication for vehicle detection, and an ultrasound sensor for NMV detection. Then, the vehicle's actuators - brake and throttle pedals - were modified to permit autonomous control. Finally, a fuzzy logic controller was implemented capable of analyzing the information provided by the perception system and of sending control commands to the vehicle's actuators so as to avoid accidents. The feasibility of the integrated system was tested by mounting it in a commercial vehicle, with the results being encouraging.

  20. Knowing and avoiding plagiarism during scientific writing.

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, Svvs; Nagasree, M

    2014-09-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing.

  1. Knowing and Avoiding Plagiarism During Scientific Writing

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  2. Urban water restrictions: Attitudes and avoidance

    Science.gov (United States)

    Cooper, Bethany; Burton, Michael; Crase, Lin

    2011-12-01

    In most urban cities across Australia, water restrictions remain the dominant policy mechanism to restrict urban water consumption. The extensive adoption of water restrictions as a means to limit demand, over several years, means that Australian urban water prices have consistently not reflected the opportunity cost of water. Given the generally strong political support for water restrictions and the likelihood that they will persist for some time, there is value in understanding households' attitudes in this context. More specifically, identifying the welfare gains associated with avoiding urban water restrictions entirely would be a nontrivial contribution to our knowledge and offer insights into the benefits of alternative policy responses. This paper describes the results from a contingent valuation study that investigates consumers' willingness to pay to avoid urban water restrictions. Importantly, the research also investigates the influence of cognitive and exogenous dimensions on the utility gain associated with avoiding water restrictions. The results provide insights into the impact of the current policy mechanism on economic welfare.

  3. Characterizing Convexity of Games using Marginal Vectors

    NARCIS (Netherlands)

    van Velzen, S.; Hamers, H.J.M.; Norde, H.W.

    2003-01-01

    In this paper we study the relation between convexity of TU games and marginal vectors.We show that if specfic marginal vectors are core elements, then the game is convex.We characterize sets of marginal vectors satisfying this property, and we derive the formula for the minimum number of marginal

  4. Herbivore arthropods benefit from vectoring plant viruses

    NARCIS (Netherlands)

    Belliure, B.; Janssen, A.; Maris, P.C.; Peters, D.; Sabelis, M.W.

    2005-01-01

    Plants infected with pathogens often attract the pathogens' vectors, but it is not clear if this is advantageous to the vectors. We therefore quantified the direct and indirect (through the host plant) effects of a pathogen on its vector. A positive direct effect of the plant-pathogenic Tomato

  5. Vector fields and gravity on the lattice

    International Nuclear Information System (INIS)

    Khatsymovsky, V.M.

    1988-01-01

    The problem of discretization of vector field on Regge lattice is considered. Our approach is based on geometrical interpretation of the vector field as the field of infinitesimal coordinate transformation. A discrete version of the vector field action is obtained as a particular case of the continuum action, and it is shown to have the true continuum limit

  6. Vector Fields and Flows on Differentiable Stacks

    DEFF Research Database (Denmark)

    A. Hepworth, Richard

    2009-01-01

    This paper introduces the notions of vector field and flow on a general differentiable stack. Our main theorem states that the flow of a vector field on a compact proper differentiable stack exists and is unique up to a uniquely determined 2-cell. This extends the usual result on the existence...... of vector fields....

  7. Visualizing vector field topology in fluid flows

    Science.gov (United States)

    Helman, James L.; Hesselink, Lambertus

    1991-01-01

    Methods of automating the analysis and display of vector field topology in general and flow topology in particular are discussed. Two-dimensional vector field topology is reviewed as the basis for the examination of topology in three-dimensional separated flows. The use of tangent surfaces and clipping in visualizing vector field topology in fluid flows is addressed.

  8. Modeling vector nonlinear time series using POLYMARS

    NARCIS (Netherlands)

    de Gooijer, J.G.; Ray, B.K.

    2003-01-01

    A modified multivariate adaptive regression splines method for modeling vector nonlinear time series is investigated. The method results in models that can capture certain types of vector self-exciting threshold autoregressive behavior, as well as provide good predictions for more general vector

  9. Construction of expression vectors carrying mouse peroxisomal ...

    African Journals Online (AJOL)

    The aim of this study was to construct expression vectors carrying mouse peroxisomal protein gene (PEP-cDNA) in prokaryotic and mammalian expression vectors in ... pGEX6p2-PEP and pUcD3-FLAG-PEP constructed vectors were transformed into the one shot TOP10 and JM105 bacterial competent cells, respectively.

  10. Extremal vectors and rectifiability | Enflo | Quaestiones Mathematicae

    African Journals Online (AJOL)

    Extremal vectors and rectifiability. ... The concept of extremal vectors of a linear operator with a dense range but not onto on a Hilbert space was introduced by P. Enflo in 1996 as a new approach to study invariant subspaces ... We show that in general curves that map numbers to backward minimal vectors are not rectifiable.

  11. Toward lattice fractional vector calculus

    International Nuclear Information System (INIS)

    Tarasov, Vasily E

    2014-01-01

    An analog of fractional vector calculus for physical lattice models is suggested. We use an approach based on the models of three-dimensional lattices with long-range inter-particle interactions. The lattice analogs of fractional partial derivatives are represented by kernels of lattice long-range interactions, where the Fourier series transformations of these kernels have a power-law form with respect to wave vector components. In the continuum limit, these lattice partial derivatives give derivatives of non-integer order with respect to coordinates. In the three-dimensional description of the non-local continuum, the fractional differential operators have the form of fractional partial derivatives of the Riesz type. As examples of the applications of the suggested lattice fractional vector calculus, we give lattice models with long-range interactions for the fractional Maxwell equations of non-local continuous media and for the fractional generalization of the Mindlin and Aifantis continuum models of gradient elasticity. (papers)

  12. Predictable and avoidable: What’s next?

    Directory of Open Access Journals (Sweden)

    Ivo Pezzuto

    2014-09-01

    Full Text Available The author of this paper (Dr. Ivo Pezzuto has been one of the first authors to write back in 2008 about the alleged "subprime mortgage loans fraud" which has triggered the 2008 financial crisis, in combination with multiple other complex, highly interrelated, and concurrent factors. The author has been also one of the first authors to report in that same working paper of 2008 (available on SSRN and titled "Miraculous Financial Engineering or Toxic Finance? The Genesis of the U.S. Subprime Mortgage Loans Crisis and its Consequences on the Global Financial Markets and Real Economy" the high probability of a Eurozone debt crisis, due to a number of unsolved structural macroeconomic problems, the lack of a single crisis resolution scheme, current account imbalances, and in some countries, housing bubbles/high private debt. In the book published in 2013 and titled "Predictable and Avoidable: Repairing Economic Dislocation and Preventing the Recurrence of Crisis", Dr. Ivo Pezzuto has exposed the root causes of the financial crisis in order to enables readers to understand that the crisis we have seen was predictable and should have been avoidable, and that a recurrence can be avoided, if lessons are learned and the right action taken. Almost one year after the publication of the book "Predictable and Avoidable: Repairing Economic Dislocation and Preventing the Recurrence of Crisis", the author has decided to write this working paper to explore what happened in the meantime to the financial markets and to the financial regulation implementation. Most of all, the author with this working paper aims to provide an updated analysis as strategist and scenario analyst on the topics addressed in the book "Predictable and Avoidable" based on a forward-looking perspective and on potential "tail risk" scenarios. The topics reported in this paper relate to financial crises; Government policy; financial regulation; corporate governance; credit risk management

  13. See-and-Avoid Collision Avoidance Using ADS-B Signal and Radar Sensing, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — IAI proposes an innovative collision avoidance radar and communication technology to detect and track both cooperative and non-cooperative targets. The system...

  14. Radiotherapy of brain inflammatory diseases

    International Nuclear Information System (INIS)

    Pil', B.N.

    1982-01-01

    An experience of radiation treatment of brain inflammatory diseases is described. Radiation treatment goes with antiinflammatory, anticonvulsive agents, with resorbing and dehydrating measures and some times with surgical treatment. The methods of radiation treatment of convexital and optochiasmic arachnoiditis

  15. Atypical idiopathic inflammatory demyelinating lesions

    DEFF Research Database (Denmark)

    Wallner-Blazek, Mirja; Rovira, Alex; Fillipp, Massimo

    2013-01-01

    Atypical lesions of a presumably idiopathic inflammatory demyelinating origin present quite variably and may pose diagnostic problems. The subsequent clinical course is also uncertain. We, therefore, wanted to clarify if atypical idiopathic inflammatory demyelinating lesions (AIIDLs) can be class......Atypical lesions of a presumably idiopathic inflammatory demyelinating origin present quite variably and may pose diagnostic problems. The subsequent clinical course is also uncertain. We, therefore, wanted to clarify if atypical idiopathic inflammatory demyelinating lesions (AIIDLs) can...... be classified according to previously suggested radiologic characteristics and how this classification relates to prognosis. Searching the databases of eight tertiary referral centres we identified 90 adult patients (61 women, 29 men; mean age 34 years) with ≥1 AIIDL. We collected their demographic, clinical...

  16. Gaussian statistics for palaeomagnetic vectors

    Science.gov (United States)

    Love, J.J.; Constable, C.G.

    2003-01-01

    With the aim of treating the statistics of palaeomagnetic directions and intensities jointly and consistently, we represent the mean and the variance of palaeomagnetic vectors, at a particular site and of a particular polarity, by a probability density function in a Cartesian three-space of orthogonal magnetic-field components consisting of a single (unimoda) non-zero mean, spherically-symmetrical (isotropic) Gaussian function. For palaeomagnetic data of mixed polarities, we consider a bimodal distribution consisting of a pair of such symmetrical Gaussian functions, with equal, but opposite, means and equal variances. For both the Gaussian and bi-Gaussian distributions, and in the spherical three-space of intensity, inclination, and declination, we obtain analytical expressions for the marginal density functions, the cumulative distributions, and the expected values and variances for each spherical coordinate (including the angle with respect to the axis of symmetry of the distributions). The mathematical expressions for the intensity and off-axis angle are closed-form and especially manageable, with the intensity distribution being Rayleigh-Rician. In the limit of small relative vectorial dispersion, the Gaussian (bi-Gaussian) directional distribution approaches a Fisher (Bingham) distribution and the intensity distribution approaches a normal distribution. In the opposite limit of large relative vectorial dispersion, the directional distributions approach a spherically-uniform distribution and the intensity distribution approaches a Maxwell distribution. We quantify biases in estimating the properties of the vector field resulting from the use of simple arithmetic averages, such as estimates of the intensity or the inclination of the mean vector, or the variances of these quantities. With the statistical framework developed here and using the maximum-likelihood method, which gives unbiased estimates in the limit of large data numbers, we demonstrate how to

  17. Gaussian statistics for palaeomagnetic vectors

    Science.gov (United States)

    Love, J. J.; Constable, C. G.

    2003-03-01

    With the aim of treating the statistics of palaeomagnetic directions and intensities jointly and consistently, we represent the mean and the variance of palaeomagnetic vectors, at a particular site and of a particular polarity, by a probability density function in a Cartesian three-space of orthogonal magnetic-field components consisting of a single (unimodal) non-zero mean, spherically-symmetrical (isotropic) Gaussian function. For palaeomagnetic data of mixed polarities, we consider a bimodal distribution consisting of a pair of such symmetrical Gaussian functions, with equal, but opposite, means and equal variances. For both the Gaussian and bi-Gaussian distributions, and in the spherical three-space of intensity, inclination, and declination, we obtain analytical expressions for the marginal density functions, the cumulative distributions, and the expected values and variances for each spherical coordinate (including the angle with respect to the axis of symmetry of the distributions). The mathematical expressions for the intensity and off-axis angle are closed-form and especially manageable, with the intensity distribution being Rayleigh-Rician. In the limit of small relative vectorial dispersion, the Gaussian (bi-Gaussian) directional distribution approaches a Fisher (Bingham) distribution and the intensity distribution approaches a normal distribution. In the opposite limit of large relative vectorial dispersion, the directional distributions approach a spherically-uniform distribution and the intensity distribution approaches a Maxwell distribution. We quantify biases in estimating the properties of the vector field resulting from the use of simple arithmetic averages, such as estimates of the intensity or the inclination of the mean vector, or the variances of these quantities. With the statistical framework developed here and using the maximum-likelihood method, which gives unbiased estimates in the limit of large data numbers, we demonstrate how to

  18. Disrupted avoidance learning in functional neurological disorder: Implications for harm avoidance theories

    Directory of Open Access Journals (Sweden)

    Laurel S. Morris

    Full Text Available Background: Functional neurological disorder (FND is an elusive disorder characterized by unexplained neurological symptoms alongside aberrant cognitive processing and negative affect, often associated with amygdala reactivity. Methods: We examined the effect of negative conditioning on cognitive function and amygdala reactivity in 25 FND patients and 20 healthy volunteers (HV. Participants were first conditioned to stimuli paired with negative affective or neutral (CS+/CS− information. During functional MRI, subjects then performed an instrumental associative learning task to avoid monetary losses in the context of the previously conditioned stimuli. We expected that FND patients would be better at learning to avoid losses when faced with negatively conditioned stimuli (increased harm avoidance. Multi-echo resting state fMRI was also collected from the same subjects and a robust denoising method was employed, important for removing motion and physiological artifacts. Results: FND subjects were more sensitive to the negative CS+ compared to HV, demonstrated by a reinforcement learning model. Contrary to expectation, FND patients were generally more impaired at learning to avoid losses under both contexts (CS+/CS−, persisting to choose the option that resulted in a negative outcome demonstrated by both behavioural and computational analyses. FND patients showed enhanced amygdala but reduced dorsolateral prefrontal cortex responses when they received negative feedback. Patients also had increased resting state functional connectivity between these two regions. Conclusions: FND patients had impaired instrumental avoidance learning, findings that parallel previous observations of impaired action-outcome binding. FND patients further show enhanced behavioural and neural sensitivity to negative information. However, this did not translate to improved avoidance learning. Put together, our findings do not support the theory of harm avoidance in FND

  19. A Crowd Avoidance Method Using Circular Avoidance Path for Robust Person Following

    Directory of Open Access Journals (Sweden)

    Kohei Morishita

    2017-01-01

    Full Text Available A life-support service robot must avoid both static and dynamic obstacles for working in a real environment. Here, a static obstacle means an obstacle that does not move, and a dynamic obstacle is the one that moves. Assuming the robot is following a target person, we discuss how the robot avoids a crowd through which the target person passes and arrives at the target position. The purpose of this paper is to propose a crowd avoidance method that makes a robot to be able to avoid both static and dynamic obstacles. The method uses the surface points of the obstacles to form an avoidance region, and the robot moves along the edge of the region. We conducted experiments assuming various situations such that the robot was blocked, there was a wide gap in the crowd, or a person in the crowd yielded for the robot to pass through. As an experimental result, it was confirmed the robot could avoid the crowd even when the obstacles were aligned in an “inverted wedge” shape.

  20. Problems and worked solutions in vector analysis

    CERN Document Server

    Shorter, LR

    2014-01-01

    ""A handy book like this,"" noted The Mathematical Gazette, ""will fill a great want."" Devoted to fully worked out examples, this unique text constitutes a self-contained introductory course in vector analysis for undergraduate and graduate students of applied mathematics.Opening chapters define vector addition and subtraction, show how to resolve and determine the direction of two or more vectors, and explain systems of coordinates, vector equations of a plane and straight line, relative velocity and acceleration, and infinitely small vectors. The following chapters deal with scalar and vect

  1. In Vivo Validation of a Blood Vector Velocity Estimator with MR Angiography

    DEFF Research Database (Denmark)

    Hansen, Kristoffer Lindskov; Udesen, Jesper; Thomsen, Carsten

    2009-01-01

    Conventional Doppler methods for blood velocity estimation only estimate the velocity component along the ultrasound beam direction. This implies that a Doppler angle under examination close to 90° results in unreliable information about the true blood direction and blood velocity. The novel method...... indicate that reliable vector velocity estimates can be obtained in vivo using the presented angle-independent 2-D vector velocity method. The TO method can be a useful alternative to conventional Doppler systems by avoiding the angle artifact, thus giving quantitative velocity information....

  2. Self-trapping of scalar and vector dipole solitary waves in Kerr media

    International Nuclear Information System (INIS)

    Zhong Weiping; Belic, Milivoj R.; Assanto, Gaetano; Malomed, Boris A.; Huang Tingwen

    2011-01-01

    We report solutions for expanding dipole-type optical solitary waves in two-dimensional Kerr media with the self-focusing nonlinearity, using exact analytical (Hirota) and numerical methods. Such localized beams carry intrinsic vorticity and exhibit symmetric shapes for both scalar and vector solitary modes. When vector beams are close to the scalar limit, simulations demonstrate their stability over propagation distances exceeding 50 diffraction lengths. In fact, the continuous expansion helps the vortical beams avoid the instability against the splitting, collapse, or decay, making them 'convectively stable' patterns.

  3. Multiscale vector fields for image pattern recognition

    Science.gov (United States)

    Low, Kah-Chan; Coggins, James M.

    1990-01-01

    A uniform processing framework for low-level vision computing in which a bank of spatial filters maps the image intensity structure at each pixel into an abstract feature space is proposed. Some properties of the filters and the feature space are described. Local orientation is measured by a vector sum in the feature space as follows: each filter's preferred orientation along with the strength of the filter's output determine the orientation and the length of a vector in the feature space; the vectors for all filters are summed to yield a resultant vector for a particular pixel and scale. The orientation of the resultant vector indicates the local orientation, and the magnitude of the vector indicates the strength of the local orientation preference. Limitations of the vector sum method are discussed. Investigations show that the processing framework provides a useful, redundant representation of image structure across orientation and scale.

  4. Avoiding Plagiarism in Writing a Research Paper

    Directory of Open Access Journals (Sweden)

    Majid Wajdi

    2018-03-01

    Full Text Available This paper discusses how to avoid plagiarism in a research paper. Avoiding plagiarism is part of a scientific writing ethic that always stated in any publication. Every writer should pay attention to their papers submitted to a journal or a scientific forum that they are free from unethical conduct. Writing a research paper needs overall accuracy especially in avoiding plagiarism in the paper that is to be published in a journal or to be presented at a certain scientific meeting, seminar or symposium. It is based on writers’ experience as a paper writer as well as a journal reviewer. The first application that the writers use is ‘checker’, a Mac computer application, used to check spelling and grammar. It assists the writers to check how misspelling and an ungrammatical inaccuracy in the writers’ papers. The second free application is ‘plagiarism checker’. Checking originality of a paper is essential and it is not too difficult to do today. It is freely accessible that plagiarism checker can be used to check how original the paper is. By visiting “Google” then write down ‘plagiarism checker’, it will appear ‘smallseatools’ and then the writers could choose and check how original the paper is. This application is freely accessed and helps immensely to check how original a paper is and how far a paper is free from plagiarism. The unoriginal phrase will be underlined and marked red and finally will be shown how inimitable the paper is. Plagiarism scan report which consists of the date of the report, plagiarism status, total words and total characters can be downloaded.

  5. Colostomy closure: how to avoid complications.

    Science.gov (United States)

    Bischoff, Andrea; Levitt, Marc A; Lawal, Taiwo A; Peña, Alberto

    2010-11-01

    Colostomy is an operation frequently performed in pediatric surgery. Despite its benefits, it can produce significant morbidity. In a previous publication we presented our experience with the errors and complications that occurred during cases of colostomy creation. We now have focused in the morbidity related to the colostomy closure. The technical details that might have contributed to the minimal morbidity we experienced are described. The medical records of 649 patients who underwent colostomy closure over a 28-year period were retrospectively reviewed looking for complications following these procedures. Our perioperative protocol for colostomy closure consisted in: clear fluids by mouth and repeated proximal stoma irrigations 24 h prior to the operation. Administration of IV antibiotics during anesthesia induction and continued for 48 h. Meticulous surgical technique that included: packing of the proximal stoma, plastic drape to immobilize the surgical field, careful hemostasis, emphasis in avoiding contamination, cleaning the edge of the stomas to allow a good 2-layer, end-to-end anastomosis with separated long-term absorbable sutures, generous irrigation of the peritoneal cavity and subsequent layers with saline solution, closure by layers to avoid dead space, and avoidance of hematomas. No drains and no nasogastric tubes were used. Oral fluids were started the day after surgery and patients were discharged 48-72 h after the operation. The original diagnoses of the patients were: anorectal malformation (583), Hirschsprung's disease (53), and others (13). 10 patients (1.5%) had complications: 6 had intestinal obstruction (5 due to small bowel adhesions, 1 had temporary delay of the function of the anastomosis due to a severe size discrepancy between proximal and distal stoma with a distal microcolon) and 4 incisional hernias. There were no anastomotic dehiscences or wound infection. There was no bleeding, no anastomotic stricture and no mortality. Based on

  6. Precision Landing and Hazard Avoidance Doman

    Science.gov (United States)

    Robertson, Edward A.; Carson, John M., III

    2016-01-01

    The Precision Landing and Hazard Avoidance (PL&HA) domain addresses the development, integration, testing, and spaceflight infusion of sensing, processing, and GN&C functions critical to the success and safety of future human and robotic exploration missions. PL&HA sensors also have applications to other mission events, such as rendezvous and docking. Autonomous PL&HA builds upon the core GN&C capabilities developed to enable soft, controlled landings on the Moon, Mars, and other solar system bodies. Through the addition of a Terrain Relative Navigation (TRN) function, precision landing within tens of meters of a map-based target is possible. The addition of a 3-D terrain mapping lidar sensor improves the probability of a safe landing via autonomous, real-time Hazard Detection and Avoidance (HDA). PL&HA significantly improves the probability of mission success and enhances access to sites of scientific interest located in challenging terrain. PL&HA can also utilize external navigation aids, such as navigation satellites and surface beacons. Advanced Lidar Sensors High precision ranging, velocimetry, and 3-D terrain mapping Terrain Relative Navigation (TRN) TRN compares onboard reconnaissance data with real-time terrain imaging data to update the S/C position estimate Hazard Detection and Avoidance (HDA) Generates a high-resolution, 3-D terrain map in real-time during the approach trajectory to identify safe landing targets Inertial Navigation During Terminal Descent High precision surface relative sensors enable accurate inertial navigation during terminal descent and a tightly controlled touchdown within meters of the selected safe landing target.

  7. The global cost of eliminating avoidable blindness

    Directory of Open Access Journals (Sweden)

    Kirsten L Armstrong

    2012-01-01

    Full Text Available Aims : To complete an initial estimate of the global cost of eliminating avoidable blindness, including the investment required to build ongoing primary and secondary health care systems, as well as to eliminate the ′backlog′ of avoidable blindness. This analysis also seeks to understand and articulate where key data limitations lie. Materials and Methods : Data were collected in line with a global estimation approach, including separate costing frameworks for the primary and secondary care sectors, and the treatment of backlog. Results : The global direct health cost to eliminate avoidable blindness over a 10-year period from 2011 to 2020 is estimated at $632 billion per year (2009 US$. As countries already spend $592 billion per annum on eye health, this represents additional investment of $397.8 billion over 10 years, which is $40 billion per year or $5.80 per person for each year between 2010 and 2020. This is concentrated in high-income nations, which require 68% of the investment but comprise 16% of the world′s inhabitants. For all other regions, the additional investment required is $127 billion. Conclusions : This costing estimate has identified that low- and middle-income countries require less than half the additional investment compared with high-income nations. Low- and middle-income countries comprise the greater investment proportion in secondary care whereas high-income countries require the majority of investment into the primary sector. However, there is a need to improve sector data. Investment in better data will have positive flow-on effects for the eye health sector.

  8. Avoiding object by robot using neural network

    International Nuclear Information System (INIS)

    Prasetijo, D.W.

    1997-01-01

    A Self controlling robot is necessary in the robot application in which operator control is difficult. Serial method such as process on the computer of van newman is difficult to be applied for self controlling robot. In this research, Neural network system for robotic control system was developed by performance expanding at the SCARA. In this research, it was shown that SCARA with application at Neural network system can avoid blocking objects without influence by number and density of the blocking objects, also departure and destination paint. robot developed by this study also can control its moving by self

  9. Common pitfalls to avoid during workover operations

    International Nuclear Information System (INIS)

    Byars, R.R.

    1994-01-01

    Remedial well work has been, and will continue to be, an integral part of oil company operations. More than 16,000 workover operations were performed during 1993 in the US. The economic impact from workover operations is usually immediate due to flowlines, tank batteries and other equipment being in place and ready for service prior to the workover. Similarly, problems encountered during workover operations contribute an immediate negative impact to project economics. Guidelines for common mistake avoidance are presented. They will be especially helpful for those individuals not well trained in workover preparation and supervision

  10. The International Double Taxation – Avoiding Methods

    Directory of Open Access Journals (Sweden)

    Nicoleta Barbuta-Misu

    2009-06-01

    Full Text Available The paper presents the main causes that determine double taxation, its forms, i.e. the economicdouble taxation and the international legal double taxation, the need for eliminating the double taxation andavoiding methods. In the presentation of the avoidance methods have been used practical examples forcomparison of the tax advantages for income beneficiary between: the total exemption method andprogressive exemption method, on the one hand, and total crediting method and ordinary crediting method,on the other hand, but the comparing of tax reduction between methods of exemption and crediting.

  11. CORPORATE SOCIAL RESPONSIBILITY VERSUS TAX AVOIDANCE PRACTICES

    Directory of Open Access Journals (Sweden)

    Stoian Ciprian-Dumitru

    2012-07-01

    Full Text Available Worldwide crisis has made multinational companies that are engaged in corporate social responsibility actions to manage their businesses through the lens of various tax avoidance practices. The content of this paper is important due to the fact that tries to identify the impact in case of companies active in corporate social responsibility actions versus their tax structures orientation. Corporate social responsibility literature did not paid enough attention on the impact of the tax avoidance practices of companies. Tax, as a concept, brings in itself an important corporate financial impact with subsequent effects for the life of multiple citizens in countries where private entities are operating. Even though companies are usually expressing their ethical and responsible conduct in respect of the social environment, there are many cases when the business practices were not aligned with the declared corporate behavior. This paper seeks firstly to examine whether companies engaged in tax avoidance practices (ex. offshore tax havens consider that continue to act socially responsible. Secondly, the paper examines the influence on attending the stakeholders’ goals for those companies practicing tax avoidance and its implications on corporate social responsibility actions. Moreover, the paper focuses also on the aspects described before from the perspective of the corporate entities operating in Romania. This paper’s intention is to use and to develop the results of previous research carried out by Lutz Preus (University of London and, subsequently, by Senators Levin, Coleman and Obama in their “Stop Tax Haven Abuse Bill”. The implications and the objectives of this material are to highlight, to identify and to spot clearly the relations and the influences of the tax haven practices of corporations versus their undertaken social responsibility actions. Moreover, this paper brings a fresh perspective of this topic from the

  12. Deterministic LOCA avoidance by gravity effect

    Energy Technology Data Exchange (ETDEWEB)

    Harms, A A [McMaster Univ., Hamilton, ON (Canada)

    1996-12-31

    A novel concept for an intrinsically safe reactor, called the Pellet Suspension Reactor (PSR), has vertical fuel tubes in which fuel, in the form of micro-pellets, is suspended by an upwardly flowing liquid or (preferably) gas coolant. Then, in the event of a primary pump failure, the fuel pellets fall down into a divergent conical annulus which is surrounded by ordinary water; the divergent geometry of this catchment ensures nuclear subcriticality, and the annulus will ensure decay-heat removal by packed-bed conduction. Thus melting of the fuel is avoided, and no emergency shut-down or emergency cooling provisions are required. 7 refs., 1 tab., 1 fig.

  13. Collision Avoidance for Airport Traffic Concept Evaluation

    Science.gov (United States)

    Jones, Denise R.; Prinzel, Lawrence J., III; Otero, Sharon D.; Barker, Glover D.

    2009-01-01

    An initial Collision Avoidance for Airport Traffic (CAAT) concept for the Terminal Maneuvering Area (TMA) was evaluated in a simulation study at the National Aeronautics and Space Administration (NASA) Langley Research Center. CAAT is being designed to enhance surface situation awareness and provide cockpit alerts of potential conflicts during runway, taxi, and low altitude air-to-air operations. The purpose of the study was to evaluate the initial concept for an aircraft-based method of conflict detection and resolution (CD&R) in the TMA focusing on conflict detection algorithms and alerting display concepts. This paper gives an overview of the CD&R concept, simulation study, and test results.

  14. Guide to the collision avoidance rules

    CERN Document Server

    Cockcroft, A N

    2004-01-01

    A Guide to the Collision Avoidance Rules is the essential reference to the safe operation of all vessels at sea. Published continuously since 1965, this respected and expert guide is the classic text for all who need to, practically and legally, understand and comply with the Rules. This sixth edition incorporates all of the amendments to the International Regulations for Preventing Collisions at Sea which came into force in November 2003.The books sets out all of the Rules with clear explanation of their meaning, and gives detailed examples of how the rules have been used in practice

  15. Avoiding plagiarism: guidance for nursing students.

    Science.gov (United States)

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  16. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  17. Inflammatory bowel disease: the role of inflammatory cytokine gene polymorphisms

    Directory of Open Access Journals (Sweden)

    Joanna Balding

    2004-01-01

    Full Text Available THE mechanisms responsible for development of inflammatory bowel disease (IBD have not been fully elucidated, although the main cause of disease pathology is attributed to up-regulated inflammatory processes. The aim of this study was to investigate frequencies of polymorphisms in genes encoding pro-inflammatory and anti-inflammatory markers in IBD patients and controls. We determined genotypes of patients with IBD (n=172 and healthy controls (n=389 for polymorphisms in genes encoding various cytokines (interleukin (IL-1β, IL-6, tumour necrosis factor (TNF, IL-10, IL-1 receptor antagonist. Association of these genotypes to disease incidence and pathophysiology was investigated. No strong association was found with occurrence of IBD. Variation was observed between the ulcerative colitis study group and the control population for the TNF-α-308 polymorphism (p=0.0135. There was also variation in the frequency of IL-6-174 and TNF-α-308 genotypes in the ulcerative colitis group compared with the Crohn's disease group (p=0.01. We concluded that polymorphisms in inflammatory genes are associated with variations in IBD phenotype and disease susceptibility. Whether the polymorphisms are directly involved in regulating cytokine production, and consequently pathophysiology of IBD, or serve merely as markers in linkage disequilibrium with susceptibility genes remains unclear.

  18. Determination of key parameters of vector multifractal vector fields

    Science.gov (United States)

    Schertzer, D. J. M.; Tchiguirinskaia, I.

    2017-12-01

    For too long time, multifractal analyses and simulations have been restricted to scalar-valued fields (Schertzer and Tchiguirinskaia, 2017a,b). For instance, the wind velocity multifractality has been mostly analysed in terms of scalar structure functions and with the scalar energy flux. This restriction has had the unfortunate consequences that multifractals were applicable to their full extent in geophysics, whereas it has inspired them. Indeed a key question in geophysics is the complexity of the interactions between various fields or they components. Nevertheless, sophisticated methods have been developed to determine the key parameters of scalar valued fields. In this communication, we first present the vector extensions of the universal multifractal analysis techniques to multifractals whose generator belong to a Levy-Clifford algebra (Schertzer and Tchiguirinskaia, 2015). We point out further extensions noting the increased complexity. For instance, the (scalar) index of multifractality becomes a matrice. Schertzer, D. and Tchiguirinskaia, I. (2015) `Multifractal vector fields and stochastic Clifford algebra', Chaos: An Interdisciplinary Journal of Nonlinear Science, 25(12), p. 123127. doi: 10.1063/1.4937364. Schertzer, D. and Tchiguirinskaia, I. (2017) `An Introduction to Multifractals and Scale Symmetry Groups', in Ghanbarian, B. and Hunt, A. (eds) Fractals: Concepts and Applications in Geosciences. CRC Press, p. (in press). Schertzer, D. and Tchiguirinskaia, I. (2017b) `Pandora Box of Multifractals: Barely Open ?', in Tsonis, A. A. (ed.) 30 Years of Nonlinear Dynamics in Geophysics. Berlin: Springer, p. (in press).

  19. Vigilance-avoidance and disengagement are differentially associated with fear and avoidant behaviors in social anxiety.

    Science.gov (United States)

    Evans, Travis C; Walukevich, Katherine A; Britton, Jennifer C

    2016-07-15

    Individuals with Social Anxiety Disorder (SAD) often exhibit preferential attention for social threat, demonstrating abnormal orientation to threat (i.e., vigilance-avoidance) and/or difficulty disengaging from threat. However, no research has compared the relationship between attention indices (i.e., vigilance-avoidance, difficulty disengaging from threat) and characteristic features of the disorder such as fear during social situations (social fear) and avoidant behaviors (social avoidance). To address this issue, seventy adults (19.29±1.47 years, 33 females) were separated into low (n=37) or high (n=33) socially anxious groups using clinical cutoff scores on the Social Interaction Anxiety Scale (SIAS). Participants in both groups completed a dot-probe task with congruent, incongruent, and neutral trials to obtain measures of vigilance-avoidance and difficulty disengaging. Using linear regression, we examined the associations each attention index shared with self-reported social fear and social avoidance. Exclusively in the high anxious group, greater vigilance towards threat was associated with higher self-reported social fear, but not with social avoidance. However, difficulty disengaging was not associated with either social measure. In the low anxiety group, no relationships between attention indices and either social measure emerged. Future research with clinical samples is necessary to replicate and extend these findings. The small sample size studied may have limited our ability to detect other smaller effects. Indices of attention bias may contribute differently to the etiology and maintenance of SAD, which offers important implications for novel treatments that target attention. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Diagnostics of vector magnetic fields

    Science.gov (United States)

    Stenflo, J. O.

    1985-01-01

    It is shown that the vector magnetic fields derived from observations with a filter magnetograph will be severely distorted if the spatially unresolved magnetic structure is not properly accounted for. Thus the apparent vector field will appear much more horizontal than it really is, but this distortion is strongly dependent on the area factor and the temperature line weakenings. As the available fluxtube models are not sufficiently well determined, it is not possible to correct the filter magnetograph observations for these effects in a reliable way, although a crude correction is of course much better than no correction at all. The solution to this diagnostic problem is to observe simultaneously in suitable combinations of spectral lines, and/or use Stokes line profiles recorded with very high spectral resolution. The diagnostic power of using a Fourier transform spectrometer for polarimetry is shown and some results from I and V spectra are illustrated. The line asymmetries caused by mass motions inside the fluxtubes adds an extra complication to the diagnostic problem, in particular as there are indications that the motions are nonstationary in nature. The temperature structure appears to be a function of fluxtube diameter, as a clear difference between plage and network fluxtubes was revealed. The divergence of the magnetic field with height plays an essential role in the explanation of the Stokes V asymmetries (in combination with the mass motions). A self consistent treatment of the subarcsec field geometry may be required to allow an accurate derivation of the spatially averaged vector magnetic field from spectrally resolved data.

  1. Bridging the Vector Calculus Gap

    Science.gov (United States)

    Dray, Tevian; Manogue, Corinne

    2003-05-01

    As with Britain and America, mathematicians and physicists are separated from each other by a common language. In a nutshell, mathematics is about functions, but physics is about things. For the last several years, we have led an NSF-supported effort to "bridge the vector calculus gap" between mathematics and physics. The unifying theme we have discovered is to emphasize geometric reasoning, not (just) algebraic computation. In this talk, we will illustrate the language differences between mathematicians and physicists, and how we are trying reconcile them in the classroom. For further information about the project go to: http://www.physics.orst.edu/bridge

  2. Properties of Vector Preisach Models

    Science.gov (United States)

    Kahler, Gary R.; Patel, Umesh D.; Torre, Edward Della

    2004-01-01

    This paper discusses rotational anisotropy and rotational accommodation of magnetic particle tape. These effects have a performance impact during the reading and writing of the recording process. We introduce the reduced vector model as the basis for the computations. Rotational magnetization models must accurately compute the anisotropic characteristics of ellipsoidally magnetizable media. An ellipticity factor is derived for these media that computes the two-dimensional magnetization trajectory for all applied fields. An orientation correction must be applied to the computed rotational magnetization. For isotropic materials, an orientation correction has been developed and presented. For anisotropic materials, an orientation correction is introduced.

  3. Assessment of hypoxia and TNF-alpha response by a vector with HRE and NF-kappaB response elements.

    Science.gov (United States)

    Chen, Zhilin; Eadie, Ashley L; Hall, Sean R; Ballantyne, Laurel; Ademidun, David; Tse, M Yat; Pang, Stephen C; Melo, Luis G; Ward, Christopher A; Brunt, Keith R

    2017-01-01

    Hypoxia and inflammatory cytokine activation (H&I) are common processes in many acute and chronic diseases. Thus, a single vector that responds to both hypoxia and inflammatory cytokines, such as TNF-alpha, is useful for assesing the severity of such diseases. Adaptation to hypoxia is regulated primarily by hypoxia inducible transcription factor (HIF alpha) nuclear proteins that engage genes containing a hypoxia response element (HRE). Inflammation activates a multitude of cytokines, including TNF-alpha, that invariably modulate activation of the nuclear factor kappa B (NF-kB) transcription factor. We constructed a vector that encompassed both a hypoxia response element (HRE), and a NF-kappaB responsive element. We show that this vector was functionally responsive to both hypoxia and TNF-alpha, in vitro and in vivo . Thus, this vector might be suitable for the detection and assessment of hypoxia or TNF-alpha.

  4. Avoiding humiliations in the clinical encounter.

    Science.gov (United States)

    Malterud, Kirsti; Hollnagel, Hanne

    2007-06-01

    To explore potentials for avoiding humiliations in clinical encounters, especially those that are unintended and unrecognized by the doctor. Furthermore, to examine theoretical foundations of degrading behaviour and identify some concepts that can be used to understand such behaviour in the cultural context of medicine. Finally, these concepts are used to build a model for the clinician in order to prevent humiliation of the patient. Empirical studies document experiences of humiliation among patients when they see their doctor. Philosophical and sociological analysis can be used to explain the dynamics of unintended degrading behaviour between human beings. Skjervheim, Vetlesen, and Bauman have identified the role of objectivism, distantiation, and indifference in the dynamics of evil acts, pointing to the rules of the cultural system, rather than accusing the individual of bad behaviour. Examining the professional role of the doctor, parallel traits embedded in the medical culture are demonstrated. According to Vetlesen, emotional awareness is necessary for moral perception, which again is necessary for moral performance. A better balance between emotions and rationality is needed to avoid humiliations in the clinical encounter. The Awareness Model is presented as a strategy for clinical practice and education, emphasizing the role of the doctor's own emotions. Potentials and pitfalls are discussed.

  5. Shape optimization of self-avoiding curves

    Science.gov (United States)

    Walker, Shawn W.

    2016-04-01

    This paper presents a softened notion of proximity (or self-avoidance) for curves. We then derive a sensitivity result, based on shape differential calculus, for the proximity. This is combined with a gradient-based optimization approach to compute three-dimensional, parameterized curves that minimize the sum of an elastic (bending) energy and a proximity energy that maintains self-avoidance by a penalization technique. Minimizers are computed by a sequential-quadratic-programming (SQP) method where the bending energy and proximity energy are approximated by a finite element method. We then apply this method to two problems. First, we simulate adsorbed polymer strands that are constrained to be bound to a surface and be (locally) inextensible. This is a basic model of semi-flexible polymers adsorbed onto a surface (a current topic in material science). Several examples of minimizing curve shapes on a variety of surfaces are shown. An advantage of the method is that it can be much faster than using molecular dynamics for simulating polymer strands on surfaces. Second, we apply our proximity penalization to the computation of ideal knots. We present a heuristic scheme, utilizing the SQP method above, for minimizing rope-length and apply it in the case of the trefoil knot. Applications of this method could be for generating good initial guesses to a more accurate (but expensive) knot-tightening algorithm.

  6. Avoidable cost of alcohol abuse in Canada.

    Science.gov (United States)

    Rehm, Jürgen; Patra, Jayadeep; Gnam, William H; Sarnocinska-Hart, Anna; Popova, Svetlana

    2011-01-01

    To estimate avoidable burden and avoidable costs of alcohol abuse in Canada for the year 2002. A policy effectiveness approach was used. The impact of six effective and cost-effective alcohol policy interventions aimed to reduce alcohol consumption was modeled. In addition, the effect of privatized alcohol sales that would increase alcohol consumption and alcohol-attributable costs was also modeled. The effects of these interventions were compared with the baseline (aggregate) costs obtained from the second Canadian Study of Social Costs Attributable to Substance Abuse. It was estimated that by implementing six cost-effective policies from about 900 million to two billion Canadian dollars per year could be saved in Canada. The greatest savings due to the implementation of these interventions would be achieved in the lowering of productivity losses, followed by health care, and criminality. Substantial increases in burden and cost would occur if Canadian provinces were to privatize alcohol sales. The implementation of proven effective population-based interventions would reduce alcohol-attributable burden and its costs in Canada to a considerable degree. Copyright © 2010 S. Karger AG, Basel.

  7. Avoided operating costs in thermal generating systems

    International Nuclear Information System (INIS)

    Chowdhury, N.; Billinton, R.; Gupta, R.

    1995-01-01

    A simple and straightforward technique was developed to assess avoided system operating costs associated with non-utility generation (NUG). The technique was based on optimum loading configurations of the committed units both before and after the inclusion of NUG energy. The salient features of the technique were presented in this paper. Assessment of avoided operating cost with deterministic and probabilistic criteria were explained. A time differentiated price system was adopted in the algorithms to reflect the different value placed on purchased price by a utility at different times of the day. The algorithms show the utility effects of dispatchable and non-dispatchable NUG energies. The IEEE Reliability Test System (RTS) was utilized for numerical analysis. Results were illustrated. It was found that sensitivity studies similar to those performed on the IEEE-RTS could be utilized to determine the amount of energy and the time period during which utilities and NUGs can maximize their economic benefits. 7 refs., 5 figs., 1 tab

  8. Estimation of pure autoregressive vector models for revenue series ...

    African Journals Online (AJOL)

    This paper aims at applying multivariate approach to Box and Jenkins univariate time series modeling to three vector series. General Autoregressive Vector Models with time varying coefficients are estimated. The first vector is a response vector, while others are predictor vectors. By matrix expansion each vector, whether ...

  9. Vector-Tensor and Vector-Vector Decay Amplitude Analysis of B0→φK*0

    International Nuclear Information System (INIS)

    Aubert, B.; Bona, M.; Boutigny, D.; Couderc, F.; Karyotakis, Y.; Lees, J. P.; Poireau, V.; Tisserand, V.; Zghiche, A.; Grauges, E.; Palano, A.; Chen, J. C.; Qi, N. D.; Rong, G.; Wang, P.; Zhu, Y. S.; Eigen, G.; Ofte, I.; Stugu, B.; Abrams, G. S.

    2007-01-01

    We perform an amplitude analysis of the decays B 0 →φK 2 * (1430) 0 , φK * (892) 0 , and φ(Kπ) S-wave 0 with a sample of about 384x10 6 BB pairs recorded with the BABAR detector. The fractions of longitudinal polarization f L of the vector-tensor and vector-vector decay modes are measured to be 0.853 -0.069 +0.061 ±0.036 and 0.506±0.040±0.015, respectively. Overall, twelve parameters are measured for the vector-vector decay and seven parameters for the vector-tensor decay, including the branching fractions and parameters sensitive to CP violation

  10. Can antibodies against flies alter malaria transmission in birds by changing vector behavior?

    Science.gov (United States)

    Ghosh, Suma; Waite, Jessica L; Clayton, Dale H; Adler, Frederick R

    2014-10-07

    Transmission of insect-borne diseases is shaped by the interactions among parasites, vectors, and hosts. Any factor that alters movement of infected vectors from infected to uninfeced hosts will in turn alter pathogen spread. In this paper, we study one such pathogen-vector-host system, avian malaria in pigeons transmitted by fly ectoparasites, where both two-way and three-way interactions play a key role in shaping disease spread. Bird immune defenses against flies can decrease malaria prevalence by reducing fly residence time on infected birds or increase disease prevalence by enhancing fly movement and thus infection transmission. We develop a mathematical model that illustrates how these changes in vector behavior influence pathogen transmission and show that malaria prevalence is maximized at an intermediate level of defense avoidance by the flies. Understanding how host immune defenses indirectly alter disease transmission by influencing vector behavior has implications for reducing the transmission of human malaria and other vectored pathogens. Published by Elsevier Ltd.

  11. Herpes simplex virus type 1 (HSV-1)-derived recombinant vectors for gene transfer and gene therapy.

    Science.gov (United States)

    Marconi, Peggy; Fraefel, Cornel; Epstein, Alberto L

    2015-01-01

    Herpes simplex virus type 1 (HSV-1 ) is a human pathogen whose lifestyle is based on a long-term dual interaction with the infected host, being able to establish both lytic and latent infections. The virus genome is a 153-kilobase pair (kbp) double-stranded DNA molecule encoding more than 80 genes. The interest of HSV-1 as gene transfer vector stems from its ability to infect many different cell types, both quiescent and proliferating cells, the very high packaging capacity of the virus capsid, the outstanding neurotropic adaptations that this virus has evolved, and the fact that it never integrates into the cellular chromosomes, thus avoiding the risk of insertional mutagenesis. Two types of vectors can be derived from HSV-1, recombinant vectors and amplicon vectors, and different methodologies have been developed to prepare large stocks of each type of vector. This chapter summarizes the approach most commonly used to prepare recombinant HSV-1 vectors through homologous recombination, either in eukaryotic cells or in bacteria.

  12. Chemoselective ligation and antigen vectorization.

    Science.gov (United States)

    Gras-Masse, H

    2001-01-01

    The interest in cocktail-lipopeptide vaccines has now been confirmed by phase I clinical trials: highly diversified B-, T-helper or cytotoxic T-cell epitopes can be combined with a lipophilic vector for the induction of B- and T-cell responses of predetermined specificity. With the goal of producing an improved vaccine that should ideally induce a multispecific response in non-selected populations, increasing the diversity of the immunizing mixture represents one of the most obvious strategies.The selective delivery of antigens to professional antigen-presenting cells represents another promising approach for the improvement of vaccine efficacy. In this context, the mannose-receptor represents an attractive entry point for the targeting to dendritic cells of antigens linked to clustered glycosides or glycomimetics. In all cases, highly complex but fully characterized molecules must be produced. To develop a modular and flexible strategy which could be generally applicable to a large set of peptide antigens, we elected to explore the potentialities of chemoselective ligation methods. The hydrazone bond was found particularly reliable and fully compatible with sulphide ligation. Hydrazone/thioether orthogonal ligation systems could be developed to account for the nature of the antigens and the solubility of the vector systems. Copyright 2001 The International Association for Biologicals.

  13. Colostomy closure: how to avoid complications

    Science.gov (United States)

    Levitt, Marc A.; Lawal, Taiwo A.; Peña, Alberto

    2010-01-01

    Purpose Colostomy is an operation frequently performed in pediatric surgery. Despite its benefits, it can produce significant morbidity. In a previous publication we presented our experience with the errors and complications that occurred during cases of colostomy creation. We now have focused in the morbidity related to the colostomy closure. The technical details that might have contributed to the minimal morbidity we experienced are described. Methods The medical records of 649 patients who underwent colostomy closure over a 28-year period were retrospectively reviewed looking for complications following these procedures. Our perioperative protocol for colostomy closure consisted in: clear fluids by mouth and repeated proximal stoma irrigations 24 h prior to the operation. Administration of IV antibiotics during anesthesia induction and continued for 48 h. Meticulous surgical technique that included: packing of the proximal stoma, plastic drape to immobilize the surgical field, careful hemostasis, emphasis in avoiding contamination, cleaning the edge of the stomas to allow a good 2-layer, end-to-end anastomosis with separated long-term absorbable sutures, generous irrigation of the peritoneal cavity and subsequent layers with saline solution, closure by layers to avoid dead space, and avoidance of hematomas. No drains and no nasogastric tubes were used. Oral fluids were started the day after surgery and patients were discharged 48–72 h after the operation. Results The original diagnoses of the patients were: anorectal malformation (583), Hirschsprung’s disease (53), and others (13). 10 patients (1.5%) had complications: 6 had intestinal obstruction (5 due to small bowel adhesions, 1 had temporary delay of the function of the anastomosis due to a severe size discrepancy between proximal and distal stoma with a distal microcolon) and 4 incisional hernias. There were no anastomotic dehiscences or wound infection. There was no bleeding, no anastomotic

  14. Theories of schizophrenia: a genetic-inflammatory-vascular synthesis

    Directory of Open Access Journals (Sweden)

    Gottesman Irving I

    2005-02-01

    and immune/inflammatory systems. Summary A vascular-inflammatory theory of schizophrenia brings together environmental and genetic factors in a way that can explain the diversity of symptoms and outcomes observed. If these ideas are confirmed, they would lead in new directions for treatments or preventions by avoiding inducers of inflammation or by way of inflammatory modulating agents, thus preventing exaggerated inflammation and consequent triggering of a psychotic episode in genetically predisposed persons.

  15. Vectorization of phase space Monte Carlo code in FACOM vector processor VP-200

    International Nuclear Information System (INIS)

    Miura, Kenichi

    1986-01-01

    This paper describes the vectorization techniques for Monte Carlo codes in Fujitsu's Vector Processor System. The phase space Monte Carlo code FOWL is selected as a benchmark, and scalar and vector performances are compared. The vectorized kernel Monte Carlo routine which contains heavily nested IF tests runs up to 7.9 times faster in vector mode than in scalar mode. The overall performance improvement of the vectorized FOWL code over the original scalar code reaches 3.3. The results of this study strongly indicate that supercomputer can be a powerful tool for Monte Carlo simulations in high energy physics. (Auth.)

  16. Avoidant/Restrictive Food Intake Disorder (ARFID).

    Science.gov (United States)

    Zimmerman, Jacqueline; Fisher, Martin

    2017-04-01

    Avoidant/restrictive food intake disorder (ARFID) is an entirely new diagnosis in the DSM-5. ARFID replaces "feeding disorder of infancy or early childhood," which was a diagnosis in the DSM-IV restricted to children 6 years of age or younger; ARFID has no such age limitations and it is distinct from anorexia nervosa and bulimia nervosa in that there is no body image disturbance. ARFID involves a complex and heterogenous etiology, which is reviewed herein. What is known to date regarding the characteristics and medical and psychiatric comorbidities of this patient population are described and compared to other eating disorders. Evaluation and management strategies are also discussed. No data yet exist regarding ARFID׳s prognosis and prevention; however, recommendations to guide parents in establishing appropriate infant and child feeding practices are provided. Copyright © 2017 Mosby, Inc. All rights reserved.

  17. Avoiding Deontic Explosion by Contextually Restricting Aggregation

    Science.gov (United States)

    Meheus, Joke; Beirlaen, Mathieu; van de Putte, Frederik

    In this paper, we present an adaptive logic for deontic conflicts, called P2.1 r , that is based on Goble's logic SDL a P e - a bimodal extension of Goble's logic P that invalidates aggregation for all prima facie obligations. The logic P2.1 r has several advantages with respect to SDL a P e. For consistent sets of obligations it yields the same results as Standard Deontic Logic and for inconsistent sets of obligations, it validates aggregation "as much as possible". It thus leads to a richer consequence set than SDL a P e. The logic P2.1 r avoids Goble's criticisms against other non-adjunctive systems of deontic logic. Moreover, it can handle all the 'toy examples' from the literature as well as more complex ones.

  18. Avoidable deaths in Greenland 1968-1985

    DEFF Research Database (Denmark)

    Bjerregaard, Peter; Juel, K

    1990-01-01

    and several showed an increasing time trend. The regional patterns were particularly clear for infectious diseases and accidents, which showed low mortality rates in the capital and other towns and high mortality rates in settlements and in the remote East Greenland, while mortality rates from suicides...... and political will of the society. A list of avoidable deaths is proposed for Greenland which includes, inter alia, meningitis, lung cancer, acute respiratory infections, suicides, boat accidents and alcohol related diseases and accidents. All were considerably more common in Greenland than in Denmark...... and alcohol related diseases were high in the capital and East Greenland and low in West Greenlandic settlements. It is concluded that further studies on preventable diseases and causes of death, in particular certain infectious diseases, accidents and suicides, are needed....

  19. Discovering and avoiding self-contradiction:

    DEFF Research Database (Denmark)

    Olivares Bøgeskov, Benjamin Miguel

    aspects –first developing critical self-refection and secondly developing skills to conduct an ethical dialogue. The first aspect is addressed by finding out what the students think, do they contradict themselves and how to avoid self-contradictions. This is done by using a questionnaire with 13 ethical...... the theory and see the consequences of such theories in concrete cases, but would not use any of these theories to justify their own ethical decisions in other contexts. In other words, courses were failing to provide the students with theoretical tools that they could apply outside the classroom. Therefore......, this method focuses not so much on teaching what other people think, but rather starts by finding out what the students think, and to which degree they contradict themselves. In addition the method focuses on how students argue for their positions when entering an ethical dialogue. The method focuses on two...

  20. Mars rover local navigation and hazard avoidance

    Science.gov (United States)

    Wilcox, B. H.; Gennery, D. B.; Mishkin, A. H.

    1989-01-01

    A Mars rover sample return mission has been proposed for the late 1990's. Due to the long speed-of-light delays between earth and Mars, some autonomy on the rover is highly desirable. JPL has been conducting research in two possible modes of rover operation, Computer-Aided Remote Driving and Semiautonomous Navigation. A recently-completed research program used a half-scale testbed vehicle to explore several of the concepts in semiautonomous navigation. A new, full-scale vehicle with all computational and power resources on-board will be used in the coming year to demonstrate relatively fast semiautonomous navigation. The computational and power requirements for Mars rover local navigation and hazard avoidance are discussed.

  1. Integrated disruption avoidance and mitigation in KSTAR

    International Nuclear Information System (INIS)

    Kim, Jayhyun; Woo, M.H.; Han, H.; In, Y.; Bak, J.G.; Eidietis, N.W.

    2014-01-01

    The final target of Korea Superconducting Tokamak Advanced Research (KSTAR) aims advanced tokamak operation at plasma current 2 MA and toroidal field 3.5 T. In order to safely achieve the target, disruption counter-measures are unavoidable when considering the disruption risks, inevitably accompanied with high performance discharges, such as electro-magnetic load on conducting structures, collisional damage by run-away electrons, and thermal load on plasma facing components (PFCs). In this reason, the establishment of integrated disruption mitigation system (DMS) has been started for routine mega-ampere class operations of KSTAR since 2013 campaign. The DMS mainly consists of the disruption prediction and its avoidance/mitigation in company with logical/technical integration of them. We present the details of KSTAR DMS and the related experimental results in this article. (author)

  2. Avoiding sexual harassment liability in veterinary practices.

    Science.gov (United States)

    Lacroix, C A; Wilson, J F

    1996-05-15

    Harassment based on gender violates the rule of workplace equality established by Title VII of the Civil Rights Act and enforced by the EEOC. In 1986, the US Supreme Court, in Meritor Savings Bank v Vinson, established the criteria that must be met for a claim of hostile environment sexual harassment to be considered valid. Plaintiffs must show that they were subjected to conduct based on their gender, that it was unwelcome, and that it was severe and pervasive enough to alter their condition of employment, resulting in an abusive working environment. There have been few sexual harassment cases involving veterinary professionals, and it is our goal to help keep the number of filed actions to a minimum. The most effective way to avoid hostile environment sexual harassment claims is to confront the issue openly and to adopt a sexual harassment policy for the practice. When it comes to sexual harassment, an ounce of prevention is unquestionably worth a pound of cure.

  3. Life stressors, emotional avoidance and breast cancer.

    Science.gov (United States)

    Cardenal, Violeta; Ortiz-Tallo, Margarita; Martín Frías, Isabel; Martínez Lozano, Joaquina

    2008-11-01

    Two groups of women were assessed in psychological aspects considered by some authors of interest for personal well-being. The sample consisted of 118 women, 58 diagnosed with breast cancer and 60 healthy women, of similar ages and personal circumstances. The purpose of the study was: (a) to explore the existence of stressful life events in the women's history and their degree of subjective distress and (b) to determine whether or not there is an emotional avoidance style in the group of women with breast cancer. The following assessment instruments were employed: the "Cuestionario de Formas de Afrontamiento" (CEA), the Five-Factor Inventory NEO-PI-R, and the State-Trait Anger Inventory (STAXI). The results revealed more stressful vital events in the last two years in the group of women with breast cancer and significant differences in the degree of current distress. They also obtained higher scores in current anger, resignation, and neuroticism.

  4. Tax Anti-avoidance Through Transfer Pricing

    DEFF Research Database (Denmark)

    Rossing, Christian Plesner; Riise Johansen, Thomas; Pearson, Thomas C.

    2016-01-01

    -driven discipline to be dealt with by accounting and tax experts. Instead, MNEs face the task of establishing a complex fit with their environment beyond the typical stakeholders with transfer pricing, i.e. tax authorities. These include government officials, tax activists, and consumers who voice......This paper examines the case of Starbucks’ UK branch, which became subject to massive public criticism over alleged tax avoidance. Despite Starbucks arguing that its transfer pricing practices were in full compliance with regulatory requirements, public pressure for higher corporate tax payments...... led Starbucks to increase its UK tax payment on transfer pricing income beyond regulatory requirements. This case study suggests that MNE tax behavior on international transfer pricing is not strictly a matter of compliance with formal tax regulation. We demonstrate the way an MNE attempts to re...

  5. On the Vectorization of FIR Filterbanks

    Directory of Open Access Journals (Sweden)

    Barbedo Jayme Garcia Arnal

    2007-01-01

    Full Text Available This paper presents a vectorization technique to implement FIR filterbanks. The word vectorization, in the context of this work, refers to a strategy in which all iterative operations are replaced by equivalent vector and matrix operations. This approach allows that the increasing parallelism of the most recent computer processors and systems be properly explored. The vectorization techniques are applied to two kinds of FIR filterbanks (conventional and recursi ve, and are presented in such a way that they can be easily extended to any kind of FIR filterbanks. The vectorization approach is compared to other kinds of implementation that do not explore the parallelism, and also to a previous FIR filter vectorization approach. The tests were performed in Matlab and , in order to explore different aspects of the proposed technique.

  6. On the Vectorization of FIR Filterbanks

    Directory of Open Access Journals (Sweden)

    Amauri Lopes

    2007-01-01

    Full Text Available This paper presents a vectorization technique to implement FIR filterbanks. The word vectorization, in the context of this work, refers to a strategy in which all iterative operations are replaced by equivalent vector and matrix operations. This approach allows that the increasing parallelism of the most recent computer processors and systems be properly explored. The vectorization techniques are applied to two kinds of FIR filterbanks (conventional and recursi ve, and are presented in such a way that they can be easily extended to any kind of FIR filterbanks. The vectorization approach is compared to other kinds of implementation that do not explore the parallelism, and also to a previous FIR filter vectorization approach. The tests were performed in Matlab and C, in order to explore different aspects of the proposed technique.

  7. Vector mesons on the light front

    International Nuclear Information System (INIS)

    Naito, K.; Maedan, S.; Itakura, K.

    2004-01-01

    We apply the light-front quantization to the Nambu-Jona-Lasinio model with the vector interaction, and compute vector meson's mass and light-cone wavefunction in the large N limit. Following the same procedure as in the previous analyses for scalar and pseudo-scalar mesons, we derive the bound-state equations of a qq-bar system in the vector channel. We include the lowest order effects of the vector interaction. The resulting transverse and longitudinal components of the bound-state equation look different from each other. But eventually after imposing an appropriate cutoff, one finds these two are identical, giving the same mass and the same (spin-independent) light-cone wavefunction. Mass of the vector meson decreases as one increases the strength of the vector interaction

  8. Vector assembly of colloids on monolayer substrates

    Science.gov (United States)

    Jiang, Lingxiang; Yang, Shenyu; Tsang, Boyce; Tu, Mei; Granick, Steve

    2017-06-01

    The key to spontaneous and directed assembly is to encode the desired assembly information to building blocks in a programmable and efficient way. In computer graphics, raster graphics encodes images on a single-pixel level, conferring fine details at the expense of large file sizes, whereas vector graphics encrypts shape information into vectors that allow small file sizes and operational transformations. Here, we adapt this raster/vector concept to a 2D colloidal system and realize `vector assembly' by manipulating particles on a colloidal monolayer substrate with optical tweezers. In contrast to raster assembly that assigns optical tweezers to each particle, vector assembly requires a minimal number of optical tweezers that allow operations like chain elongation and shortening. This vector approach enables simple uniform particles to form a vast collection of colloidal arenes and colloidenes, the spontaneous dissociation of which is achieved with precision and stage-by-stage complexity by simply removing the optical tweezers.

  9. Experiential Avoidance and Technological Addictions in Adolescents.

    Science.gov (United States)

    García-Oliva, Carlos; Piqueras, José A

    2016-06-01

    Background and aims This study focuses on the use of popular information and communication technologies (ICTs) by adolescents: the Internet, mobile phones, and video games. The relationship of ICT use and experiential avoidance (EA), a construct that has emerged as underlying and transdiagnostic to a wide variety of psychological problems, including behavioral addictions, is examined. EA refers to a self-regulatory strategy involving efforts to control or escape from negative stimuli such as thoughts, feelings, or sensations that generate strong distress. This strategy, which may be adaptive in the short term, is problematic if it becomes an inflexible pattern. Thus, the aim of this study was to explore whether EA patterns were associated with addictive or problematic use of ICT in adolescents. Methods A total of 317 students of the Spanish southeast between 12 and 18 years old were recruited to complete a questionnaire that included questions about general use of each ICTs, an experiential avoidance questionnaire, a brief inventory of the Big Five personality traits, and specific questionnaires on problematic use of the Internet, mobile phones, and video games. Results Correlation analysis and linear regression showed that EA largely explained results regarding the addictive use of the Internet, mobile phones, and video games, but not in the same way. As regards gender, boys showed a more problematic use of video games than girls. Concerning personality factors, conscientiousness was related to all addictive behaviors. Discussion and conclusions We conclude that EA is an important construct that should be considered in future models that attempt to explain addictive behaviors.

  10. Experiential Avoidance and Technological Addictions in Adolescents

    Science.gov (United States)

    García-Oliva, Carlos; Piqueras, José A.

    2016-01-01

    Background and aims This study focuses on the use of popular information and communication technologies (ICTs) by adolescents: the Internet, mobile phones, and video games. The relationship of ICT use and experiential avoidance (EA), a construct that has emerged as underlying and transdiagnostic to a wide variety of psychological problems, including behavioral addictions, is examined. EA refers to a self-regulatory strategy involving efforts to control or escape from negative stimuli such as thoughts, feelings, or sensations that generate strong distress. This strategy, which may be adaptive in the short term, is problematic if it becomes an inflexible pattern. Thus, the aim of this study was to explore whether EA patterns were associated with addictive or problematic use of ICT in adolescents. Methods A total of 317 students of the Spanish southeast between 12 and 18 years old were recruited to complete a questionnaire that included questions about general use of each ICTs, an experiential avoidance questionnaire, a brief inventory of the Big Five personality traits, and specific questionnaires on problematic use of the Internet, mobile phones, and video games. Results Correlation analysis and linear regression showed that EA largely explained results regarding the addictive use of the Internet, mobile phones, and video games, but not in the same way. As regards gender, boys showed a more problematic use of video games than girls. Concerning personality factors, conscientiousness was related to all addictive behaviors. Discussion and conclusions We conclude that EA is an important construct that should be considered in future models that attempt to explain addictive behaviors. PMID:27363463

  11. Axial vector mass spectrum and mixing angles

    International Nuclear Information System (INIS)

    Caffarelli, R.V.; Kang, K.

    1976-01-01

    Spectral sum rules of the axial-vector current and axial-vector current-pseudoscalar field are used to study the axial-vector mass spectrum and mixing angles, as well as the decay constants and mixing angles of the pseudoscalar mesons. In general, the result is quite persuasive for the existence of the Jsup(PC) = 1 ++ multiplet in which one has a canonical D-E mixing. (Auth.)

  12. Some remarks on a generalized vector product

    OpenAIRE

    ACOSTA-HUMÁNEZ, PRIMITIVO; ARANDA, MOISÉS; NÚÑEZ, REINALDO

    2011-01-01

    Abstract. In this paper we use a generalized vector product to construct an exterior form ⊥ : , where Finally, for n = k - 1 we introduce the reversing operation to study this generalized vector product over palindromic and antipalindromic vectors. Resumen. En este art&íacute;culo usamos un producto vectorial generalizado para construir una forma exterior ⊥ : , en donde como es natural, Finalmente, para n = k - 1 introducimos la operación reversar para estudiar este producto vectorial gene...

  13. Virtual Vector Machine for Bayesian Online Classification

    OpenAIRE

    Minka, Thomas P.; Xiang, Rongjing; Yuan; Qi

    2012-01-01

    In a typical online learning scenario, a learner is required to process a large data stream using a small memory buffer. Such a requirement is usually in conflict with a learner's primary pursuit of prediction accuracy. To address this dilemma, we introduce a novel Bayesian online classi cation algorithm, called the Virtual Vector Machine. The virtual vector machine allows you to smoothly trade-off prediction accuracy with memory size. The virtual vector machine summarizes the information con...

  14. Development of Viral Vectors for Gene Therapy for Chronic Pain

    Directory of Open Access Journals (Sweden)

    Yu Huang

    2011-01-01

    Full Text Available Chronic pain is a major health concern that affects millions of people. There are no adequate long-term therapies for chronic pain sufferers, leading to significant cost for both society and the individual. The most commonly used therapy for chronic pain is the application of opioid analgesics and nonsteroidal anti-inflammatory drugs, but these drugs can lead to addiction and may cause side effects. Further studies of the mechanisms of chronic pain have opened the way for development of new treatment strategies, one of which is gene therapy. The key to gene therapy is selecting safe and highly efficient gene delivery systems that can deliver therapeutic genes to overexpress or suppress relevant targets in specific cell types. Here we review several promising viral vectors that could be applied in gene transfer for the treatment of chronic pain and further discuss the possible mechanisms of genes of interest that could be delivered with viral vectors for the treatment of chronic pain.

  15. Genetic manipulation of endosymbionts to control vector and vector borne diseases

    Directory of Open Access Journals (Sweden)

    Jay Prakash Gupta

    Full Text Available Vector borne diseases (VBD are on the rise because of failure of the existing methods of control of vector and vector borne diseases and the climate change. A steep rise of VBDs are due to several factors like selection of insecticide resistant vector population, drug resistant parasite population and lack of effective vaccines against the VBDs. Environmental pollution, public health hazard and insecticide resistant vector population indicate that the insecticides are no longer a sustainable control method of vector and vector-borne diseases. Amongst the various alternative control strategies, symbiont based approach utilizing endosymbionts of arthropod vectors could be explored to control the vector and vector borne diseases. The endosymbiont population of arthropod vectors could be exploited in different ways viz., as a chemotherapeutic target, vaccine target for the control of vectors. Expression of molecules with antiparasitic activity by genetically transformed symbiotic bacteria of disease-transmitting arthropods may serve as a powerful approach to control certain arthropod-borne diseases. Genetic transformation of symbiotic bacteria of the arthropod vector to alter the vector’s ability to transmit pathogen is an alternative means of blocking the transmission of VBDs. In Indian scenario, where dengue, chikungunya, malaria and filariosis are prevalent, paratransgenic based approach can be used effectively. [Vet World 2012; 5(9.000: 571-576

  16. A histogram-based technique for rapid vector extraction from PIV photographs

    Science.gov (United States)

    Humphreys, William M., Jr.

    1991-01-01

    A new analysis technique, performed totally in the image plane, is proposed which rapidly extracts all available vectors from individual interrogation regions on PIV photographs. The technique avoids the need for using Fourier transforms with the associated computational burden. The data acquisition and analysis procedure is described, and results of a preliminary simulation study to evaluate the accuracy of the technique are presented. Recently obtained PIV photographs are analyzed.

  17. Vector (two-dimensional) magnetic phenomena

    International Nuclear Information System (INIS)

    Enokizono, Masato

    2002-01-01

    In this paper, some interesting phenomena were described from the viewpoint of two-dimensional magnetic property, which is reworded with the vector magnetic property. It shows imperfection of conventional magnetic property and some interested phenomena were discovered, too. We found magnetic materials had the strong nonlinearity both magnitude and spatial phase due to the relationship between the magnetic field strength H-vector and the magnetic flux density B-vector. Therefore, magnetic properties should be defined as the vector relationship. Furthermore, the new Barukhausen signal was observed under rotating flux. (Author)

  18. Vector Boson Scattering at High Mass

    CERN Document Server

    Sherwood, P

    2009-01-01

    In the absence of a light Higgs boson, the mechanism of electroweak symmetry breaking will be best studied in processes of vector boson scattering at high mass. Various models predict resonances in this channel. Here, we investigate W W scalar and vector resonances, W Z vector resonances and a Z Z scalar resonance over a range of diboson centre-of-mass energies. Particular attention is paid to the application reconstruction of dijet pairs with low opening angle resulting from the decay of highly boosted vector bosons.

  19. Vector models in RETRAN-02 MOD 2

    International Nuclear Information System (INIS)

    Kinnersly, S.R.

    1985-06-01

    The vector momentum model in RETRAN-02 allows momentum flux to be modelled in two dimensions. Vector models in RETRAN-2 are described, including both the actual implementation in the code and the specification given in the code manual. The vector momentum model is described in detail. Other models which use vector quantities include models for volume average flow, volume average slip velocity, volume average phase velocities and fill junction flows. Both code implementations and code manual descriptions are described and inconsistencies noted. The differences between the standard RETRA-02 Mod 2 version and the Winfrith version RETN2204 are noted. (U.K.)

  20. Novel redox nanomedicine improves gene expression of polyion complex vector

    Directory of Open Access Journals (Sweden)

    Kazuko Toh, Toru Yoshitomi, Yutaka Ikeda and Yukio Nagasaki

    2011-01-01

    Full Text Available Gene therapy has generated worldwide attention as a new medical technology. While non-viral gene vectors are promising candidates as gene carriers, they have several issues such as toxicity and low transfection efficiency. We have hypothesized that the generation of reactive oxygen species (ROS affects gene expression in polyplex supported gene delivery systems. The effect of ROS on the gene expression of polyplex was evaluated using a nitroxide radical-containing nanoparticle (RNP as an ROS scavenger. When polyethyleneimine (PEI/pGL3 or PEI alone was added to the HeLa cells, ROS levels increased significantly. In contrast, when (PEI/pGL3 or PEI was added with RNP, the ROS levels were suppressed. The luciferase expression was increased by the treatment with RNP in a dose-dependent manner and the cellular uptake of pDNA was also increased. Inflammatory cytokines play an important role in ROS generation in vivo. In particular, tumor necrosis factor (TNF-α caused intracellular ROS generation in HeLa cells and decreased gene expression. RNP treatment suppressed ROS production even in the presence of TNF-α and increased gene expression. This anti-inflammatory property of RNP suggests that it may be used as an effective adjuvant for non-viral gene delivery systems.

  1. Vector Boson Scattering at ATLAS

    CERN Document Server

    Ozcan, V E

    2009-01-01

    While the Higgs model is the best studied scenario of electroweak symmetry breaking, there is no fundamental reason for the physics responsible for the symmetry breaking to be weakly-coupled. Many alternatives exist, predicting highly model-dependent signatures. By measuring the cross-section for the W and Z scattering at the LHC, it will be possible to obtain model-independent evidence for strong symmetry breaking or to constrain these various models. ATLAS Collaboration has recently performed a realistic simulation of this process and its backgrounds, which takes into account the detector effects and has developed new jet-analysis techniques for identifying vector bosons within the immense QCD backgrounds expected at the LHC. These techniques and the prospects for measuring the scattering signal will be presented.

  2. Vector Boson Scattering at ATLAS

    CERN Document Server

    Ozcan, V E

    2008-01-01

    While the Higgs model is the best studied scenario of electroweak symmetry breaking, there is no fundamental reason for the physics responsible for the symmetry breaking to be weakly-coupled. Many alternatives exist, predicting highly model-dependent signatures. By measuring the cross-section for the W and Z scattering at the LHC, it will be possible to obtain model-independent evidence for strong symmetry breaking or to constrain these various models. ATLAS Collaboration has recently performed a realistic simulation of this process and its backgrounds, which takes into account the detector effects and has developed new jet-analysis techniques for identifying vector bosons within the immense QCD backgrounds expected at the LHC. These techniques and the prospects for measuring the scattering signal will be presented.

  3. CERN vector boson hunt successful

    International Nuclear Information System (INIS)

    Robinson, A.L.

    1983-01-01

    UA-1 and UA-2 are code names for two groups of physicists at the European Laboratory for Particle Physics (CERN), together comprising almost 200 researchers. From data collected in two 3-month-long runs last fall and spring, the groups have collected 100 intermediate vector bosons (90 W's and 10 Z 0 's) whose properties so far fit the predictions of the unified quantum field theory of the electromagnetic and weak forces. Although the number of events is short of staggering, the discovery is immensely important. Physicists have been looking for the W for about 50 years. The Z 0 is crucial to the success of the method by which the two forces were melded into one - the electro-weak force

  4. On Weighted Support Vector Regression

    DEFF Research Database (Denmark)

    Han, Xixuan; Clemmensen, Line Katrine Harder

    2014-01-01

    We propose a new type of weighted support vector regression (SVR), motivated by modeling local dependencies in time and space in prediction of house prices. The classic weights of the weighted SVR are added to the slack variables in the objective function (OF‐weights). This procedure directly...... shrinks the coefficient of each observation in the estimated functions; thus, it is widely used for minimizing influence of outliers. We propose to additionally add weights to the slack variables in the constraints (CF‐weights) and call the combination of weights the doubly weighted SVR. We illustrate...... the differences and similarities of the two types of weights by demonstrating the connection between the Least Absolute Shrinkage and Selection Operator (LASSO) and the SVR. We show that an SVR problem can be transformed to a LASSO problem plus a linear constraint and a box constraint. We demonstrate...

  5. Pattern recognition with vector hits

    International Nuclear Information System (INIS)

    Frühwirth, R

    2012-01-01

    Trackers at the future high-luminosity LHC, designed to have triggering capability, will feature layers of stacked modules with a small stack separation. This will allow the reconstruction of track stubs or vector hits with position and direction information, but lacking precise curvature information. This opens up new possibilities for track finding, online and offline. Two track finding methods, the Kalman filter and the convergent Hough transform are studied in this context. Results from a simplified fast simulation are presented. It is shown that the performance of the methods depends to a large extent on the size of the stack separation. We conclude that the detector design and the choice of the track finding algorithm(s) are strongly coupled and should proceed conjointly.

  6. The evaporative vector: Homogeneous systems

    International Nuclear Information System (INIS)

    Klots, C.E.

    1987-05-01

    Molecular beams of van der Waals molecules are the subject of much current research. Among the methods used to form these beams, three-sputtering, laser ablation, and the sonic nozzle expansion of neat gases - yield what are now recognized to be ''warm clusters.'' They contain enough internal energy to undergo a number of first-order processes, in particular that of evaporation. Because of this evaporation and its attendant cooling, the properties of such clusters are time-dependent. The states of matter which can be arrived at via an evaporative vector on a typical laboratory time-scale are discussed. Topics include the (1) temperatures, (2) metastability, (3) phase transitions, (4) kinetic energies of fragmentation, and (5) the expression of magical properties, all for evaporating homogeneous clusters

  7. Introduction to Vector Field Visualization

    Science.gov (United States)

    Kao, David; Shen, Han-Wei

    2010-01-01

    Vector field visualization techniques are essential to help us understand the complex dynamics of flow fields. These can be found in a wide range of applications such as study of flows around an aircraft, the blood flow in our heart chambers, ocean circulation models, and severe weather predictions. The vector fields from these various applications can be visually depicted using a number of techniques such as particle traces and advecting textures. In this tutorial, we present several fundamental algorithms in flow visualization including particle integration, particle tracking in time-dependent flows, and seeding strategies. For flows near surfaces, a wide variety of synthetic texture-based algorithms have been developed to depict near-body flow features. The most common approach is based on the Line Integral Convolution (LIC) algorithm. There also exist extensions of LIC to support more flexible texture generations for 3D flow data. This tutorial reviews these algorithms. Tensor fields are found in several real-world applications and also require the aid of visualization to help users understand their data sets. Examples where one can find tensor fields include mechanics to see how material respond to external forces, civil engineering and geomechanics of roads and bridges, and the study of neural pathway via diffusion tensor imaging. This tutorial will provide an overview of the different tensor field visualization techniques, discuss basic tensor decompositions, and go into detail on glyph based methods, deformation based methods, and streamline based methods. Practical examples will be used when presenting the methods; and applications from some case studies will be used as part of the motivation.

  8. Vectorization of KENO IV code and an estimate of vector-parallel processing

    International Nuclear Information System (INIS)

    Asai, Kiyoshi; Higuchi, Kenji; Katakura, Jun-ichi; Kurita, Yutaka.

    1986-10-01

    The multi-group criticality safety code KENO IV has been vectorized and tested on FACOM VP-100 vector processor. At first the vectorized KENO IV on a scalar processor became slower than the original one by a factor of 1.4 because of the overhead introduced by the vectorization. Making modifications of algorithms and techniques for vectorization, the vectorized version has become faster than the original one by a factor of 1.4 and 3.0 on the vector processor for sample problems of complex and simple geometries, respectively. For further speedup of the code, some improvements on compiler and hardware, especially on addition of Monte Carlo pipelines to the vector processor, are discussed. Finally a pipelined parallel processor system is proposed and its performance is estimated. (author)

  9. Molecular design for recombinant adeno-associated virus (rAAV) vector production.

    Science.gov (United States)

    Aponte-Ubillus, Juan Jose; Barajas, Daniel; Peltier, Joseph; Bardliving, Cameron; Shamlou, Parviz; Gold, Daniel

    2018-02-01

    Recombinant adeno-associated virus (rAAV) vectors are increasingly popular tools for gene therapy applications. Their non-pathogenic status, low inflammatory potential, availability of viral serotypes with different tissue tropisms, and prospective long-lasting gene expression are important attributes that make rAAVs safe and efficient therapeutic options. Over the last three decades, several groups have engineered recombinant AAV-producing platforms, yielding high titers of transducing vector particles. Current specific productivity yields from different platforms range from 10 3 to 10 5 vector genomes (vg) per cell, and there is an ongoing effort to improve vector yields in order to satisfy high product demands required for clinical trials and future commercialization.Crucial aspects of vector production include the molecular design of the rAAV-producing host cell line along with the design of AAV genes, promoters, and regulatory elements. Appropriately, configuring and balancing the expression of these elements not only contributes toward high productivity, it also improves process robustness and product quality. In this mini-review, the rational design of rAAV-producing expression systems is discussed, with special attention to molecular strategies that contribute to high-yielding, biomanufacturing-amenable rAAV production processes. Details on molecular optimization from four rAAV expression systems are covered: adenovirus, herpesvirus, and baculovirus complementation systems, as well as a recently explored yeast expression system.

  10. Avoidance orientation moderates the effect of threatening messages

    NARCIS (Netherlands)

    Riet, van 't J.P.; Ruiter, R.A.C.; Vries, de H.

    2012-01-01

    This study investigated the influence of individual differences in people's dispositional avoidance orientation on the persuasive effects of low- and high-threat messages promoting moderate drinking. First, participents (N = 99) individual differences in avoidance orientation were assessed, after

  11. Litigation-proof patents: avoiding the most common patent mistakes

    National Research Council Canada - National Science Library

    Goldstein, Larry M

    2014-01-01

    "Litigation-Proof Patents: Avoiding the Most Common Patent Mistakes explains the principles of excellent patents, presents the ten most common errors in patents, and details a step-by-step method for avoiding these common errors...

  12. Inflammatory Response in Islet Transplantation

    Directory of Open Access Journals (Sweden)

    Mazhar A. Kanak

    2014-01-01

    Full Text Available Islet cell transplantation is a promising beta cell replacement therapy for patients with brittle type 1 diabetes as well as refractory chronic pancreatitis. Despite the vast advancements made in this field, challenges still remain in achieving high frequency and long-term successful transplant outcomes. Here we review recent advances in understanding the role of inflammation in islet transplantation and development of strategies to prevent damage to islets from inflammation. The inflammatory response associated with islets has been recognized as the primary cause of early damage to islets and graft loss after transplantation. Details on cell signaling pathways in islets triggered by cytokines and harmful inflammatory events during pancreas procurement, pancreas preservation, islet isolation, and islet infusion are presented. Robust control of pre- and peritransplant islet inflammation could improve posttransplant islet survival and in turn enhance the benefits of islet cell transplantation for patients who are insulin dependent. We discuss several potent anti-inflammatory strategies that show promise for improving islet engraftment. Further understanding of molecular mechanisms involved in the inflammatory response will provide the basis for developing potent therapeutic strategies for enhancing the quality and success of islet transplantation.

  13. Inflammatory Response in Islet Transplantation

    Science.gov (United States)

    Kanak, Mazhar A.; Kunnathodi, Faisal; Lawrence, Michael C.; Levy, Marlon F.

    2014-01-01

    Islet cell transplantation is a promising beta cell replacement therapy for patients with brittle type 1 diabetes as well as refractory chronic pancreatitis. Despite the vast advancements made in this field, challenges still remain in achieving high frequency and long-term successful transplant outcomes. Here we review recent advances in understanding the role of inflammation in islet transplantation and development of strategies to prevent damage to islets from inflammation. The inflammatory response associated with islets has been recognized as the primary cause of early damage to islets and graft loss after transplantation. Details on cell signaling pathways in islets triggered by cytokines and harmful inflammatory events during pancreas procurement, pancreas preservation, islet isolation, and islet infusion are presented. Robust control of pre- and peritransplant islet inflammation could improve posttransplant islet survival and in turn enhance the benefits of islet cell transplantation for patients who are insulin dependent. We discuss several potent anti-inflammatory strategies that show promise for improving islet engraftment. Further understanding of molecular mechanisms involved in the inflammatory response will provide the basis for developing potent therapeutic strategies for enhancing the quality and success of islet transplantation. PMID:24883060

  14. Inflammatory mechanisms in Alzheimer's disease

    NARCIS (Netherlands)

    Eikelenboom, P.; Zhan, S. S.; van Gool, W. A.; Allsop, D.

    1994-01-01

    Alzheimer's disease is aetiologically heterogeneous, but the pathogenesis is often considered to be initiated by the deposition of amyloid fibrils, followed by neuritic tau pathology and neuronal death. A variety of inflammatory proteins has been identified in the brains of patients with Alzheimer's

  15. Neonatal umbilical inflammatory myofibroblastic tumor

    African Journals Online (AJOL)

    antenatal scan. The preferred treatment option is resection of the tumor. Spontaneous regression has been described. Ann Pediatr Surg 13:160–162 c 2017 Annals of Pediatric. Surgery. ... Keywords: inflammatory myofibroblastic tumor, neonatal tumor, surgical resection ... Other anatomical regions were the brain, the.

  16. Diffusion tensor imaging in inflammatory and neoplastic intramedullary spinal cord lesions: Focusing on fiber tracking

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyo Jin; Lee, Joon Woo; Lee, Eugene; Kim, Sung Gon; Kang, Yu Suhn; Ahn, Joong Mo; Kang, Heung Sik [Dept. of Radiology, Seoul National University Bundang Hospital, Seongnam (Korea, Republic of)

    2017-02-15

    Inflammatory and neoplastic intramedullary spinal cord lesions have overlapping clinical features, and it is occasionally difficult to distinguish one from the other on conventional magnetic resonance imaging. We aimed to compare diffusion tensor imaging findings between inflammatory and neoplastic intramedullary spinal cord lesions, with a specific focus on patterns of fiber tracking. Diffusion tensor imaging was performed in patients with either inflammatory or neoplastic intramedullary spinal cord lesions. The fiber tracking patterns (categorized as “intact,” “displaced,” or “interrupted”) were compared between these two groups. Eight patients were included in the study: 5 patients with pathologically or clinically confirmed inflammatory lesions and 3 patients with pathologically or clinically confirmed neoplastic lesions. Among the 5 patients with inflammatory lesions, 2 patients exhibited the displaced pattern and 3 patients exhibited the intact pattern. Among the 3 patients with neoplastic lesions, 1 patient exhibited the intact pattern, 1 patient exhibited the displaced pattern, and 1 patient exhibited the interrupted pattern. In this study, inflammatory and neoplastic intramedullary spinal cord lesions were not clearly differentiated by fiber tracking; both conditions can present with overlapping features such as displaced fibers. The exclusion of inflammatory conditions based on the presence of displaced fibers in fiber tracking images should be avoided.

  17. Speculative dynamic vectorization to assist static vectorization in a HW/SW co-designed environment

    OpenAIRE

    Kumar, R.; Martinez, A.; Gonzalez, A.

    2013-01-01

    Compiler based static vectorization is used widely to extract data level parallelism from computation intensive applications. Static vectorization is very effective in vectorizing traditional array based applications. However, compilers inability to reorder ambiguous memory references severely limits vectorization opportunities, especially in pointer rich applications. HW/SW co-designed processors provide an excellent opportunity to optimize the applications at runtime. The availability of dy...

  18. Probing deformed orbitals with vector A( vector e, e' N)B reactions

    International Nuclear Information System (INIS)

    Garrido, E.; Caballero, J.A.; Moya de Guerra, E.; Sarriguren, P.; Udias, J.M.

    1995-01-01

    We present results for response functions and asymmetries in the nuclear reactions 37 vector Ar( vector e, e' n) 36 Ar and 37 vector K( vector e,e' p) 36 Ar at quasifree kinematics. We compare PWIA results obtained using deformed HF wave functions with PWIA and DWIA results obtained assuming a spherical mean field. We show that the complex structure of the deformed orbitals can be probed by coincidence measurements with polarized beam and targets. ((orig.))

  19. Gauge anomaly with vector and axial-vector fields in 6D curved space

    Science.gov (United States)

    Yajima, Satoshi; Eguchi, Kohei; Fukuda, Makoto; Oka, Tomonori

    2018-03-01

    Imposing the conservation equation of the vector current for a fermion of spin 1/2 at the quantum level, a gauge anomaly for the fermion coupling with non-Abelian vector and axial-vector fields in 6D curved space is expressed in tensorial form. The anomaly consists of terms that resemble the chiral U(1) anomaly and the commutator terms that disappear if the axial-vector field is Abelian.

  20. Relative valuation of alternative methods of tax avoidance

    OpenAIRE

    Inger, Kerry Katharine

    2012-01-01

    This paper examines the relative valuation of alternative methods of tax avoidance. Prior studies find that firm value is positively associated with overall measures of tax avoidance; I extend this research by providing evidence that investors distinguish between methods of tax reduction in their valuation of tax avoidance. The impact of tax avoidance on firm value is a function of tax risk, permanence of tax savings, tax planning costs, implicit taxes and contrasts in disclosures of tax re...

  1. Communication Avoiding and Overlapping for Numerical Linear Algebra

    Science.gov (United States)

    2012-05-08

    future exascale systems, communication cost must be avoided or overlapped. Communication-avoiding 2.5D algorithms improve scalability by reducing...linear algebra problems to future exascale systems, communication cost must be avoided or overlapped. Communication-avoiding 2.5D algorithms improve...will continue to grow relative to the cost of computation. With exascale computing as the long-term goal, the community needs to develop techniques

  2. CEO Power, Corporate Tax Avoidance and Tax Aggressiveness

    OpenAIRE

    GATOT SOEPRIYANTO

    2017-01-01

    My thesis investigates the association between CEO power, corporate tax avoidance and tax aggressiveness, using two organizational theory perspectives: self-interest and stewardship. I find that a powerful CEO engages in less corporate tax avoidance activities, which lends credence to the risk minimization motive of the stewardship perspective. My findings on the association between CEO power and tax aggressiveness show that powerful CEOs avoid risky tax avoidance strategies that expose a fir...

  3. Vector optimization set-valued and variational analysis

    CERN Document Server

    Chen, Guang-ya; Yang, Xiaogi

    2005-01-01

    This book is devoted to vector or multiple criteria approaches in optimization. Topics covered include: vector optimization, vector variational inequalities, vector variational principles, vector minmax inequalities and vector equilibrium problems. In particular, problems with variable ordering relations and set-valued mappings are treated. The nonlinear scalarization method is extensively used throughout the book to deal with various vector-related problems. The results presented are original and should be interesting to researchers and graduates in applied mathematics and operations research

  4. Landslide disaster avoidance: learning from Leyte

    Science.gov (United States)

    Davies, T. R.

    2006-12-01

    On 17 February 2006 a gigantic rockslide triggered a debris avalanche that overran the barangay Guinsaugon, St. Bernard in Southern Leyte Province, Philippines, burying 154 victims, with 990 missing including 246 school children. Even with satellite imagery, GIS-based landslide susceptibility modelling and real-time meteorological and seismic data analysis, scientific prediction of every potentially fatal landslide is not possible in most parts of the world. This is particular the case in steep, unstable, densely-populated country in which heavy rain is common. So how can further events of this type be prevented from turning into disasters? A number of precursory phenomena were noted by local inhabitants at Guinsaugon: a crack around the slope that failed was noticed in May 2005; coconut trees near the northern foot of the landslide scarp began to lean increasingly in the down-slope direction in December 2005; a slope around the northern edge of the 17 February 2006 landslide scarp failed on December 17, 2005; in the 9 days prior to the rockslide, 640 mm of rain fell; 450 mm in a 3-day period. Such phenomena are commonly reported by local inhabitants before large landslides (e.g. Elm, Mayunmarca, and many others). In many cases, therefore, it is in principle possible for local people to avoid the consequences of the landslide if they know enough to act appropriately in response to the precursory phenomena. For this possibility to be realized, appropriate information must be provided to and assimilated by the local population. Useful ways of achieving this include pamphlets, video, TV and radio programs and visits from civil defence personnel. The information must be properly presented; scientific language will be ineffective. A communication pyramid, leading from government agencies to local leaders, can facilitate the rapid availability of the information to all potentially susceptible communities. If science can determine those areas not vulnerable to landslide

  5. Avoiding surety contracts in bankruptcy procedure

    Directory of Open Access Journals (Sweden)

    Hiber Dragor

    2015-01-01

    Full Text Available Serbia's courts jurisprudence has divergent attitudes with respect to the dilemma whether a surety contract represents a contract without consideration, which may be avoided once the guarantor is subject to bankruptcy procedure without any additional conditions, or an onerous contract. Whether a surety contract is an onerous one has anyhow been disputed in the legal theory. One school of thought considers this contract as non-onerous one, since vis-a-vis guarantor's obligation no benefit to be expected from the other contractual party (i. e. creditor exists. The other school of thought understands surety (almost always as an onerous contract bearing in mind that the guarantor who enters into this contract does not have intentio liberalis. There are numerous and nuanced views based on analyses of the relation between a guarantor and a debtor focused on the argument that surety is a contract without consideration if intentio liberalis existed vis-a-vis main debtor rather than vis-a-vis creditor. Our legal literature did not pay much attention to that issue until recently. In a rare text dedicated to it the author's basic standpoint is that surety represents a contract without consideration. An exception, depending on the circumstances of the case, could be surety given by a parent company for the obligation of a subsidiary, provided the former reasonably expected a benefit in terms of an increase in the value of shares. Commercial courts followed such reasoning. In this article an opposite stance has been argued. Namely, the onerousness of surety must be assessed based on the relation between the guarantor and the main debtor rather than between the guarantor and the creditor. As a rule, surety is an onerous contract because the guarantor expects to collect from the debtor through subrogation the amount he paid to the creditor; exceptionally, surety may be a non-onerous contract if intentio liberalis existed vis-a-vis main debtor. However, this

  6. Vector surveillance and eradication in primary health care

    Directory of Open Access Journals (Sweden)

    Ada Crespo Guzmán

    2011-08-01

    Full Text Available A bibliographical revision was done about in Dengue fever and the control that is carrier on against the Aedes aegypti “mosquito”, the principal agent that treatments this illness, with the objective of describing the functioning of the Control and Elimination Program of the Mosquito in the Cuban Primary Health Care System. The main objective of this program is to avoid the Dengue epidemics and the loss of human life and the negative impact that will cost to, the socioeconomic development of over country. Accomplishing the promotion, prevention and controlling actions by the basic health care team the mosquito campaign workers and our population, the vector infestation index has been diminished below 0.5 in the last five years. It is important to point out that the rapid decisions taken by our government and its consequent efforts and political willingness has made this program sustained.

  7. A three-axis SQUID-based absolute vector magnetometer

    Energy Technology Data Exchange (ETDEWEB)

    Schönau, T.; Schmelz, M.; Stolz, R.; Anders, S.; Linzen, S.; Meyer, H.-G. [Department of Quantum Detection, Leibniz Institute of Photonic Technology, Jena 07745 (Germany); Zakosarenko, V.; Meyer, M. [Supracon AG, An der Lehmgrube 11, Jena 07751 (Germany)

    2015-10-15

    We report on the development of a three-axis absolute vector magnetometer suited for mobile operation in the Earth’s magnetic field. It is based on low critical temperature dc superconducting quantum interference devices (LTS dc SQUIDs) with sub-micrometer sized cross-type Josephson junctions and exhibits a white noise level of about 10 fT/Hz{sup 1/2}. The width of superconducting strip lines is restricted to less than 6 μm in order to avoid flux trapping during cool-down in magnetically unshielded environment. The long-term stability of the flux-to-voltage transfer coefficients of the SQUID electronics is investigated in detail and a method is presented to significantly increase their reproducibility. We further demonstrate the long-term operation of the setup in a magnetic field varying by about 200 μT amplitude without the need for recalibration.

  8. Variational formulation of covariant eikonal theory for vector waves

    International Nuclear Information System (INIS)

    Kaufman, A.N.; Ye, H.; Hui, Y.

    1986-10-01

    The eikonal theory of wave propagation is developed by means of a Lorentz-covariant variational principle, involving functions defined on the natural eight-dimensional phase space of rays. The wave field is a four-vector representing the electromagnetic potential, while the medium is represented by an anisotropic, dispersive nonuniform dielectric tensor D/sup μν/(k,x). The eikonal expansion yields, to lowest order, the Hamiltonian ray equations, which define the Lagrangian manifold k(x), and the wave-action conservation law, which determines the wave-amplitude transport along the rays. The first-order contribution to the variational principle yields a concise expression for the transport of the polarization phase. The symmetry between k-space and x-space allows for a simple implementation of the Maslov transform, which avoids the difficulties of caustic singularities

  9. Inflammatory mechanisms in the lung

    Directory of Open Access Journals (Sweden)

    B Moldoveanu

    2008-12-01

    Full Text Available B Moldoveanu1, P Otmishi1, P Jani1, J Walker1,2, X Sarmiento3, J Guardiola1, M Saad1, Jerry Yu11Department of Medicine, University of Louisville, Louisville, KY, USA, 40292; 2Department of Respiratory Therapy, Bellarmine University, Louisville, KY, USA, 40205; 3Intensive Care Medicine Service, University Hospital Germans Trias i Pujol, Badalona, Spain 08916Abstract: Inflammation is the body’s response to insults, which include infection, trauma, and hypersensitivity. The inflammatory response is complex and involves a variety of mechanisms to defend against pathogens and repair tissue. In the lung, inflammation is usually caused by pathogens or by exposure to toxins, pollutants, irritants, and allergens. During inflammation, numerous types of inflammatory cells are activated. Each releases cytokines and mediators to modify activities of other inflammatory cells. Orchestration of these cells and molecules leads to progression of inflammation. Clinically, acute inflammation is seen in pneumonia and acute respiratory distress syndrome (ARDS, whereas chronic inflammation is represented by asthma and chronic obstructive pulmonary disease (COPD. Because the lung is a vital organ for gas exchange, excessive inflammation can be life threatening. Because the lung is constantly exposed to harmful pathogens, an immediate and intense defense action (mainly inflammation is required to eliminate the invaders as early as possible. A delicate balance between inflammation and anti-inflammation is essential for lung homeostasis. A full understanding of the underlying mechanisms is vital in the treatment of patients with lung inflammation. This review focuses on cellular and molecular aspects of lung inflammation during acute and chronic inflammatory states.Keywords: inflammation, lung, inflammatory mediators, cytokines

  10. Avoidance and tolerance to avian herbivores in aquatic plants

    NARCIS (Netherlands)

    Hidding, A.

    2009-01-01

    Tolerance and avoidance are the two contrasting strategies that plants may adopt to cope with herbivores. Tolerance traits define the degree to which communities remain unaffected by herbivory. Trade-offs between herbivore avoidance and competitive strength and between avoidance and colonization

  11. Constraining vectors and axial-vectors in walking technicolour by a holographic principle

    DEFF Research Database (Denmark)

    D. Dietrich, Dennis; Kouvaris, Christoforos

    2008-01-01

    We use a holographic principle to study the low-energy spectrum of walking technicolour models. In particular, we predict the masses of the axial vectors as well as the decay constants of vectors and axial vectors as functions of the mass of the techni-rho. Given that there are very few...

  12. Brief cognitive therapy for avoidant personality disorder.

    Science.gov (United States)

    Rees, Clare S; Pritchard, Rhian

    2015-03-01

    Avoidant personality disorder (APD) is associated with a high level of impairment in multiple areas of functioning. However, research on the treatment of APD is scarce, and there is an absence of empirically evaluated effective treatment approaches available. This study offers a preliminary investigation of the use of brief cognitive therapy to treat APD. Two individuals, both with a principal diagnosis of APD, but who also possessed a number of comorbidities, participated in 12 weekly sessions. A series of diagnostic symptom severity, global functioning, and self-report measures were completed at pretreatment, posttreatment and at 6-week follow-up. In addition, regular monitoring of each participant's strength of belief in 4 personally identified cognitions associated with APD was completed. Reductions in APD symptoms, associated negative affect, and increases to quality of life were observed for both participants at posttreatment and follow-up phases. Results suggest that brief cognitive therapy may be an effective treatment for APD and that further studies with larger samples are warranted. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  13. Spaced taste avoidance conditioning in Lymnaea.

    Science.gov (United States)

    Takigami, Satoshi; Sunada, Hiroshi; Lukowiak, Ken; Sakakibara, Manabu

    2014-01-01

    We succeeded in taste avoidance conditioning with sucrose as the conditional stimulus (CS) and an electrical stimulus (∼1000V, 80μA) as the unconditional stimulus (US). With 15 paired CS-US presentations on a single day, we were able to elicit both short-term memory (STM) and long-term memory (LTM) persisting for at least one week. However, while STM was elicited with 5, 8, 10, and 20 paired presentations of the CS-US on a single day, LTM was not. We found, however, that if we inserted a 3h interval between a first and a second set of CS-US pairings that both 8 and 20 paired CS-US presentations on a single day was now sufficient to cause LTM formation. Exposing snails to bryostatin before or during training enhanced LTM formation such that 8 paired presentations of the CS-US resulted in LTM. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. The amygdala: securing pleasure and avoiding pain

    Directory of Open Access Journals (Sweden)

    Anushka B P Fernando

    2013-12-01

    Full Text Available The amygdala has traditionally been associated with fear, mediating the impact of negative emotions on memory. However, this view does not fully encapsulate the function of the amygdala, nor the impact that processing in this structure has on the motivational limbic corticostriatal circuitry of which it is an important structure. Here we discuss the interactions between different amygdala nuclei with cortical and striatal regions involved in motivation; interconnections and parallel circuitries that have become increasingly understood in recent years. We review the evidence that the amygdala stores memories that allow initially motivationally neutral stimuli to become associated through pavlovian conditioning with motivationally relevant outcomes which, importantly, can be either appetitive (e.g. food or aversive (e.g. electric shock. We also consider how different psychological processes supported by the amygdala such as conditioned reinforcement and punishment, conditioned motivation and suppression, and conditioned approach and avoidance behavior, are not only psychologically but also neurobiologically dissociable, being mediated by distinct yet overlapping neural circuits within the limbic corticostriatal circuitry. Clearly the role of the amygdala goes beyond encoding aversive stimuli to also encode the appetitive, requiring an appreciation of the amygdala’s mediation of both appetitive and fearful behavior through diverse psychological processes.

  15. Cooperative organic mine avoidance path planning

    Science.gov (United States)

    McCubbin, Christopher B.; Piatko, Christine D.; Peterson, Adam V.; Donnald, Creighton R.; Cohen, David

    2005-06-01

    The JHU/APL Path Planning team has developed path planning techniques to look for paths that balance the utility and risk associated with different routes through a minefield. Extending on previous years' efforts, we investigated real-world Naval mine avoidance requirements and developed a tactical decision aid (TDA) that satisfies those requirements. APL has developed new mine path planning techniques using graph based and genetic algorithms which quickly produce near-minimum risk paths for complicated fitness functions incorporating risk, path length, ship kinematics, and naval doctrine. The TDA user interface, a Java Swing application that obtains data via Corba interfaces to path planning databases, allows the operator to explore a fusion of historic and in situ mine field data, control the path planner, and display the planning results. To provide a context for the minefield data, the user interface also renders data from the Digital Nautical Chart database, a database created by the National Geospatial-Intelligence Agency containing charts of the world's ports and coastal regions. This TDA has been developed in conjunction with the COMID (Cooperative Organic Mine Defense) system. This paper presents a description of the algorithms, architecture, and application produced.

  16. Avoidable cancers in the Nordic countries. Occupation

    DEFF Research Database (Denmark)

    Dreyer, L; Andersen, A; Pukkala, E

    1997-01-01

    million people (3.7 million men and 0.2 million women) in the Nordic countries were potentially exposed to above-average levels of one or more verified industrial carcinogens. It is expected that these exposures will result in a total of about 1,900 new cases of cancer every year in the Nordic countries...... around the year 2000, with 1,890 among men and fewer than 25 among women. The proportions that could be avoided if industrial carcinogens were eliminated would be 70% of mesotheliomas, 20% of cancers of the nasal cavity and sinuses, 12% of lung cancers, 5% of laryngeal cancers, 2% of urinary bladder...... cancers, 1% of the leukaemias, and 1% of renal cancers. Overall, it is estimated that verified industrial carcinogens will account for approximately 3% of all cancers in men and less than 0.1% of all cancers in women in the Nordic countries around the year 2000. No attempt was made to estimate...

  17. Collision detection and avoidance during treatment planning

    International Nuclear Information System (INIS)

    Humm, John L.; Pizzuto, Domenico; Fleischman, Eric; Mohan, Radhe

    1995-01-01

    Purpose: To develop computer software that assists the planner avoid potential gantry collisions with the patient or patient support assembly during the treatment planning process. Methods and Materials: The approach uses a simulation of the therapy room with a scale model of the treatment machine. Because the dimensions of the machine and patient are known, one can calculate a priori whether any desired therapy field is possible or will result in a collision. To assist the planner, we have developed a graphical interface enabling the accurate visualization of each treatment field configuration with a 'room's eye view' treatment planning window. This enables the planner to be aware of, and alleviate any potential collision hazards. To circumvent blind spots in the graphic representation, an analytical software module precomputes whether each update of the gantry or turntable position is safe. Results: If a collision is detected, the module alerts the planner and suggests collision evasive actions such as either an extended distance treatment or the gantry angle of closest approach. Conclusions: The model enables the planner to experiment with unconventional noncoplanar treatment fields, and immediately test their feasibility

  18. Aerial vehicles collision avoidance using monocular vision

    Science.gov (United States)

    Balashov, Oleg; Muraviev, Vadim; Strotov, Valery

    2016-10-01

    In this paper image-based collision avoidance algorithm that provides detection of nearby aircraft and distance estimation is presented. The approach requires a vision system with a single moving camera and additional information about carrier's speed and orientation from onboard sensors. The main idea is to create a multi-step approach based on a preliminary detection, regions of interest (ROI) selection, contour segmentation, object matching and localization. The proposed algorithm is able to detect small targets but unlike many other approaches is designed to work with large-scale objects as well. To localize aerial vehicle position the system of equations relating object coordinates in space and observed image is solved. The system solution gives the current position and speed of the detected object in space. Using this information distance and time to collision can be estimated. Experimental research on real video sequences and modeled data is performed. Video database contained different types of aerial vehicles: aircrafts, helicopters, and UAVs. The presented algorithm is able to detect aerial vehicles from several kilometers under regular daylight conditions.

  19. Approach-avoidance activation without anterior asymmetry

    Directory of Open Access Journals (Sweden)

    Andero eUusberg

    2014-03-01

    Full Text Available Occasionally, the expected effects of approach-avoidance motivation on anterior EEG alpha asymmetry fail to emerge, particularly in studies using affective picture stimuli. These null findings have been explained by insufficient motivational intensity of, and/or overshadowing interindividual variability within the responses to emotional pictures. These explanations were systematically tested using data from 70 students watching 5 types of affective pictures ranging from very pleasant to unpleasant. The stimulus categories reliably modulated self-reports as well as the amplitude of late positive potential, an ERP component reflecting orienting towards motivationally significant stimuli. The stimuli did not, however, induce expected asymmetry effects either for the sample or individual participants. Even while systematic stimulus-dependent individual differences emerged in self-reports as well as LPP amplitudes, the asymmetry variability was dominated by stimulus-independent interindividual variability. Taken together with previous findings, these results suggest that under some circumstances anterior asymmetry may not be an inevitable consequence of core affect. Instead, state asymmetry shifts may be overpowered by stable trait asymmetry differences and/or stimulus-independent yet situation-dependent interindividual variability, possibly caused by processes such as emotion regulation or anxious apprehension.

  20. Clustering Categories in Support Vector Machines

    DEFF Research Database (Denmark)

    Carrizosa, Emilio; Nogales-Gómez, Amaya; Morales, Dolores Romero

    2017-01-01

    The support vector machine (SVM) is a state-of-the-art method in supervised classification. In this paper the Cluster Support Vector Machine (CLSVM) methodology is proposed with the aim to increase the sparsity of the SVM classifier in the presence of categorical features, leading to a gain in in...

  1. Successful vectorization - reactor physics Monte Carlo code

    International Nuclear Information System (INIS)

    Martin, W.R.

    1989-01-01

    Most particle transport Monte Carlo codes in use today are based on the ''history-based'' algorithm, wherein one particle history at a time is simulated. Unfortunately, the ''history-based'' approach (present in all Monte Carlo codes until recent years) is inherently scalar and cannot be vectorized. In particular, the history-based algorithm cannot take advantage of vector architectures, which characterize the largest and fastest computers at the current time, vector supercomputers such as the Cray X/MP or IBM 3090/600. However, substantial progress has been made in recent years in developing and implementing a vectorized Monte Carlo algorithm. This algorithm follows portions of many particle histories at the same time and forms the basis for all successful vectorized Monte Carlo codes that are in use today. This paper describes the basic vectorized algorithm along with descriptions of several variations that have been developed by different researchers for specific applications. These applications have been mainly in the areas of neutron transport in nuclear reactor and shielding analysis and photon transport in fusion plasmas. The relative merits of the various approach schemes will be discussed and the present status of known vectorization efforts will be summarized along with available timing results, including results from the successful vectorization of 3-D general geometry, continuous energy Monte Carlo. (orig.)

  2. Nonlinear dynamics of a vectored thrust aircraft

    DEFF Research Database (Denmark)

    Sørensen, C.B; Mosekilde, Erik

    1996-01-01

    With realistic relations for the aerodynamic coefficients, numerical simulations are applied to study the longitudional dynamics of a thrust vectored aircraft. As function of the thrust magnitude and the thrust vectoring angle the equilibrium state exhibits two saddle-node bifurcations and three...

  3. Application of Vectors to Relative Velocity

    Science.gov (United States)

    Tin-Lam, Toh

    2004-01-01

    The topic 'relative velocity' has recently been introduced into the Cambridge Ordinary Level Additional Mathematics syllabus under the application of Vectors. In this note, the results of relative velocity and the 'reduction to rest' technique of teaching relative velocity are derived mathematically from vector algebra, in the hope of providing…

  4. Limit theorems for functionals of Gaussian vectors

    Institute of Scientific and Technical Information of China (English)

    Hongshuai DAI; Guangjun SHEN; Lingtao KONG

    2017-01-01

    Operator self-similar processes,as an extension of self-similar processes,have been studied extensively.In this work,we study limit theorems for functionals of Gaussian vectors.Under some conditions,we determine that the limit of partial sums of functionals of a stationary Gaussian sequence of random vectors is an operator self-similar process.

  5. Chickering's Vectors and the Adult Child Experience.

    Science.gov (United States)

    Sitten, Robin J.

    This document looks at the college student who is an adult child from a dysfunctional family, applying Chickering's seven vectors of college-age student development to that student's experiences at college. Each of Chickering's seven vectors (developing competence, managing emotions, developing autonomy, establishing identity, freeing…

  6. Zika and its vector mosquitoes in Mexico

    Directory of Open Access Journals (Sweden)

    Luis del Carpio-Orantes

    2018-06-01

    Full Text Available In the present study, we carried out a review on the potential vectors of the Zika virus in the Americas, specifically in Mexico. Being vectors of the Culicidae family, they have great predominance in those territories, which could facilitate viral dissemination.

  7. morphological identification of malaria vectors within anopheles

    African Journals Online (AJOL)

    DR. AMIN

    Africa among the human population. Determination of risk of malaria transmission requires quick and accurate methods of identification of Anopheles mosquitoes especially when targeting vector control. (Maxwell, et al., 2003). Anopheles mosquito transmits malaria. The most important vectors of malaria are members of.

  8. Vector fields and differential operators: noncommutative case

    International Nuclear Information System (INIS)

    Borowiec, A.

    1997-01-01

    A notion of Cartan pairs as an analogy of vector fields in the realm of noncommutative geometry has been proposed previously. In this paper an outline is given of the construction of a noncommutative analogy of the algebra of differential operators as well as its (algebraic) Fock space realization. Co-universal vector fields and covariant derivatives will also be discussed

  9. Deep Support Vector Machines for Regression Problems

    NARCIS (Netherlands)

    Wiering, Marco; Schutten, Marten; Millea, Adrian; Meijster, Arnold; Schomaker, Lambertus

    2013-01-01

    In this paper we describe a novel extension of the support vector machine, called the deep support vector machine (DSVM). The original SVM has a single layer with kernel functions and is therefore a shallow model. The DSVM can use an arbitrary number of layers, in which lower-level layers contain

  10. Pair production of intermediate vector bosons

    International Nuclear Information System (INIS)

    Mikaelian, K.O.

    1979-01-01

    The production of intermediate vector boson pairs W + W - , Z 0 Z 0 , W +- Z 0 and W +- γ in pp and p anti p collisions is discussed. The motivation is to detect the self-interactions among the four intermediate vector bosons

  11. Construction of expression vectors carrying mouse peroxisomal ...

    African Journals Online (AJOL)

    PRECIOUS

    2009-11-16

    Nov 16, 2009 ... The aim of this study was to construct expression vectors carrying mouse peroxisomal protein gene. (PEP-cDNA) in prokaryotic and mammalian expression vectors in chimeric cDNA types, encompassing. GST and FLAG with PEP-cDNA. PEP-cDNA was sub-cloned in pGEX6p2 prokaryotic expression ...

  12. Multi-task Vector Field Learning.

    Science.gov (United States)

    Lin, Binbin; Yang, Sen; Zhang, Chiyuan; Ye, Jieping; He, Xiaofei

    2012-01-01

    Multi-task learning (MTL) aims to improve generalization performance by learning multiple related tasks simultaneously and identifying the shared information among tasks. Most of existing MTL methods focus on learning linear models under the supervised setting. We propose a novel semi-supervised and nonlinear approach for MTL using vector fields. A vector field is a smooth mapping from the manifold to the tangent spaces which can be viewed as a directional derivative of functions on the manifold. We argue that vector fields provide a natural way to exploit the geometric structure of data as well as the shared differential structure of tasks, both of which are crucial for semi-supervised multi-task learning. In this paper, we develop multi-task vector field learning (MTVFL) which learns the predictor functions and the vector fields simultaneously. MTVFL has the following key properties. (1) The vector fields MTVFL learns are close to the gradient fields of the predictor functions. (2) Within each task, the vector field is required to be as parallel as possible which is expected to span a low dimensional subspace. (3) The vector fields from all tasks share a low dimensional subspace. We formalize our idea in a regularization framework and also provide a convex relaxation method to solve the original non-convex problem. The experimental results on synthetic and real data demonstrate the effectiveness of our proposed approach.

  13. Clifford Fourier transform on vector fields.

    Science.gov (United States)

    Ebling, Julia; Scheuermann, Gerik

    2005-01-01

    Image processing and computer vision have robust methods for feature extraction and the computation of derivatives of scalar fields. Furthermore, interpolation and the effects of applying a filter can be analyzed in detail and can be advantages when applying these methods to vector fields to obtain a solid theoretical basis for feature extraction. We recently introduced the Clifford convolution, which is an extension of the classical convolution on scalar fields and provides a unified notation for the convolution of scalar and vector fields. It has attractive geometric properties that allow pattern matching on vector fields. In image processing, the convolution and the Fourier transform operators are closely related by the convolution theorem and, in this paper, we extend the Fourier transform to include general elements of Clifford Algebra, called multivectors, including scalars and vectors. The resulting convolution and derivative theorems are extensions of those for convolution and the Fourier transform on scalar fields. The Clifford Fourier transform allows a frequency analysis of vector fields and the behavior of vector-valued filters. In frequency space, vectors are transformed into general multivectors of the Clifford Algebra. Many basic vector-valued patterns, such as source, sink, saddle points, and potential vortices, can be described by a few multivectors in frequency space.

  14. Inflammatory pathways of importance for management of inflammatory bowel disease.

    Science.gov (United States)

    Pedersen, Jannie; Coskun, Mehmet; Soendergaard, Christoffer; Salem, Mohammad; Nielsen, Ole Haagen

    2014-01-07

    Inflammatory bowel disease (IBD) is a group of chronic disorders of the gastrointestinal tract comprising Crohn's disease (CD) and ulcerative colitis (UC). Their etiologies are unknown, but they are characterised by an imbalanced production of pro-inflammatory mediators, e.g., tumor necrosis factor (TNF)-α, as well as increased recruitment of leukocytes to the site of inflammation. Advantages in understanding the role of the inflammatory pathways in IBD and an inadequate response to conventional therapy in a large portion of patients, has over the last two decades lead to new therapies which includes the TNF inhibitors (TNFi), designed to target and neutralise the effect of TNF-α. TNFi have shown to be efficient in treating moderate to severe CD and UC. However, convenient alternative therapeutics targeting other immune pathways are needed for patients with IBD refractory to conventional therapy including TNFi. Indeed, several therapeutics are currently under development, and have shown success in clinical trials. These include antibodies targeting and neutralising interleukin-12/23, small pharmacologic Janus kinase inhibitors designed to block intracellular signaling of several pro-inflammatory cytokines, antibodies targeting integrins, and small anti-adhesion molecules that block adhesion between leukocytes and the intestinal vascular endothelium, reducing their infiltration into the inflamed mucosa. In this review we have elucidated the major signaling pathways of clinical importance for IBD therapy and highlighted the new promising therapies available. As stated in this paper several new treatment options are under development for the treatment of CD and UC, however, no drug fits all patients. Hence, optimisations of treatment regimens are warranted for the benefit of the patients either through biomarker establishment or other rationales to maximise the effect of the broad range of mode-of-actions of the present and future drugs in IBD.

  15. Optimization on Extraction Engineering of the Anti - inflammatory Bioactive Materials from Ainsliaea Fragrans Champ

    Directory of Open Access Journals (Sweden)

    Yang Jie

    2016-01-01

    Full Text Available Ainsliaea fragrans Champ.(A.fragrans is a traditional Chinese herbal, phenolic compounds was the major anti - inflammatory bioactive constituents. To improve the bioavailability and enhanced the curative effect of A.fragrans, the anti - inflammatory effect of phenolic acids and the “non-active” group of control vectors constitute a new biomedical material, which is of great significance to the treatment of diseases inflammation. Hence, in this thesis, regarding the total phenolic acid transfer rate as the indicator, L9(34 orthogonal design was used to optimize the extraction process of total Phenolic acid from A.fragrans by reflux extraction method on solvent dosage, extraction times and extraction time.The optimal extraction technology was as follows: 15 times of water volume, reflux extraction 3 times, extraction time 60 min. The result of pharmacological activity indicated anti-inflammatory effect: 95% ethanol extraction > water extraction > 30% ethanol extraction > 60% ethanol extraction.

  16. House dust mite reduction and avoidance measures for treating eczema.

    Science.gov (United States)

    Nankervis, Helen; Pynn, Emma V; Boyle, Robert J; Rushton, Lesley; Williams, Hywel C; Hewson, Deanne M; Platts-Mills, Thomas

    2015-01-19

    Eczema is an inflammatory skin disease that tends to involve skin creases, such as the folds of the elbows or knees; it is an intensely itchy skin condition, which can relapse and remit over time. As many as a third of people with eczema who have a positive test for allergy to house dust mite have reported worsening of eczema or respiratory symptoms when exposed to dust. To assess the effects of all house dust mite reduction and avoidance measures for the treatment of eczema. We searched the following databases up to 14 August 2014: the Cochrane Skin Group Specialised Register, CENTRAL in The Cochrane Library (2014, Issue 8), MEDLINE (from 1946), Embase (from 1974), LILACS (from 1982), and the GREAT database. We also searched five trials registers and checked the reference lists of included and excluded studies for further references to relevant studies. We handsearched abstracts from international eczema and allergy meetings. Randomised controlled trials (RCTs) of any of the house dust mite reduction and avoidance measures for the treatment of eczema, which included participants of any age diagnosed by a clinician with eczema as defined by the World Allergy Organization. We included all non-pharmacological and pharmacological interventions that sought to reduce or avoid exposure to house dust mite and their allergenic faeces. The comparators were any active treatment, no treatment, placebo, or standard care only. Two authors independently checked the titles and abstracts identified, and there were no disagreements. We contacted authors of included studies for additional information. We assessed the risk of bias using Cochrane methodology. We included seven studies of 324 adults and children with eczema. Overall, the included studies had a high risk of bias. Four of the seven trials tested interventions with multiple components, and three tested a single intervention. Two of the seven trials included only children, four included children and adults, and one

  17. Interdependent Followers Prefer Avoidant Leaders: Followers’ Cultural Orientation Moderates Leaders’ Avoidance Relationships with Followers’ Work Outcomes

    Directory of Open Access Journals (Sweden)

    Konstantinos G. Kafetsios

    2018-03-01

    Full Text Available Several studies examining leader–follower interaction in Greece, a collectivistic culture, paradoxically find that leaders’ emotion suppression-related personality traits (attachment avoidance, emotion suppression, emotion control are associated with followers’ positive emotional and work attitude outcomes. These findings have been explained with reference to followers’ implicit cultural schemas, interdependence in particular. Yet, this conjuncture has not been directly tested. The present study directly examined, in a field setting, how followers’ independent and interdependent (cultural self-construal moderate the relationship between leaders’ attachment orientation and followers’ emotion and satisfaction outcomes at the work place. As hypothesized, leaders’ higher avoidance was associated with followers’ job satisfaction, group cohesion, and deep acting as well as lower negative affect and loneliness for followers higher on interdependent self-construal. The results underline perceptual processes involved in followers’ interdependent self-construal in relation to leaders’ emotion suppression-related traits.

  18. Vector Boson Scattering at High Mass

    CERN Document Server

    The ATLAS collaboration

    2009-01-01

    In the absence of a light Higgs boson, the mechanism of electroweak symmetry breaking will be best studied in processes of vector boson scattering at high mass. Various models predict resonances in this channel. Here, we investigate $WW $scalar and vector resonances, $WZ$ vector resonances and a $ZZ$ scalar resonance over a range of diboson centre-of-mass energies. Particular attention is paid to the application of forward jet tagging and to the reconstruction of dijet pairs with low opening angle resulting from the decay of highly boosted vector bosons. The performances of different jet algorithms are compared. We find that resonances in vector boson scattering can be discovered with a few tens of inverse femtobarns of integrated luminosity.

  19. Projection correlation between two random vectors.

    Science.gov (United States)

    Zhu, Liping; Xu, Kai; Li, Runze; Zhong, Wei

    2017-12-01

    We propose the use of projection correlation to characterize dependence between two random vectors. Projection correlation has several appealing properties. It equals zero if and only if the two random vectors are independent, it is not sensitive to the dimensions of the two random vectors, it is invariant with respect to the group of orthogonal transformations, and its estimation is free of tuning parameters and does not require moment conditions on the random vectors. We show that the sample estimate of the projection correction is [Formula: see text]-consistent if the two random vectors are independent and root-[Formula: see text]-consistent otherwise. Monte Carlo simulation studies indicate that the projection correlation has higher power than the distance correlation and the ranks of distances in tests of independence, especially when the dimensions are relatively large or the moment conditions required by the distance correlation are violated.

  20. Vector-Sensor MUSIC for Polarized Seismic Sources Localization

    Directory of Open Access Journals (Sweden)

    Jérôme I. Mars

    2005-01-01

    Full Text Available This paper addresses the problem of high-resolution polarized source detection and introduces a new eigenstructure-based algorithm that yields direction of arrival (DOA and polarization estimates using a vector-sensor (or multicomponent-sensor array. This method is based on separation of the observation space into signal and noise subspaces using fourth-order tensor decomposition. In geophysics, in particular for reservoir acquisition and monitoring, a set of Nx-multicomponent sensors is laid on the ground with constant distance Δx between them. Such a data acquisition scheme has intrinsically three modes: time, distance, and components. The proposed method needs multilinear algebra in order to preserve data structure and avoid reorganization. The data is thus stored in tridimensional arrays rather than matrices. Higher-order eigenvalue decomposition (HOEVD for fourth-order tensors is considered to achieve subspaces estimation and to compute the eigenelements. We propose a tensorial version of the MUSIC algorithm for a vector-sensor array allowing a joint estimation of DOA and signal polarization estimation. Performances of the proposed algorithm are evaluated.

  1. Leishmania development in sand flies: parasite-vector interactions overview.

    Science.gov (United States)

    Dostálová, Anna; Volf, Petr

    2012-12-03

    Leishmaniases are vector-borne parasitic diseases with 0.9 - 1.4 million new human cases each year worldwide. In the vectorial part of the life-cycle, Leishmania development is confined to the digestive tract. During the first few days after blood feeding, natural barriers to Leishmania development include secreted proteolytic enzymes, the peritrophic matrix surrounding the ingested blood meal and sand fly immune reactions. As the blood digestion proceeds, parasites need to bind to the midgut epithelium to avoid being excreted with the blood remnant. This binding is strictly stage-dependent as it is a property of nectomonad and leptomonad forms only. While the attachment in specific vectors (P. papatasi, P. duboscqi and P. sergenti) involves lipophosphoglycan (LPG), this Leishmania molecule is not required for parasite attachment in other sand fly species experimentally permissive for various Leishmania. During late-stage infections, large numbers of parasites accumulate in the anterior midgut and produce filamentous proteophosphoglycan creating a gel-like plug physically obstructing the gut. The parasites attached to the stomodeal valve cause damage to the chitin lining and epithelial cells of the valve, interfering with its function and facilitating reflux of parasites from the midgut. Transformation to metacyclic stages highly infective for the vertebrate host is the other prerequisite for effective transmission. Here, we review the current state of knowledge of molecular interactions occurring in all these distinct phases of parasite colonization of the sand fly gut, highlighting recent discoveries in the field.

  2. Vector sparse representation of color image using quaternion matrix analysis.

    Science.gov (United States)

    Xu, Yi; Yu, Licheng; Xu, Hongteng; Zhang, Hao; Nguyen, Truong

    2015-04-01

    Traditional sparse image models treat color image pixel as a scalar, which represents color channels separately or concatenate color channels as a monochrome image. In this paper, we propose a vector sparse representation model for color images using quaternion matrix analysis. As a new tool for color image representation, its potential applications in several image-processing tasks are presented, including color image reconstruction, denoising, inpainting, and super-resolution. The proposed model represents the color image as a quaternion matrix, where a quaternion-based dictionary learning algorithm is presented using the K-quaternion singular value decomposition (QSVD) (generalized K-means clustering for QSVD) method. It conducts the sparse basis selection in quaternion space, which uniformly transforms the channel images to an orthogonal color space. In this new color space, it is significant that the inherent color structures can be completely preserved during vector reconstruction. Moreover, the proposed sparse model is more efficient comparing with the current sparse models for image restoration tasks due to lower redundancy between the atoms of different color channels. The experimental results demonstrate that the proposed sparse image model avoids the hue bias issue successfully and shows its potential as a general and powerful tool in color image analysis and processing domain.

  3. Monoclonal antibody therapy of inflammatory bowel disease

    NARCIS (Netherlands)

    van Deventer, S. J.; Camoglio, L.

    1997-01-01

    Animal models of inflammatory bowel disease have provided insight in the regulation of mucosal inflammation. This has resulted in novel therapeutic approaches that specifically target a single inflammatory mediator. Monoclonal antibody therapy has been used in steroid refractory Crohn's disease

  4. AVOID BECOMING A VICTIM OF COUNTERFEIT ITEMS

    Energy Technology Data Exchange (ETDEWEB)

    WARRINER RD

    2011-07-13

    In today's globalized economy, we cannot live without imported products. Most people do not realize how thin the safety net of regulation and inspection really is. Less than three percent of imported products receive any form of government inspection prior to sale. Avoid flea markets, street vendors and deep discount stores. The sellers of counterfeit wares know where to market their products. They look for individuals who are hungry for a brand name item but do not want to pay a brand name price for it. The internet provides anonymity to the sellers of counterfeit products. Unlike Europe, U.S. law does not hold internet-marketing organizations, responsible for the quality of the products sold on their websites. These organizations will remove an individual vendor when a sufficient number of complaints are lodged, but they will not take responsibility for the counterfeit products you may have purchased. EBay has a number of counterfeit product guides to help you avoid being a victim of the sellers of these products. Ten percent of all medications taken worldwide are counterfeit. If you do buy medications on-line, be sure that the National Association of Boards of Pharmacy Verified Internet Pharmacy Practice Sites (VIPPS) recommends the pharmacy you choose to use. Inspect all medication purchases and report any change in color, shape, imprinting or odor to your pharmacist. If you take generic medications these attributes may change from one manufacturer to another. Your pharmacist should inform you of any changes when you refill your prescription. If they do not, get clarification prior to taking the medication. Please note that the Federal Drug Administration (FDA) does not regulate supplements. The FDA only steps in when a specific supplement proves to cause physical harm or contains a regulated ingredient. Due to counterfeiting, Underwriters Laboratories (UL) changed their label design three times since 1996. The new gold label should be attached to the cord

  5. How biological microtubules may avoid decoherence

    International Nuclear Information System (INIS)

    Hameroff, S.

    2005-01-01

    Full text: Entangled superpositions persisting for hundreds of milliseconds in protein assemblies such as microtubules (MTs) are proposed in biological functions, e.g. quantum computation relevant to consciousness in the Penrose-Hameroff 'Orch OR' model. Cylindrical polymers of the protein tubulin, MTs organize cell activities. The obvious question is how biological quantum states could avoid decoherence, e.g. in the brain at 37.6 degrees centigrade. Screening/sheelding: tubulin protein states/functions are governed by van der Waals London forces, quantum interactions among clouds of delocalizable electrons in nonpolar 'hydrophobic' intra-protein pockets screened from external van der Waals thermal interactions. Such pockets include amino acid resonance structures benzene and indole rings. (Anesthetic gases erase consciousness solely by interfering with London forces in hydrophobic pockets in various brain proteins). Hence tubulin states may act as superpositioned qubits also shielded at the MT level by counter-ion Debye plasma layers (due to charged C-termini tails on tubulin) and by water-ordering actin gels which embed MTs in a quasi-solid. Biological systems may also exploit thermodynamic gradients to give extremely low effective temperatures. Decoherence free subspaces: paradoxically, a system coupled strongly to its environment through certain degrees of freedom can effectively 'freeze' other degrees of freedom (quantum Zeno effect), enabling coherent superpositions and entanglement to persist. Metabolic energy supplied to MT collective dynamics (e.g. Froehlich coherence) can cause Bose-Einstein condenzation and counter decoherence as lasers avoid decoherence at room temperature. Topological quantum error correction: MT lattice structure reveals various helical winding paths through adjacent tubulins which follow the Fibonacci series. Propagation/interactions of quasi-particles along these paths may process information. As proposed by Kitaev (1997), various

  6. A New Paradigm for Evaluating Avoidance/Escape Motivation.

    Science.gov (United States)

    Tsutsui-Kimura, Iku; Bouchekioua, Youcef; Mimura, Masaru; Tanaka, Kenji F

    2017-07-01

    Organisms have evolved to approach pleasurable opportunities and to avoid or escape from aversive experiences. These 2 distinct motivations are referred to as approach and avoidance/escape motivations and are both considered vital for survival. Despite several recent advances in understanding the neurobiology of motivation, most studies addressed approach but not avoidance/escape motivation. Here we develop a new experimental paradigm to quantify avoidance/escape motivation and examine the pharmacological validity. We set up an avoidance variable ratio 5 task in which mice were required to press a lever for variable times to avoid an upcoming aversive stimulus (foot shock) or to escape the ongoing aversive event if they failed to avoid it. We i.p. injected ketamine (0, 1, or 5 mg/kg) or buspirone (0, 5, or 10 mg/kg) 20 or 30 minutes before the behavioral task to see if ketamine enhanced avoidance/escape behavior and buspirone diminished it as previously reported. We found that the performance on the avoidance variable ratio 5 task was sensitive to the intensity of the aversive stimulus. Treatment with ketamine increased while that with buspirone decreased the probability of avoidance from an aversive stimulus in the variable ratio 5 task, being consistent with previous reports. Our new paradigm will prove useful for quantifying avoidance/escape motivation and will contribute to a more comprehensive understanding of motivation. © The Author 2017. Published by Oxford University Press on behalf of CINP.

  7. Avoiding unfavorable results in postburn contracture hand

    Science.gov (United States)

    Bhattacharya, Sameek

    2013-01-01

    Deformities of the hands are a fairly common sequel of burn especially in the developing world. This is because of high incidence of burns, limited access to standard treatment and rehabilitation. The best outcome of a burnt hand is when deformities are prevented from developing. A good functional result is possible when due consideration is paid to hands during resuscitation, excisional surgery, reconstructive surgery and physiotherapy. The post-burns deformities of hand develop due direct thermal damage or secondary to intrinsic minus position due to oedema or vascular insufficiency. During the acute phase the concerns are, maintenance circulation minimize oedema prevent unphysiological positioning and wound closure with autogenous tissue as soon as possible. The rehabilitation program during the acute phase starts from day one and goes on till the hand has healed and has regained full range of motion. Full blown hand contractures are challenging to correct and become more difficult as time passes. Long-standing cases often land up with attenuation of extensor apparatus leading to swan neck and boutonniere deformity, muscle shortening and bony ankylosis. The major and most common pitfall after contracture release is relapse. The treatment protocol of contracture is solely directed towards countering this tendency. This article aims to guide a surgeon in obtaining optimal hand function and avoid pit falls at different stages of management of hand burns. The reasons of an unfavourable outcome of a burnt hand are possible lack of optimal care in the acute phase, while planning and performing reconstructive procedure and during aftercare and rehabilitation. PMID:24501479

  8. Current strategies to avoid misdiagnosis of malaria.

    Science.gov (United States)

    Hänscheid, T

    2003-06-01

    Malaria remains the most important parasitic disease, and tens of thousands of cases are imported into non-endemic countries annually. However, any single institution may see only a very few cases-this is probably the reason why laboratory and clinical misdiagnosis may not be uncommon. In the laboratory, unfamiliarity with microscopic diagnosis may be the main reason, considering the large number of laboratory staff who provide on-call services, often without expert help at hand, as well as the difficulty in detecting cases with low-level parasitemia. Staff should therefore be provided with continuing microscopic training to maintain proficiency. The complementary use of immunochromatographic rapid detection tests (RDTs) may be useful, especially during on-call hours, although, in order to ensure correct interpretation, their inherent limitations have to be well known. Diagnosis based on the polymerase chain reaction is still unsuitable for routine use, due to its long turnaround time, its cost, and its unavailability outside regular hours, although it may be helpful in selected cases. Once the alert clinician has considered the possibility of malaria, and suspicion continues to be high, malaria can be excluded by repeat smears or RDTs. However, the absence of clinical suspicion may not be infrequent, and may have more serious consequences. Depending on the local number of malaria cases seen, laboratory staff should have a low threshold for the decision to perform unsolicited malaria diagnostic tests on suspicious samples, especially if other laboratory tests are abnormal (e.g. thrombocytopenia, presence of atypical lymphocytes, or raised lactate dehydrogenase). The detection of intraleukocytic hemozoin during automated full blood counts is a promising new way to avoid misdiagnosis of clinically unsuspected malaria.

  9. Generation of arbitrary vector fields based on a pair of orthogonal elliptically polarized base vectors.

    Science.gov (United States)

    Xu, Danfeng; Gu, Bing; Rui, Guanghao; Zhan, Qiwen; Cui, Yiping

    2016-02-22

    We present an arbitrary vector field with hybrid polarization based on the combination of a pair of orthogonal elliptically polarized base vectors on the Poincaré sphere. It is shown that the created vector field is only dependent on the latitude angle 2χ but is independent on the longitude angle 2ψ on the Poincaré sphere. By adjusting the latitude angle 2χ, which is related to two identical waveplates in a common path interferometric arrangement, one could obtain arbitrary type of vector fields. Experimentally, we demonstrate the generation of such kind of vector fields and confirm the distribution of state of polarization by the measurement of Stokes parameters. Besides, we investigate the tight focusing properties of these vector fields. It is found that the additional degree of freedom 2χ provided by arbitrary vector field with hybrid polarization allows one to control the spatial structure of polarization and to engineer the focusing field.

  10. Vector 33: A reduce program for vector algebra and calculus in orthogonal curvilinear coordinates

    Science.gov (United States)

    Harper, David

    1989-06-01

    This paper describes a package with enables REDUCE 3.3 to perform algebra and calculus operations upon vectors. Basic algebraic operations between vectors and between scalars and vectors are provided, including scalar (dot) product and vector (cross) product. The vector differential operators curl, divergence, gradient and Laplacian are also defined, and are valid in any orthogonal curvilinear coordinate system. The package is written in RLISP to allow algebra and calculus to be performed using notation identical to that for operations. Scalars and vectors can be mixed quite freely in the same expression. The package will be of interest to mathematicians, engineers and scientists who need to perform vector calculations in orthogonal curvilinear coordinates.

  11. A Semi-Vectorization Algorithm to Synthesis of Gravitational Anomaly Quantities on the Earth

    Science.gov (United States)

    Abdollahzadeh, M.; Eshagh, M.; Najafi Alamdari, M.

    2009-04-01

    The Earth's gravitational potential can be expressed by the well-known spherical harmonic expansion. The computational time of summing up this expansion is an important practical issue which can be reduced by an efficient numerical algorithm. This paper proposes such a method for block-wise synthesizing the anomaly quantities on the Earth surface using vectorization. Fully-vectorization means transformation of the summations to the simple matrix and vector products. It is not a practical for the matrices with large dimensions. Here a semi-vectorization algorithm is proposed to avoid working with large vectors and matrices. It speeds up the computations by using one loop for the summation either on degrees or on orders. The former is a good option to synthesize the anomaly quantities on the Earth surface considering a digital elevation model (DEM). This approach is more efficient than the two-step method which computes the quantities on the reference ellipsoid and continues them upward to the Earth surface. The algorithm has been coded in MATLAB which synthesizes a global grid of 5′Ã- 5′ (corresponding 9 million points) of gravity anomaly or geoid height using a geopotential model to degree 360 in 10000 seconds by an ordinary computer with 2G RAM.

  12. Replication-competent human adenovirus 11p vectors can propagate in Vero cells

    International Nuclear Information System (INIS)

    Gokumakulapalle, Madhuri; Mei, Ya-Fang

    2016-01-01

    The use of continuous cell lines derived from the African green monkey kidney (AGMK) has led to major advances in virus vaccine development. However, to date, these cells have not been used to facilitate the creation of human adenoviruses because most human adenoviruses undergo abortive infections in them. Here, we report the susceptibility of AGMK-derived cells to adenovirus 11p (Ad11p) infection. First, we showed that CD46 molecules, which act as receptors for Ad11p, are expressed in AGMK cells. We then monitored Ad11p replication by measuring GFP expression as an indicator of viral transcription. We found that AGMK-derived cells were as capable as carcinoma cells at propagating full-length replication-competent Ad11p (RCAd11p) DNA. Of the AGMK cell lines tested, Vero cells had the greatest capacity for adenovirus production. Thus, AGMK cells can be used to evaluate RCAd11p-mediated gene delivery, and Vero cells can be used for the production of RCAd11pGFP vectors at relatively high yields. - Highlights: • Africa green monkey cell lines were monitored for human adenovirus 11p GFP vector infection. • Human CD46 molecules were detectable in these monkey cell lines. • Adenovirus 11p GFP vector can be propagated in Vero cells increases the safety of Ad11p-based vectors for clinical trials. • To use Vero cells for preparation of Ad11p vector avoids the potential inclusion of oncogenes from tumor cells.

  13. Replication-competent human adenovirus 11p vectors can propagate in Vero cells

    Energy Technology Data Exchange (ETDEWEB)

    Gokumakulapalle, Madhuri; Mei, Ya-Fang, E-mail: ya-fang.mei@umu.se

    2016-08-15

    The use of continuous cell lines derived from the African green monkey kidney (AGMK) has led to major advances in virus vaccine development. However, to date, these cells have not been used to facilitate the creation of human adenoviruses because most human adenoviruses undergo abortive infections in them. Here, we report the susceptibility of AGMK-derived cells to adenovirus 11p (Ad11p) infection. First, we showed that CD46 molecules, which act as receptors for Ad11p, are expressed in AGMK cells. We then monitored Ad11p replication by measuring GFP expression as an indicator of viral transcription. We found that AGMK-derived cells were as capable as carcinoma cells at propagating full-length replication-competent Ad11p (RCAd11p) DNA. Of the AGMK cell lines tested, Vero cells had the greatest capacity for adenovirus production. Thus, AGMK cells can be used to evaluate RCAd11p-mediated gene delivery, and Vero cells can be used for the production of RCAd11pGFP vectors at relatively high yields. - Highlights: • Africa green monkey cell lines were monitored for human adenovirus 11p GFP vector infection. • Human CD46 molecules were detectable in these monkey cell lines. • Adenovirus 11p GFP vector can be propagated in Vero cells increases the safety of Ad11p-based vectors for clinical trials. • To use Vero cells for preparation of Ad11p vector avoids the potential inclusion of oncogenes from tumor cells.

  14. Monoclonal antibody therapy of inflammatory bowel disease

    NARCIS (Netherlands)

    van Deventer, S. J.; Camoglio, L.

    1996-01-01

    Several anti-inflammatory drugs have therapeutic efficacy in inflammatory bowel disease, but their targets remain incompletely characterized. The development of monoclonal antibodies that either recognize epitopes on immune-competent cells, or neutralize pro-inflammatory cytokines, has helped to

  15. Image Coding Based on Address Vector Quantization.

    Science.gov (United States)

    Feng, Yushu

    Image coding is finding increased application in teleconferencing, archiving, and remote sensing. This thesis investigates the potential of Vector Quantization (VQ), a relatively new source coding technique, for compression of monochromatic and color images. Extensions of the Vector Quantization technique to the Address Vector Quantization method have been investigated. In Vector Quantization, the image data to be encoded are first processed to yield a set of vectors. A codeword from the codebook which best matches the input image vector is then selected. Compression is achieved by replacing the image vector with the index of the code-word which produced the best match, the index is sent to the channel. Reconstruction of the image is done by using a table lookup technique, where the label is simply used as an address for a table containing the representative vectors. A code-book of representative vectors (codewords) is generated using an iterative clustering algorithm such as K-means, or the generalized Lloyd algorithm. A review of different Vector Quantization techniques are given in chapter 1. Chapter 2 gives an overview of codebook design methods including the Kohonen neural network to design codebook. During the encoding process, the correlation of the address is considered and Address Vector Quantization is developed for color image and monochrome image coding. Address VQ which includes static and dynamic processes is introduced in chapter 3. In order to overcome the problems in Hierarchical VQ, Multi-layer Address Vector Quantization is proposed in chapter 4. This approach gives the same performance as that of the normal VQ scheme but the bit rate is about 1/2 to 1/3 as that of the normal VQ method. In chapter 5, a Dynamic Finite State VQ based on a probability transition matrix to select the best subcodebook to encode the image is developed. In chapter 6, a new adaptive vector quantization scheme, suitable for color video coding, called "A Self -Organizing

  16. Vector-like quarks: t’ and partners

    International Nuclear Information System (INIS)

    PANIZZI, L.

    2014-01-01

    Vector-like quarks are predicted in various scenarios of new physics, and their peculiar signatures from both pair and single production have been already investigated in detail. However no signals of vector-like quarks have been detected so far, pushing limits on their masses above 600–700GeV, depending on assumptions on their couplings. Experimental searches consider specific final states to pose bounds on the mass of a vector-like quark, usually assuming it is the only particle that contributes to the signal of new physics in that specific final state. However, realistic scenarios predict the existence of multiple vector-like quarks, possibly with similar masses. The reinterpretation of mass bounds from experimental searches is therefore not always straightforward. In this analysis I briefly summarise the constraints on vector-like quarks and their possible signatures at the LHC, focusing in particular on a model-independent description of single production processes for vector-like quark that mix with all generations and on the development of a framework to study scenarios with multiple vector-like quarks.

  17. Correlated Topic Vector for Scene Classification.

    Science.gov (United States)

    Wei, Pengxu; Qin, Fei; Wan, Fang; Zhu, Yi; Jiao, Jianbin; Ye, Qixiang

    2017-07-01

    Scene images usually involve semantic correlations, particularly when considering large-scale image data sets. This paper proposes a novel generative image representation, correlated topic vector, to model such semantic correlations. Oriented from the correlated topic model, correlated topic vector intends to naturally utilize the correlations among topics, which are seldom considered in the conventional feature encoding, e.g., Fisher vector, but do exist in scene images. It is expected that the involvement of correlations can increase the discriminative capability of the learned generative model and consequently improve the recognition accuracy. Incorporated with the Fisher kernel method, correlated topic vector inherits the advantages of Fisher vector. The contributions to the topics of visual words have been further employed by incorporating the Fisher kernel framework to indicate the differences among scenes. Combined with the deep convolutional neural network (CNN) features and Gibbs sampling solution, correlated topic vector shows great potential when processing large-scale and complex scene image data sets. Experiments on two scene image data sets demonstrate that correlated topic vector improves significantly the deep CNN features, and outperforms existing Fisher kernel-based features.

  18. Missed breast carcinoma; why and how to avoid?

    International Nuclear Information System (INIS)

    Kamal, R.; Abdel Razek, N.M.; Hassan, M.A.; Shaalan, M.A.

    2007-01-01

    Despite the advances in mammography techniques, it still has a number of limitations. It is estimated that about 10 to 25% of lesions are overlooked in mammograms out of which about two thirds are detected retrospectively by radiologists and oncologists. Causes of missed breast cancer on mammography can be secondary to many factors including those related to the patient (whether inherent or acquired), the nature of the malignant mass itself, poor mammographic techniques, provider factors or interpretive skills of radiologists and oncologists (including perception and interpretation errors). Aim of Work: The aim of this study is to investigate the aforementioned factors hindering early breast cancer detection and in turn lowering mammographic sensitivity and to outline the major guidelines to overcome these factors aiming to an optimum mammographic examination and interpretation by radiologists and oncologists. Subject and Methods: We conducted this multicenter study over a two-year interval. We included 152 histo-pathological proven breast carcinomas that were initially missed on mammography. The cases were subjected to mammography, complementary US, MRI and digital mammography in some cases and all cases were histo-pathologically proven either by FNAB, CNB or open biopsy. Results: Revision of the pathological specimens of these 152 cases revealed 121 infiltrating ductal carcinomas, 2 lobular, 4 mucinous, 14 inflammatory carcinomas, 6 carcinomas in situ (3 of which were intracystic), 2 intraductal papillary carcinomas and 3 cases with Paget's disease of the nipple. In analyzing the causes responsible for misdiagnosis of these carcinomas we classified them into 4 causative factors; patient, tumor, technical or provider factors. Tumor factors were the most commonly encountered, accounting for 44. I %, while provider factors were the least commonly encountered in 14.5%. Carcino- mas were detected using several individual or combined complementary techniques. These

  19. A chance to avoid mistakes human error

    International Nuclear Information System (INIS)

    Amaro, Pablo; Obeso, Eduardo; Gomez, Ruben

    2010-01-01

    Trying to give an answer to the lack of public information in the industry, in relationship with the different tools that are managed in the nuclear industry for minimizing the human error, a group of workers from different sections of the St. Maria de Garona NPP (Quality Assurance/ Organization and Human Factors) decided to embark on a challenging and exciting project: 'Write a book collecting all the knowledge accumulated during their daily activities, very often during lecture time of external information received from different organizations within the nuclear industry (INPO, WANO...), but also visiting different NPP's, maintaining meetings and participating in training courses related de Human and Organizational Factors'. Main objective of the book is presenting to the industry in general, the different tools that are used and fostered in the nuclear industry, in a practical way. In this way, the assimilation and implementation in others industries could be possible and achievable in and efficient context. One year of work, and our project is a reality. We have presented and abstract during the last Spanish Nuclear Society meeting in Sevilla, last October...and the best, the book is into the market for everybody in web-site: www.bubok.com. The book is structured in the following areas: 'Errare humanum est': Trying to present what is the human error to the reader, its origin and the different barriers. The message is that the reader see the error like something continuously present in our lives... even more frequently than we think. Studying its origin can be established aimed at barriers to avoid or at least minimize it. 'Error's bitter face': Shows the possible consequences of human errors. What better that presenting real experiences that have occurred in the industry. In the book, accidents in the nuclear industry, like Tree Mile Island NPP, Chernobyl NPP, and incidents like Davis Besse NPP in the past, helps to the reader to make a reflection about the

  20. Towards better patient care: drugs to avoid.

    Science.gov (United States)

    2013-04-01

    Common sense dictates that one should choose tried and tested drugs with proven, concrete benefits that outweigh their adverse effects. Many new drugs are approved each year, often despite a lack of solid evidence that they are any better than existing treatments. Worse, some are approved despite being less effective or more harmful than current options. Massive promotion is used to ensure that such drugs achieve a positive image in the eyes of healthcare professionals and patients. Renowned "opinion leaders" intervene in their favour at conferences and in specialist media, and their opinions are further propagated by specialists in the field. Finally, campaigns in the lay media are used to highlight the target illness, encouraging patients to request a prescription. New data sometimes show that older, initially promising drugs are less effective or more harmful than first thought. For all these reasons, many drugs that are now present on the market are more harmful than beneficial and should be avoided. Unfortunately, negative assessment data and warnings are often drowned in the flood of promotion and advertising. Front-line healthcare professionals who are determined to act in their patients' best interests can find themselves swimming against a tide of specialist opinion, marketing authorisation, and reimbursement decisions. By leaving drugs that are more harmful than beneficial on the market and contenting themselves with simple half-measures, healthcare authorities are failing in their duty to protect patients. Prescrire, a journal funded solely by its subscribers, does not seek to do the work of health authorities, and does not have the means to do so. Prescrire's goal is simply to help healthcare professionals provide better care. The following text lists the principal drugs that we consider more harmful than beneficial, based on our reviews published between 2010 and 2012 in our French edition. These drugs should not be used. Patients and healthcare