WorldWideScience

Sample records for visual secret sharing

  1. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  2. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  3. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  4. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  5. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  6. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  7. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  8. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  9. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  10. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  11. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  12. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  13. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  14. On alternative approach for verifiable secret sharing

    OpenAIRE

    Kulesza, Kamil; Kotulski, Zbigniew; Pieprzyk, Joseph

    2002-01-01

    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.

  15. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  16. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  17. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  18. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  19. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  20. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  1. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  2. Quantum secret sharing with classical Bobs

    International Nuclear Information System (INIS)

    Li Lvzhou; Qiu Daowen; Mateus, Paulo

    2013-01-01

    Boyer et al (2007 Phys. Rev. Lett. 99 140501) proposed a novel idea of semi-quantum key distribution, where a key can be securely distributed between Alice, who can perform any quantum operation, and Bob, who is classical. Extending the ‘semi-quantum’ idea to other tasks of quantum information processing is of interest and worth considering. In this paper, we consider the issue of semi-quantum secret sharing, where a quantum participant Alice can share a secret key with two classical participants, Bobs. After analyzing the existing protocol, we propose a new protocol of semi-quantum secret sharing. Our protocol is more realistic, since it utilizes product states instead of entangled states. We prove that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate users could notice. (paper)

  3. Applying secret sharing for HIS backup exchange.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  4. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  5. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  6. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  7. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  8. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  9. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  10. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  11. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  12. Halftone visual cryptography.

    Science.gov (United States)

    Zhou, Zhi; Arce, Gonzalo R; Di Crescenzo, Giovanni

    2006-08-01

    Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.

  13. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  14. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  15. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  16. Comment on "Dynamic quantum secret sharing"

    Science.gov (United States)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  17. The Future Internet: A World of Secret Shares

    Directory of Open Access Journals (Sweden)

    William J. Buchanan

    2015-11-01

    Full Text Available The Public Key Infrastructure (PKI is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.

  18. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  19. Some directions beyond traditional quantum secret sharing

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sudhir Kumar [Department of Electrical Engineering, University of California, Los Angeles, CA 90095 (United States); Srikanth, R [Poornaprajna Institute of Scientific Research, Devanahalli, Bangalore 562 110 (India)], E-mail: suds@ee.ucla.edu, E-mail: srik@rri.res.in

    2008-06-15

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than {lambda}-1 withheld shares are required, where {lambda} is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.

  20. Some directions beyond traditional quantum secret sharing

    International Nuclear Information System (INIS)

    Singh, Sudhir Kumar; Srikanth, R

    2008-01-01

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than λ-1 withheld shares are required, where λ is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD

  1. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Bloch Matthieu

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  2. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  3. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  4. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  5. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  6. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  7. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  8. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  9. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  10. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  11. Adaptive Secret Sharing for Color Images

    Directory of Open Access Journals (Sweden)

    Jia-Hong Li

    2011-10-01

    Full Text Available A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold. Moreover, there are some necessary details of concerns: the malicious tampering on shadows must be detectable; the shadows must be concealed in a camouflage image with adequate quality to reduce suspicion and possible attack; color image properties must be considered. In addition to these concerns, in this paper, an adaptable mechanism is further designed to balance the hiding quantity and the quality of camouflage images depending on different applications.This is an important and interesting aspect that has never been discussed in previous research.

  12. Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement'

    International Nuclear Information System (INIS)

    Li, C.-M.; Hwang, T.; Chang, C.-C.

    2006-01-01

    Recently, Yan and Gao [Phys. Rev. A 72, 012304 (2005)] presented a quantum secret sharing protocol which allows a secret message to be shared between two groups of parties (m parties in group 1 and n parties in group 2). Their protocol is claimed to be secure that, except with the cooperation of the entire group 1 or group 2, no subgroup of either group 1 or group 2 can extract the secret message. However, this study points out that the mth party (the last party to process the quantum state) of group 1 can maliciously replace the secret message with an arbitrary message without the detection of the other parties

  13. Unified criterion for security of secret sharing in terms of violation of Bell inequalities

    International Nuclear Information System (INIS)

    Sen, Aditi; Sen, Ujjwal; Zukowski, Marek

    2003-01-01

    In secret sharing protocols, a secret is to be distributed among several partners such that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations is shown from the perspective of violation of local realism, and also by showing that its higher-order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations)

  14. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  15. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  16. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  17. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  18. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  19. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  20. Cryptanalysis of quantum secret sharing based on GHZ states

    International Nuclear Information System (INIS)

    Liu Xiaofen; Pan Rijing

    2011-01-01

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  1. Secret sharing via quantum entanglement

    International Nuclear Information System (INIS)

    Hillery, M.; Buzek, V.

    1999-01-01

    Secret sharing is a procedure for splitting a message into several parts so that no single part is sufficient to read the message, but the entire set is. This procedure can be implemented using either GHZ states or two-particle entangled states. In the quantum case the presence of an eavesdropper will introduce errors so that her presence can be detected. We also discuss how quantum information can be split into parts so that the message can be reconstructed from a sufficiently large subset of the parts. (Authors)

  2. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  3. Cryptanalysis of quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaofen; Pan Rijing, E-mail: liuxiaofen23@fjnu.edu.cn [School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007 (China)

    2011-10-15

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  4. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  5. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  6. Simulating cloud environment for HIS backup using secret sharing.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto

    2013-01-01

    In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.

  7. Type VI Secretion System Toxins Horizontally Shared between Marine Bacteria.

    Directory of Open Access Journals (Sweden)

    Dor Salomon

    2015-08-01

    Full Text Available The type VI secretion system (T6SS is a widespread protein secretion apparatus used by Gram-negative bacteria to deliver toxic effector proteins into adjacent bacterial or host cells. Here, we uncovered a role in interbacterial competition for the two T6SSs encoded by the marine pathogen Vibrio alginolyticus. Using comparative proteomics and genetics, we identified their effector repertoires. In addition to the previously described effector V12G01_02265, we identified three new effectors secreted by T6SS1, indicating that the T6SS1 secretes at least four antibacterial effectors, of which three are members of the MIX-effector class. We also showed that the T6SS2 secretes at least three antibacterial effectors. Our findings revealed that many MIX-effectors belonging to clan V are "orphan" effectors that neighbor mobile elements and are shared between marine bacteria via horizontal gene transfer. We demonstrated that a MIX V-effector from V. alginolyticus is a functional T6SS effector when ectopically expressed in another Vibrio species. We propose that mobile MIX V-effectors serve as an environmental reservoir of T6SS effectors that are shared and used to diversify antibacterial toxin repertoires in marine bacteria, resulting in enhanced competitive fitness.

  8. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  9. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  10. Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Fu-Chen, Zhu

    2008-01-01

    Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes

  11. Proof of the insecurity of quantum secret sharing based on the Smolin bound entangled states

    International Nuclear Information System (INIS)

    Ya-Fei, Yu; Zhi-Ming, Zhang

    2009-01-01

    This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given. (general)

  12. Multiparty quantum secret sharing of classical messages based on entanglement swapping

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao

    2005-01-01

    A multiparty quantum secret sharing (QSS) protocol of classical messages (i.e., classical bits) is proposed by using swapping quantum entanglement of Bell states. The secret messages are imposed on Bell states by local unitary operations. The secret messages are split into several parts, and each part is distributed to a separate party so that no action of a subset of all the parties without the cooperation of the entire group is able to read out the secret messages. In addition, dense coding is used in this protocol to achieve a high efficiency. The security of the present multiparty QSS against eavesdropping has been analyzed and confirmed even in a noisy quantum channel

  13. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  14. Visualization of glucagon secretion from pancreatic α cells by bioluminescence video microscopy: Identification of secretion sites in the intercellular contact regions

    International Nuclear Information System (INIS)

    Yokawa, Satoru; Suzuki, Takahiro; Inouye, Satoshi; Inoh, Yoshikazu; Suzuki, Ryo; Kanamori, Takao; Furuno, Tadahide; Hirashima, Naohide

    2017-01-01

    We have firstly visualized glucagon secretion using a method of video-rate bioluminescence imaging. The fusion protein of proglucagon and Gaussia luciferase (PGCG-GLase) was used as a reporter to detect glucagon secretion and was efficiently expressed in mouse pancreatic α cells (αTC1.6) using a preferred human codon-optimized gene. In the culture medium of the cells expressing PGCG-GLase, luminescence activity determined with a luminometer was increased with low glucose stimulation and KCl-induced depolarization, as observed for glucagon secretion. From immunochemical analyses, PGCG-GLase stably expressed in clonal αTC1.6 cells was correctly processed and released by secretory granules. Luminescence signals of the secreted PGCG-GLase from the stable cells were visualized by video-rate bioluminescence microscopy. The video images showed an increase in glucagon secretion from clustered cells in response to stimulation by KCl. The secretory events were observed frequently at the intercellular contact regions. Thus, the localization and frequency of glucagon secretion might be regulated by cell-cell adhesion. - Highlights: • The fused protein of proglucagon to Gaussia luciferase was used as a reporter. • The fusion protein was highly expressed using a preferred human-codon optimized gene. • Glucagon secretion stimulated by depolarization was determined by luminescence. • Glucagon secretion in α cells was visualized by bioluminescence imaging. • Glucagon secretion sites were localized in the intercellular contact regions.

  15. Multiparty quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Tzonelih; Hwang, Cheng-Chieh [Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, 701 Taiwan (China); Li, Chuan-Ming, E-mail: hwangtl@ismail.csie.ncku.edu.tw [Department of Information Management, Shu-Zen College of Medicine and Management, Kaohsiung, 821 Taiwan (China)

    2011-04-15

    Gao (2009 Commun. Theor. Phys. 52 421-4) has proposed an efficient multiparty quantum secret sharing (MQSS) with two-photon three-dimensional Einstein-Podolsky-Rosen (EPR) pairs. This work shows that a similar idea can also be used to construct an MQSS using the Greenberger-Horne-Zeilinger (GHZ) states. Compared to other MQSSs using GHZ-related states, the newly proposed protocol is more efficient in the aspect of qubit utilization.

  16. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  17. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  18. Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement

    International Nuclear Information System (INIS)

    Han Lianfang; Liu Yimin; Shi Shouhua; Zhang Zhanjun

    2007-01-01

    Recently Yan and Gao [F.L. Yan, T. Gao, Phys. Rev. A 72 (2005) 012304] have proposed a quantum secret sharing protocol which allows a secret message to be shared between one group of m parties and another group of n parties. The protocol is claimed to be secure. In this Letter, first we show that any subgroup consisting of evil cooperative parties (or one and only one evil party) can successfully cheat other parties to obtain the secret message without being detected. Then we improve the original Yan-Gao protocol such that the insider's cheats are prevented

  19. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  20. Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

    International Nuclear Information System (INIS)

    Xia Yan; Song Jie; Song Heshan; Huang Xiaoli

    2008-01-01

    We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles to check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message

  1. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  2. Detector-device-independent quantum secret sharing with source flaws.

    Science.gov (United States)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  3. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  4. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  5. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  6. A note on Wang et al's attack on Zhang et al's multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    Gao Gan

    2012-01-01

    Recently, Wang et al (2008 Phys. Lett. A 373 65) proposed an attack on Zhang et al's (2007 Opt. Commun. 269 418) multiparty quantum secret sharing scheme, in which the first and the last agent are reported to be able to cooperatively eavesdrop on all the secret messages without being detected. In this paper, we show that in Wang et al's attack, on average no more than half the secret messages can be eavesdropped. (paper)

  7. Accessibility of Shared Space by Visually Challenged People

    NARCIS (Netherlands)

    Melis-Dankers, Bart J.M.; Havik, Else M.; Steyvers, Frank J.J.M.; Petrie, Helen; Kooijman, Aart C.; Kouroupetroglou, Georgios

    Shared Space is a concept that comprises the design of a public space. There are concerns about the accessibility of Shared Spaces for people who are visually challenged. In this paper we give a systematic overview of the appearance of Shared Spaces in the Netherlands and the consequences that these

  8. Color extended visual cryptography using error diffusion.

    Science.gov (United States)

    Kang, InKoo; Arce, Gonzalo R; Lee, Heung-Kyu

    2011-01-01

    Color visual cryptography (VC) encrypts a color secret message into n color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.

  9. Visualization and characterization of individual type III protein secretion machines in live bacteria.

    Science.gov (United States)

    Zhang, Yongdeng; Lara-Tejero, María; Bewersdorf, Jörg; Galán, Jorge E

    2017-06-06

    Type III protein secretion machines have evolved to deliver bacterially encoded effector proteins into eukaryotic cells. Although electron microscopy has provided a detailed view of these machines in isolation or fixed samples, little is known about their organization in live bacteria. Here we report the visualization and characterization of the Salmonella type III secretion machine in live bacteria by 2D and 3D single-molecule switching superresolution microscopy. This approach provided access to transient components of this machine, which previously could not be analyzed. We determined the subcellular distribution of individual machines, the stoichiometry of the different components of this machine in situ, and the spatial distribution of the substrates of this machine before secretion. Furthermore, by visualizing this machine in Salmonella mutants we obtained major insights into the machine's assembly. This study bridges a major resolution gap in the visualization of this nanomachine and may serve as a paradigm for the examination of other bacterially encoded molecular machines.

  10. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  11. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  12. Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States

    International Nuclear Information System (INIS)

    Xie Deng; Ye Mingyong; Li Xinghua

    2011-01-01

    Inspired by the protocol presented by Bagherinezhad and Karimipour [Phys. Rev. A 67 (2003) 044302], which will be shown to be insecure, we present a multipartite quantum secret sharing protocol using reusable Greenberger-Horne-Zeilinger (GHZ) states. This protocol is robust against eavesdropping and could be used for the circumstance of many parties. (general)

  13. Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

    International Nuclear Information System (INIS)

    Lai Hong; Tao Li; Liu Zhi-Ming; Luo Ming-Xing; Pieprzyk, Josef; Orgun, Mehmet A.

    2016-01-01

    In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. (paper)

  14. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  15. Graphical Visualization on Computational Simulation Using Shared Memory

    International Nuclear Information System (INIS)

    Lima, A B; Correa, Eberth

    2014-01-01

    The Shared Memory technique is a powerful tool for parallelizing computer codes. In particular it can be used to visualize the results ''on the fly'' without stop running the simulation. In this presentation we discuss and show how to use the technique conjugated with a visualization code using openGL

  16. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  17. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  18. Multiparty quantum secret sharing of secure direct communication

    International Nuclear Information System (INIS)

    Zhang Zhanjun

    2005-01-01

    Based on the two-step protocol [F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68 (2003) 042317], we propose a (n,n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol, the sender's secure direct communication message can be extracted only if all the sharers collaborate. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considerably reduce the realization difficulty in experiment. In contrast to the use of multi-particle GHZ states in the case that the sharer number is larger than 3, the use and identification of Bell states are enough in our two protocols disregarding completely the sharer number, hence, our protocols are more feasible in technique

  19. Algebra for applications cryptography, secret sharing, error-correcting, fingerprinting, compression

    CERN Document Server

    Slinko, Arkadii

    2015-01-01

    This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

  20. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  1. Accessibility of shared space for visually impaired persons : A comparative field study

    NARCIS (Netherlands)

    Havik, Else; Steyvers, Franciscus J.J.M.; Kooijman, Aart; Melis, Bart

    Shared Space is a concept that comprises the design and planning process of a public space. There are concerns about the accessibility of Shared Spaces for people who are visually impaired. In a comparative field study, the wayfinding performance of 25 visually impaired persons (VIPs) was observed

  2. Shared filtering processes link attentional and visual short-term memory capacity limits.

    Science.gov (United States)

    Bettencourt, Katherine C; Michalka, Samantha W; Somers, David C

    2011-09-30

    Both visual attention and visual short-term memory (VSTM) have been shown to have capacity limits of 4 ± 1 objects, driving the hypothesis that they share a visual processing buffer. However, these capacity limitations also show strong individual differences, making the degree to which these capacities are related unclear. Moreover, other research has suggested a distinction between attention and VSTM buffers. To explore the degree to which capacity limitations reflect the use of a shared visual processing buffer, we compared individual subject's capacities on attentional and VSTM tasks completed in the same testing session. We used a multiple object tracking (MOT) and a VSTM change detection task, with varying levels of distractors, to measure capacity. Significant correlations in capacity were not observed between the MOT and VSTM tasks when distractor filtering demands differed between the tasks. Instead, significant correlations were seen when the tasks shared spatial filtering demands. Moreover, these filtering demands impacted capacity similarly in both attention and VSTM tasks. These observations fail to support the view that visual attention and VSTM capacity limits result from a shared buffer but instead highlight the role of the resource demands of underlying processes in limiting capacity.

  3. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  4. SCSODC: Integrating Ocean Data for Visualization Sharing and Application

    Science.gov (United States)

    Xu, C.; Li, S.; Wang, D.; Xie, Q.

    2014-02-01

    The South China Sea Ocean Data Center (SCSODC) was founded in 2010 in order to improve collecting and managing of ocean data of the South China Sea Institute of Oceanology (SCSIO). The mission of SCSODC is to ensure the long term scientific stewardship of ocean data, information and products - collected through research groups, monitoring stations and observation cruises - and to facilitate the efficient use and distribution to possible users. However, data sharing and applications were limited due to the characteristics of distribution and heterogeneity that made it difficult to integrate the data. To surmount those difficulties, the Data Sharing System has been developed by the SCSODC using the most appropriate information management and information technology. The Data Sharing System uses open standards and tools to promote the capability to integrate ocean data and to interact with other data portals or users and includes a full range of processes such as data discovery, evaluation and access combining C/S and B/S mode. It provides a visualized management interface for the data managers and a transparent and seamless data access and application environment for users. Users are allowed to access data using the client software and to access interactive visualization application interface via a web browser. The architecture, key technologies and functionality of the system are discussed briefly in this paper. It is shown that the system of SCSODC is able to implement web visualization sharing and seamless access to ocean data in a distributed and heterogeneous environment.

  5. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  6. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    International Nuclear Information System (INIS)

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-01-01

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack

  7. SCSODC: Integrating Ocean Data for Visualization Sharing and Application

    International Nuclear Information System (INIS)

    Xu, C; Xie, Q; Li, S; Wang, D

    2014-01-01

    The South China Sea Ocean Data Center (SCSODC) was founded in 2010 in order to improve collecting and managing of ocean data of the South China Sea Institute of Oceanology (SCSIO). The mission of SCSODC is to ensure the long term scientific stewardship of ocean data, information and products – collected through research groups, monitoring stations and observation cruises – and to facilitate the efficient use and distribution to possible users. However, data sharing and applications were limited due to the characteristics of distribution and heterogeneity that made it difficult to integrate the data. To surmount those difficulties, the Data Sharing System has been developed by the SCSODC using the most appropriate information management and information technology. The Data Sharing System uses open standards and tools to promote the capability to integrate ocean data and to interact with other data portals or users and includes a full range of processes such as data discovery, evaluation and access combining C/S and B/S mode. It provides a visualized management interface for the data managers and a transparent and seamless data access and application environment for users. Users are allowed to access data using the client software and to access interactive visualization application interface via a web browser. The architecture, key technologies and functionality of the system are discussed briefly in this paper. It is shown that the system of SCSODC is able to implement web visualization sharing and seamless access to ocean data in a distributed and heterogeneous environment

  8. Time-sharing visual and auditory tracking tasks

    Science.gov (United States)

    Tsang, Pamela S.; Vidulich, Michael A.

    1987-01-01

    An experiment is described which examined the benefits of distributing the input demands of two tracking tasks as a function of task integrality. Visual and auditory compensatory tracking tasks were utilized. Results indicate that presenting the two tracking signals in two input modalities did not improve time-sharing efficiency. This was attributed to the difficulty insensitivity phenomenon.

  9. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  10. Cheating prevention in visual cryptography.

    Science.gov (United States)

    Hu, Chih-Ming; Tzeng, Wen-Guey

    2007-01-01

    Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.

  11. Quantum secret sharing based on modulated high-dimensional time-bin entanglement

    International Nuclear Information System (INIS)

    Takesue, Hiroki; Inoue, Kyo

    2006-01-01

    We propose a scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,π}, a sender with the entanglement source can randomly change the sign of the correlation of the measurement outcomes obtained by two distant recipients. The two recipients must cooperate if they are to obtain the sign of the correlation, which is used as a secret key. We show that our scheme is secure against intercept-and-resend (IR) and beam splitting attacks by an outside eavesdropper thanks to the nonorthogonality of high-dimensional time-bin entangled states. We also show that a cheating attempt based on an IR attack by one of the recipients can be detected by changing the dimension of the time-bin entanglement randomly and inserting two 'vacant' slots between the packets. Then, cheating attempts can be detected by monitoring the count rate in the vacant slots. The proposed scheme has better experimental feasibility than previously proposed entanglement-based QSS schemes

  12. Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States

    International Nuclear Information System (INIS)

    Wang Zhangyin; Yuan Hao; Gao Gan; Shi Shouhua

    2006-01-01

    We present a robust (n,n)-threshold scheme for multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states. In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.

  13. Comment on "Cheating prevention in visual cryptography".

    Science.gov (United States)

    Chen, Yu-Chi; Horng, Gwoboa; Tsai, Du-Shiau

    2012-07-01

    Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.

  14. Accessibility of Shared Space for visually impaired persons : An inventory in the Netherlands

    NARCIS (Netherlands)

    Havik, Else M; Melis - Dankers, Bart JM; Steyvers, Frank JJM; Kooijman, Aart C

    Shared Space is a concept that comprises the design and planning process of a public space. There are concerns about the accessibility of Shared Spaces for people who are visually impaired. This study provides a systematic overview of the appearance of Shared Spaces in the Netherlands and the

  15. Reply to 'Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers''

    International Nuclear Information System (INIS)

    Karimipour, V.

    2006-01-01

    In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating

  16. Microreact: visualizing and sharing data for genomic epidemiology and phylogeography.

    Science.gov (United States)

    Argimón, Silvia; Abudahab, Khalil; Goater, Richard J E; Fedosejev, Artemij; Bhai, Jyothish; Glasner, Corinna; Feil, Edward J; Holden, Matthew T G; Yeats, Corin A; Grundmann, Hajo; Spratt, Brian G; Aanensen, David M

    2016-11-01

    Visualization is frequently used to aid our interpretation of complex datasets. Within microbial genomics, visualizing the relationships between multiple genomes as a tree provides a framework onto which associated data (geographical, temporal, phenotypic and epidemiological) are added to generate hypotheses and to explore the dynamics of the system under investigation. Selected static images are then used within publications to highlight the key findings to a wider audience. However, these images are a very inadequate way of exploring and interpreting the richness of the data. There is, therefore, a need for flexible, interactive software that presents the population genomic outputs and associated data in a user-friendly manner for a wide range of end users, from trained bioinformaticians to front-line epidemiologists and health workers. Here, we present Microreact, a web application for the easy visualization of datasets consisting of any combination of trees, geographical, temporal and associated metadata. Data files can be uploaded to Microreact directly via the web browser or by linking to their location (e.g. from Google Drive/Dropbox or via API), and an integrated visualization via trees, maps, timelines and tables provides interactive querying of the data. The visualization can be shared as a permanent web link among collaborators, or embedded within publications to enable readers to explore and download the data. Microreact can act as an end point for any tool or bioinformatic pipeline that ultimately generates a tree, and provides a simple, yet powerful, visualization method that will aid research and discovery and the open sharing of datasets.

  17. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    Science.gov (United States)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  18. Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger

    Science.gov (United States)

    2002-01-01

    Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.

  19. Shared secrets: Web 2.0 and research in Social Sciences

    Directory of Open Access Journals (Sweden)

    Sandra MARTORELL

    2013-12-01

    Full Text Available Web 2.0 represents a revolution in terms of the possibilities it offers for facilitating communication and collaboration between users – something that has become increasingly common in the world of research. A mere few years ago, the information produced by scientists and scholars remained in the hands of a very limited circle of institutions and publishers, as if it were a guarded secret. Today that secret is being shouted from the rooftops and shared with the rest of the scientific community in order to make it more accessible and to allow new advances. A clear example of this can be found in the social sciences, where there is a constant increase in the production of articles and materials that in turn serve for the pursuit of further research, thereby promoting the continuous development of scientific knowledge. This new situation is being fostered by the proliferation of tools and applications that make it possible, but also by a change in mentality towards a philosophy of exchange and open access. In this article, we will examine this phenomenon using a methodological system based on the analysis of platforms for the exchange of scientific knowledge, and especially social networks (both general and specialising in the social sciences, in order to demonstrate their potential in a society that is becoming increasingly aware of the need to overcome physical or institutional boundaries and move forward together.

  20. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  1. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  2. Long-term outcomes of surgery and radiotherapy for secreting and non-secreting pituitary adenoma

    International Nuclear Information System (INIS)

    Kim, Mi Young; Kim, Jin Hee; Oh, Young Kee; Kim, El

    2016-01-01

    To investigate treatment outcome and long term complication after surgery and radiotherapy (RT) for pituitary adenoma. From 1990 to 2009, 73 patients with surgery and RT for pituitary adenoma were analyzed in this study. Median age was 51 years (range, 25 to 71 years). Median tumor size was 3 cm (range, 1 to 5 cm) with suprasellar (n = 21), cavernous sinus extension (n = 14) or both (n = 5). Hormone secreting tumor was diagnosed in 29 patients; 16 patients with prolactin, 12 patients with growth hormone, and 1 patient with adrenocorticotrophic hormone. Impairment of visual acuity or visual field was presented in 33 patients at first diagnosis. Most patients (n = 64) received RT as postoperative adjuvant setting. Median RT dose was 45 Gy (range, 45 to 59.4 Gy). Median follow-up duration was 8 years (range, 3 to 22 years). In secreting tumors, hormone normalization rate was 55% (16 of 29 patients). For 25 patients with evaluable visual field and visual acuity test, 21 patients (84%) showed improvement of visual disturbance after treatment. The 10-year tumor control rate for non-secreting and secreting adenoma was 100% and 58%, respectively (p < 0.001). Progression free survival rate at 10 years was 98%. Only 1 patient experienced endocrinological recurrence. Following surgery, 60% (n = 44) suffered from pituitary function deficit. Late complication associated with RT was only 1 patient, who developed cataract. Surgery and RT are very effective and safe in hormonal and tumor growth control for secreting and non-secreting pituitary adenoma

  3. Long-term outcomes of surgery and radiotherapy for secreting and non-secreting pituitary adenoma

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Mi Young; Kim, Jin Hee; Oh, Young Kee; Kim, El [Dongsan Medical Center, Keimyung University School of Medicine, Daegu (Korea, Republic of)

    2016-06-15

    To investigate treatment outcome and long term complication after surgery and radiotherapy (RT) for pituitary adenoma. From 1990 to 2009, 73 patients with surgery and RT for pituitary adenoma were analyzed in this study. Median age was 51 years (range, 25 to 71 years). Median tumor size was 3 cm (range, 1 to 5 cm) with suprasellar (n = 21), cavernous sinus extension (n = 14) or both (n = 5). Hormone secreting tumor was diagnosed in 29 patients; 16 patients with prolactin, 12 patients with growth hormone, and 1 patient with adrenocorticotrophic hormone. Impairment of visual acuity or visual field was presented in 33 patients at first diagnosis. Most patients (n = 64) received RT as postoperative adjuvant setting. Median RT dose was 45 Gy (range, 45 to 59.4 Gy). Median follow-up duration was 8 years (range, 3 to 22 years). In secreting tumors, hormone normalization rate was 55% (16 of 29 patients). For 25 patients with evaluable visual field and visual acuity test, 21 patients (84%) showed improvement of visual disturbance after treatment. The 10-year tumor control rate for non-secreting and secreting adenoma was 100% and 58%, respectively (p < 0.001). Progression free survival rate at 10 years was 98%. Only 1 patient experienced endocrinological recurrence. Following surgery, 60% (n = 44) suffered from pituitary function deficit. Late complication associated with RT was only 1 patient, who developed cataract. Surgery and RT are very effective and safe in hormonal and tumor growth control for secreting and non-secreting pituitary adenoma.

  4. Novel Scientific Visualization Interfaces for Interactive Information Visualization and Sharing

    Science.gov (United States)

    Demir, I.; Krajewski, W. F.

    2012-12-01

    As geoscientists are confronted with increasingly massive datasets from environmental observations to simulations, one of the biggest challenges is having the right tools to gain scientific insight from the data and communicate the understanding to stakeholders. Recent developments in web technologies make it easy to manage, visualize and share large data sets with general public. Novel visualization techniques and dynamic user interfaces allow users to interact with data, and modify the parameters to create custom views of the data to gain insight from simulations and environmental observations. This requires developing new data models and intelligent knowledge discovery techniques to explore and extract information from complex computational simulations or large data repositories. Scientific visualization will be an increasingly important component to build comprehensive environmental information platforms. This presentation provides an overview of the trends and challenges in the field of scientific visualization, and demonstrates information visualization and communication tools in the Iowa Flood Information System (IFIS), developed within the light of these challenges. The IFIS is a web-based platform developed by the Iowa Flood Center (IFC) to provide access to and visualization of flood inundation maps, real-time flood conditions, flood forecasts both short-term and seasonal, and other flood-related data for communities in Iowa. The key element of the system's architecture is the notion of community. Locations of the communities, those near streams and rivers, define basin boundaries. The IFIS provides community-centric watershed and river characteristics, weather (rainfall) conditions, and streamflow data and visualization tools. Interactive interfaces allow access to inundation maps for different stage and return period values, and flooding scenarios with contributions from multiple rivers. Real-time and historical data of water levels, gauge heights, and

  5. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    International Nuclear Information System (INIS)

    Deng Fuguo; Li Xihan; Zhou Hongyu; Zhang Zhanjun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations

  6. Visual supports for shared reading with young children: the effect of static overlay design.

    Science.gov (United States)

    Wood Jackson, Carla; Wahlquist, Jordan; Marquis, Cassandra

    2011-06-01

    This study examined the effects of two types of static overlay design (visual scene display and grid display) on 39 children's use of a speech-generating device during shared storybook reading with an adult. This pilot project included two groups: preschool children with typical communication skills (n = 26) and with complex communication needs (n = 13). All participants engaged in shared reading with two books using each visual layout on a speech-generating device (SGD). The children averaged a greater number of activations when presented with a grid display during introductory exploration and free play. There was a large effect of the static overlay design on the number of silent hits, evidencing more silent hits with visual scene displays. On average, the children demonstrated relatively few spontaneous activations of the speech-generating device while the adult was reading, regardless of overlay design. When responding to questions, children with communication needs appeared to perform better when using visual scene displays, but the effect of display condition on the accuracy of responses to wh-questions was not statistically significant. In response to an open ended question, children with communication disorders demonstrated more frequent activations of the SGD using a grid display than a visual scene. Suggestions for future research as well as potential implications for designing AAC systems for shared reading with young children are discussed.

  7. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.

    Science.gov (United States)

    Lee, Che-Wei; Tsai, Wen-Hsiang

    2012-01-01

    A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

  8. Direct visualization of secretion from single bovine adrenal chromaffin cells by laser-induced native fluorescence imaging microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Tong, W.; Yeung, E.S. [Ames Laboratory---USDOE and Department of Chemistry, Iowa State University, Ames, Iowa 50011 (United States)

    1998-03-01

    Direct visualization of the secretion process of individual bovine adrenal chromaffin cells was achieved with laser-induced native fluorescence imaging microscopy. By monitoring the native fluorescence of catecholamines excited by the 275 nm laser line with an intensified charge-coupled-device (CCD) camera, we obtained good temporal and spatial resolution simultaneously without using additional fluorescent probes. Large variations were found among individual cells in terms of the amounts of catecholamines secreted and the rates of secretion. Different regions of a cell also behave differently during the secretion process. However, the degree of this local heterogeneity is smaller than in neurons and neuralgia. The influence of deep-ultraviolet (UV) laser excitation on cells is also discussed. This quantitative imaging technique provides a useful noninvasive approach for the study of dynamic cellular changes and the understanding of the molecular mechanisms of secretory processes. {copyright} {ital 1998} {ital Society for Applied Spectroscopy}

  9. An amodal shared resource model of language-mediated visual attention

    Directory of Open Access Journals (Sweden)

    Alastair Charles Smith

    2013-08-01

    Full Text Available Language-mediated visual attention describes the interaction of two fundamental components of the human cognitive system, language and vision. Within this paper we present an amodal shared resource model of language-mediated visual attention that offers a description of the information and processes involved in this complex multimodal behaviour and a potential explanation for how this ability is acquired. We demonstrate that the model is not only sufficient to account for the experimental effects of Visual World Paradigm studies but also that these effects are emergent properties of the architecture of the model itself, rather than requiring separate information processing channels or modular processing systems. The model provides an explicit description of the connection between the modality-specific input from language and vision and the distribution of eye gaze in language mediated visual attention. The paper concludes by discussing future applications for the model, specifically its potential for investigating the factors driving observed individual differences in language mediated eye gaze.

  10. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  11. The effect of a shared visual context during the presentation of ...

    African Journals Online (AJOL)

    This study aims to ascertain whether a shared visual context between examiners and children during narrative assessment influences the narratives produced by the children. Participants were 20 typically developing (TD) children and 10 children with language impairment (LI), aged 6 to 8 years. They were randomly ...

  12. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  13. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  14. Fault-Tolerate Three-Party Quantum Secret Sharing over a Collective-Noise Channel

    International Nuclear Information System (INIS)

    Li Chun-Yan; Li Yan-Song

    2011-01-01

    We present a fault-tolerate three-party quantum secret sharing (QSS) scheme over a collective-noise channel. Decoherence-free subspaces are used to tolerate two noise modes, a collective-dephasing channel and a collective-rotating channel, respectively. In this scheme, the boss uses two physical qubits to construct a logical qubit which acts as a quantum channel to transmit one bit information to her two agents. The agents can get the information of the private key established by the boss only if they collaborate. The boss Alice encodes information with two unitary operations. Only single-photon measurements are required to rebuilt Alice's information and detect the security by the agents Bob and Charlie, not Bell-state measurements. Moreover, Almost all of the photons are used to distribute information, and its success efficiency approaches 100% in theory. (general)

  15. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    Ye, Tian-Yu; Jiang, Li-Zhen

    2014-01-01

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  16. Image size invariant visual cryptography for general access structures subject to display quality constraints.

    Science.gov (United States)

    Lee, Kai-Hui; Chiu, Pei-Ling

    2013-10-01

    Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.

  17. Creating "Visual Legacies": Infographics as a Means of Interpreting and Sharing Research

    Science.gov (United States)

    Thompson, Charee M.

    2015-01-01

    Guided by the principle "good data presentation is timeless," (Cressey, 2014, p.305), this unit project challenges students to engage an alternative means of sharing communication research and to realize the potential for their presentations to become "visual legacies" through the creation of infographics. Students encounter…

  18. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  19. Collaborative Visualization Project: shared-technology learning environments for science learning

    Science.gov (United States)

    Pea, Roy D.; Gomez, Louis M.

    1993-01-01

    Project-enhanced science learning (PESL) provides students with opportunities for `cognitive apprenticeships' in authentic scientific inquiry using computers for data-collection and analysis. Student teams work on projects with teacher guidance to develop and apply their understanding of science concepts and skills. We are applying advanced computing and communications technologies to augment and transform PESL at-a-distance (beyond the boundaries of the individual school), which is limited today to asynchronous, text-only networking and unsuitable for collaborative science learning involving shared access to multimedia resources such as data, graphs, tables, pictures, and audio-video communication. Our work creates user technology (a Collaborative Science Workbench providing PESL design support and shared synchronous document views, program, and data access; a Science Learning Resource Directory for easy access to resources including two-way video links to collaborators, mentors, museum exhibits, media-rich resources such as scientific visualization graphics), and refine enabling technologies (audiovisual and shared-data telephony, networking) for this PESL niche. We characterize participation scenarios for using these resources and we discuss national networked access to science education expertise.

  20. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  1. Serial interpolation for secure membership testing and matching in a secret-split archive

    Energy Technology Data Exchange (ETDEWEB)

    Kroeger, Thomas M.; Benson, Thomas R.

    2016-12-06

    The various technologies presented herein relate to analyzing a plurality of shares stored at a plurality of repositories to determine whether a secret from which the shares were formed matches a term in a query. A threshold number of shares are formed with a generating polynomial operating on the secret. A process of serially interpolating the threshold number of shares can be conducted whereby a contribution of a first share is determined, a contribution of a second share is determined while seeded with the contribution of the first share, etc. A value of a final share in the threshold number of shares can be determined and compared with the search term. In the event of the value of the final share and the search term matching, the search term matches the secret in the file from which the shares are formed.

  2. Shared mushroom body circuits underlie visual and olfactory memories in Drosophila

    Science.gov (United States)

    Vogt, Katrin; Schnaitmann, Christopher; Dylla, Kristina V; Knapek, Stephan; Aso, Yoshinori; Rubin, Gerald M; Tanimoto, Hiromu

    2014-01-01

    In nature, animals form memories associating reward or punishment with stimuli from different sensory modalities, such as smells and colors. It is unclear, however, how distinct sensory memories are processed in the brain. We established appetitive and aversive visual learning assays for Drosophila that are comparable to the widely used olfactory learning assays. These assays share critical features, such as reinforcing stimuli (sugar reward and electric shock punishment), and allow direct comparison of the cellular requirements for visual and olfactory memories. We found that the same subsets of dopamine neurons drive formation of both sensory memories. Furthermore, distinct yet partially overlapping subsets of mushroom body intrinsic neurons are required for visual and olfactory memories. Thus, our results suggest that distinct sensory memories are processed in a common brain center. Such centralization of related brain functions is an economical design that avoids the repetition of similar circuit motifs. DOI: http://dx.doi.org/10.7554/eLife.02395.001 PMID:25139953

  3. Learning Program for Enhancing Visual Literacy for Non-Design Students Using a CMS to Share Outcomes

    Science.gov (United States)

    Ariga, Taeko; Watanabe, Takashi; Otani, Toshio; Masuzawa, Toshimitsu

    2016-01-01

    This study proposes a basic learning program for enhancing visual literacy using an original Web content management system (Web CMS) to share students' outcomes in class as a blog post. It seeks to reinforce students' understanding and awareness of the design of visual content. The learning program described in this research focuses on to address…

  4. Time-Sharing-Based Synchronization and Performance Evaluation of Color-Independent Visual-MIMO Communication.

    Science.gov (United States)

    Kwon, Tae-Ho; Kim, Jai-Eun; Kim, Ki-Doo

    2018-05-14

    In the field of communication, synchronization is always an important issue. The communication between a light-emitting diode (LED) array (LEA) and a camera is known as visual multiple-input multiple-output (MIMO), for which the data transmitter and receiver must be synchronized for seamless communication. In visual-MIMO, LEDs generally have a faster data rate than the camera. Hence, we propose an effective time-sharing-based synchronization technique with its color-independent characteristics providing the key to overcome this synchronization problem in visual-MIMO communication. We also evaluated the performance of our synchronization technique by varying the distance between the LEA and camera. A graphical analysis is also presented to compare the symbol error rate (SER) at different distances.

  5. Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation

    Science.gov (United States)

    Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry

    The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).

  6. A Metric to Quantify Shared Visual Attention in Two-Person Teams

    Science.gov (United States)

    Gontar, Patrick; Mulligan, Jeffrey B.

    2015-01-01

    Critical tasks in high-risk environments are often performed by teams, the members of which must work together efficiently. In some situations, the team members may have to work together to solve a particular problem, while in others it may be better for them to divide the work into separate tasks that can be completed in parallel. We hypothesize that these two team strategies can be differentiated on the basis of shared visual attention, measured by gaze tracking.

  7. Secret rate - Privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2009-01-01

    Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two terminals observe two correlated sequences. It is the objective of the terminals to form a common secret by interchanging a public message (helper data) in such a way that the secrecy leakage is

  8. Structural Characterization and Oligomerization of the TssL Protein, a Component Shared by Bacterial Type VI and Type IVb Secretion Systems*

    Science.gov (United States)

    Durand, Eric; Zoued, Abdelrahim; Spinelli, Silvia; Watson, Paul J. H.; Aschtgen, Marie-Stéphanie; Journet, Laure; Cambillau, Christian; Cascales, Eric

    2012-01-01

    The Type VI secretion system (T6SS) is a macromolecular system distributed in Gram-negative bacteria, responsible for the secretion of effector proteins into target cells. The T6SS has a broad versatility as it can target both eukaryotic and prokaryotic cells. It is therefore involved in host pathogenesis or killing neighboring bacterial cells to colonize a new niche. At the architecture level, the T6SS core apparatus is composed of 13 proteins, which assemble in two subcomplexes. One of these subcomplexes, composed of subunits that share structural similarities with bacteriophage tail and baseplate components, is anchored to the cell envelope by the membrane subcomplex. This latter is constituted of at least three proteins, TssL, TssM, and TssJ. The crystal structure of the TssJ outer membrane lipoprotein and its interaction with the inner membrane TssM protein have been recently reported. TssL and TssM share sequence homology and characteristics with two components of the Type IVb secretion system (T4bSS), IcmH/DotU and IcmF, respectively. In this study, we report the crystal structure of the cytoplasmic domain of the TssL inner membrane protein from the enteroaggregative Escherichia coli Sci-1 T6SS. It folds as a hook-like structure composed of two three-helix bundles. Two TssL molecules associate to form a functional complex. Although the TssL trans-membrane segment is the main determinant of self-interaction, contacts between the cytoplasmic domains are required for TssL function. Based on sequence homology and secondary structure prediction, we propose that the TssL structure is the prototype for the members of the TssL and IcmH/DotU families. PMID:22371492

  9. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  10. Mothers' Attention-Getting Utterances during Shared Book Reading: Links to Low-Income Preschoolers' Verbal Engagement, Visual Attention, and Early Literacy

    Science.gov (United States)

    Son, Seung-Hee Claire; Tineo, Maria F.

    2016-01-01

    This study examined associations among low-income mothers' use of attention-getting utterances during shared book reading, preschoolers' verbal engagement and visual attention to reading, and their early literacy skills (N = 51). Mother-child shared book reading sessions were videotaped and coded for each utterance, including attention talk,…

  11. HydroShare: A Platform for Collaborative Data and Model Sharing in Hydrology

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.

    2017-12-01

    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting its use as a virtual environment supporting education and research. HydroShare has components that support: (1) resource storage, (2) resource exploration, and (3) web apps for actions on resources. The HydroShare data discovery, sharing and publishing functions as well as HydroShare web apps provide the capability to analyze data and execute models completely in the cloud (servers remote from the user) overcoming desktop platform limitations. The HydroShare GIS app provides a basic capability to visualize spatial data. The HydroShare JupyterHub Notebook app provides flexible and documentable execution of Python code snippets for analysis and modeling in a way that results can be shared among HydroShare users and groups to support research collaboration and education. We will discuss how these developments can be used to support different types of educational efforts in Hydrology where being completely web based is of value in an educational setting as students can all have access to the same functionality regardless of their computer.

  12. A Comprehensive Optimization Strategy for Real-time Spatial Feature Sharing and Visual Analytics in Cyberinfrastructure

    Science.gov (United States)

    Li, W.; Shao, H.

    2017-12-01

    For geospatial cyberinfrastructure enabled web services, the ability of rapidly transmitting and sharing spatial data over the Internet plays a critical role to meet the demands of real-time change detection, response and decision-making. Especially for the vector datasets which serve as irreplaceable and concrete material in data-driven geospatial applications, their rich geometry and property information facilitates the development of interactive, efficient and intelligent data analysis and visualization applications. However, the big-data issues of vector datasets have hindered their wide adoption in web services. In this research, we propose a comprehensive optimization strategy to enhance the performance of vector data transmitting and processing. This strategy combines: 1) pre- and on-the-fly generalization, which automatically determines proper simplification level through the introduction of appropriate distance tolerance (ADT) to meet various visualization requirements, and at the same time speed up simplification efficiency; 2) a progressive attribute transmission method to reduce data size and therefore the service response time; 3) compressed data transmission and dynamic adoption of a compression method to maximize the service efficiency under different computing and network environments. A cyberinfrastructure web portal was developed for implementing the proposed technologies. After applying our optimization strategies, substantial performance enhancement is achieved. We expect this work to widen the use of web service providing vector data to support real-time spatial feature sharing, visual analytics and decision-making.

  13. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  14. Application of homomorphism to secure image sharing

    Science.gov (United States)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  15. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  16. Creating Shared Mental Models: The Support of Visual Language

    Science.gov (United States)

    Landman, Renske B.; van den Broek, Egon L.; Gieskes, José F. B.

    Cooperative design involves multiple stakeholders that often hold different ideas of the problem, the ways to solve it, and to its solutions (i.e., mental models; MM). These differences can result in miscommunication, misunderstanding, slower decision making processes, and less chance on cooperative decisions. In order to facilitate the creation of a shared mental model (sMM), visual languages (VL) are often used. However, little scientific foundation is behind this choice. To determine whether or not this gut feeling is justified, a research was conducted in which various stakeholders had to cooperatively redesign a process chain, with and without VL. To determine whether or not a sMM was created, scores on agreement in individual MM, communication, and cooperation were analyzed. The results confirmed the assumption that VL can indeed play an important role in the creation of sMM and, hence, can aid the processes of cooperative design and engineering.

  17. A Metric to Quantify Shared Visual Attention in Two-Person Teams

    Science.gov (United States)

    Gontar, Patrick; Mulligan, Jeffrey B.

    2015-01-01

    Introduction: Critical tasks in high-risk environments are often performed by teams, the members of which must work together efficiently. In some situations, the team members may have to work together to solve a particular problem, while in others it may be better for them to divide the work into separate tasks that can be completed in parallel. We hypothesize that these two team strategies can be differentiated on the basis of shared visual attention, measured by gaze tracking. 2) Methods: Gaze recordings were obtained for two-person flight crews flying a high-fidelity simulator (Gontar, Hoermann, 2014). Gaze was categorized with respect to 12 areas of interest (AOIs). We used these data to construct time series of 12 dimensional vectors, with each vector component representing one of the AOIs. At each time step, each vector component was set to 0, except for the one corresponding to the currently fixated AOI, which was set to 1. This time series could then be averaged in time, with the averaging window time (t) as a variable parameter. For example, when we average with a t of one minute, each vector component represents the proportion of time that the corresponding AOI was fixated within the corresponding one minute interval. We then computed the Pearson product-moment correlation coefficient between the gaze proportion vectors for each of the two crew members, at each point in time, resulting in a signal representing the time-varying correlation between gaze behaviors. We determined criteria for concluding correlated gaze behavior using two methods: first, a permutation test was applied to the subjects' data. When one crew member's gaze proportion vector is correlated with a random time sample from the other crewmember's data, a distribution of correlation values is obtained that differs markedly from the distribution obtained from temporally aligned samples. In addition to validating that the gaze tracker was functioning reasonably well, this also allows us to

  18. Deterministic MDI QKD with two secret bits per shared entangled pair

    Science.gov (United States)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  19. Pituitary-hormone secretion by thyrotropinomas.

    Science.gov (United States)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.

  20. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  1. Insulin-like growth factor-1 is a negative modulator of glucagon secretion

    OpenAIRE

    Mancuso, Elettra; Mannino, Gaia C.; Fatta, Concetta Di; Fuoco, Anastasia; Spiga, Rosangela; Andreozzi, Francesco; Sesti, Giorgio

    2017-01-01

    Glucagon secretion involves a combination of paracrine, autocrine, hormonal, and autonomic neural mechanisms. Type 2 diabetes often presents impaired glucagon suppression by insulin and glucose. Insulin-like growth factor-I (IGF-1) has elevated homology with insulin, and regulates pancreatic ?-cells insulin secretion. Insulin and IGF-1 receptors share considerable structure homology and function. We hypothesized the existence of a mechanism linking the inhibition of ?-cells glucagon secretion...

  2. Measuring and Modeling Shared Visual Attention

    Science.gov (United States)

    Mulligan, Jeffrey B.; Gontar, Patrick

    2016-01-01

    Multi-person teams are sometimes responsible for critical tasks, such as flying an airliner. Here we present a method using gaze tracking data to assess shared visual attention, a term we use to describe the situation where team members are attending to a common set of elements in the environment. Gaze data are quantized with respect to a set of N areas of interest (AOIs); these are then used to construct a time series of N dimensional vectors, with each vector component representing one of the AOIs, all set to 0 except for the component corresponding to the currently fixated AOI, which is set to 1. The resulting sequence of vectors can be averaged in time, with the result that each vector component represents the proportion of time that the corresponding AOI was fixated within the given time interval. We present two methods for comparing sequences of this sort, one based on computing the time-varying correlation of the averaged vectors, and another based on a chi-square test testing the hypothesis that the observed gaze proportions are drawn from identical probability distributions. We have evaluated the method using synthetic data sets, in which the behavior was modeled as a series of "activities," each of which was modeled as a first-order Markov process. By tabulating distributions for pairs of identical and disparate activities, we are able to perform a receiver operating characteristic (ROC) analysis, allowing us to choose appropriate criteria and estimate error rates. We have applied the methods to data from airline crews, collected in a high-fidelity flight simulator (Haslbeck, Gontar & Schubert, 2014). We conclude by considering the problem of automatic (blind) discovery of activities, using methods developed for text analysis.

  3. Shared Secrets: Motherhood and Male Homosexuality in Doppelgänger Narratives

    DEFF Research Database (Denmark)

    Sencindiver, Susan Yi

    2011-01-01

    narratives. Enlisting Joseph Conrad’s short story, “The Secret Sharer,” among others, as both a paradigmatic yet self-conscious example, I examine the intersecting hotbed of these two strange bedfellows, motherhood and homosexuality, as well as the significance of gender in the male doppelgänger imaginary....

  4. Fourier-based automatic alignment for improved Visual Cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Chavel, Pierre; Fournel, Thierry

    2011-11-07

    In Visual Cryptography, several images, called "shadow images", that separately contain no information, are overlapped to reveal a shared secret message. We develop a method to digitally register one printed shadow image acquired by a camera with a purely digital shadow image, stored in memory. Using Fourier techniques derived from Fourier Optics concepts, the idea is to enhance and exploit the quasi periodicity of the shadow images, composed by a random distribution of black and white patterns on a periodic sampling grid. The advantage is to speed up the security control or the access time to the message, in particular in the cases of a small pixel size or of large numbers of pixels. Furthermore, the interest of visual cryptography can be increased by embedding the initial message in two shadow images that do not have identical mathematical supports, making manual registration impractical. Experimental results demonstrate the successful operation of the method, including the possibility to directly project the result onto the printed shadow image.

  5. Fluorescence microscopy visualization of halomucin, a secreted 927 kDa protein surrounding Haloquadratum walsbyi cells

    Directory of Open Access Journals (Sweden)

    Ralf eZenke

    2015-03-01

    Full Text Available At the time of its first publication, halomucin from Haloquadratum walsbyi strain HBSQ001 was the largest archaeal protein known (9159 aa. It has a predicted signal sequence, making it likely to be an extracellular or secreted protein. Best BLAST matches were found to be mammalian mucins that protect tissues to dehydration and chemical stress. It was hypothesized that halomucin participates in protection against desiccation by retaining water in a hull around the halophilic organisms that live at the limits of water activity. We visualized Haloquadratum cells by staining their intracellular polyhydroxybutyrate granules using Nile Blue. Halomucin was stained by immunofluorescence with antibodies generated against synthetic peptides derived from the halomucin amino acid sequence. Polyhydroxybutyrate stained cells were reconstructed in 3D which highlights not only the highly regular square shape but also the extreme flatness of Haloquadratum. Double-staining proves halomucin to be extracellular but to be only loosely associated to cells in agreement with its hypothesized function.

  6. Shared Genetic Control of Brain Activity During Sleep and Insulin Secretion: A Laboratory-Based Family Study.

    Science.gov (United States)

    Morselli, Lisa L; Gamazon, Eric R; Tasali, Esra; Cox, Nancy J; Van Cauter, Eve; Davis, Lea K

    2018-01-01

    Over the past 20 years, a large body of experimental and epidemiologic evidence has linked sleep duration and quality to glucose homeostasis, although the mechanistic pathways remain unclear. The aim of the current study was to determine whether genetic variation influencing both sleep and glucose regulation could underlie their functional relationship. We hypothesized that the genetic regulation of electroencephalographic (EEG) activity during non-rapid eye movement sleep, a highly heritable trait with fingerprint reproducibility, is correlated with the genetic control of metabolic traits including insulin sensitivity and β-cell function. We tested our hypotheses through univariate and bivariate heritability analyses in a three-generation pedigree with in-depth phenotyping of both sleep EEG and metabolic traits in 48 family members. Our analyses accounted for age, sex, adiposity, and the use of psychoactive medications. In univariate analyses, we found significant heritability for measures of fasting insulin sensitivity and β-cell function, for time spent in slow-wave sleep, and for EEG spectral power in the delta, theta, and sigma ranges. Bivariate heritability analyses provided the first evidence for a shared genetic control of brain activity during deep sleep and fasting insulin secretion rate. © 2017 by the American Diabetes Association.

  7. A shared representation of order between encoding and recognition in visual short-term memory.

    Science.gov (United States)

    Kalm, Kristjan; Norris, Dennis

    2017-07-15

    Many complex tasks require people to bind individual events into a sequence that can be held in short term memory (STM). For this purpose information about the order of the individual events in the sequence needs to be maintained in an active and accessible form in STM over a period of few seconds. Here we investigated how the temporal order information is shared between the presentation and response phases of an STM task. We trained a classification algorithm on the fMRI activity patterns from the presentation phase of the STM task to predict the order of the items during the subsequent recognition phase. While voxels in a number of brain regions represented positional information during either presentation and recognition phases, only voxels in the lateral prefrontal cortex (PFC) and the anterior temporal lobe (ATL) represented position consistently across task phases. A shared positional code in the ATL might reflect verbal recoding of visual sequences to facilitate the maintenance of order information over several seconds. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  8. Performance Analysis of Chaotic Encryption Using a Shared Image ...

    African Journals Online (AJOL)

    Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full ...

  9. Image communication scheme based on dynamic visual cryptography and computer generated holography

    Science.gov (United States)

    Palevicius, Paulius; Ragulskis, Minvydas

    2015-01-01

    Computer generated holograms are often exploited to implement optical encryption schemes. This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm. A stochastic moiré grating is used to embed the secret into a single cover image. The secret can be visually decoded by a naked eye if only the amplitude of harmonic oscillations corresponds to an accurately preselected value. The proposed visual image encryption scheme is based on computer generated holography, optical time-averaging moiré and principles of dynamic visual cryptography. Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption. Phase data of the encrypted image are computed by using Gerchberg-Saxton algorithm. The optical image is decrypted using the computationally reconstructed field of amplitudes.

  10. Accessibility of shared space for visually impaired persons

    NARCIS (Netherlands)

    Havik, Else; Melis, Bart; Steyvers, Franciscus J.J.M.

    2011-01-01

    Shared Space is a new concept for the design of the public realm that is increasingly applied in Western countries. In Shared Space, the various functions of the public domain are combined, rather than separated. The behavior of road users is mainly determined by social relations and not exclusively

  11. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen

    2015-01-07

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  12. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  13. Computational Biology and the Limits of Shared Vision

    DEFF Research Database (Denmark)

    Carusi, Annamaria

    2011-01-01

    of cases is necessary in order to gain a better perspective on social sharing of practices, and on what other factors this sharing is dependent upon. The article presents the case of currently emerging inter-disciplinary visual practices in the domain of computational biology, where the sharing of visual...... practices would be beneficial to the collaborations necessary for the research. Computational biology includes sub-domains where visual practices are coming to be shared across disciplines, and those where this is not occurring, and where the practices of others are resisted. A significant point......, its domain of study. Social practices alone are not sufficient to account for the shaping of evidence. The philosophy of Merleau-Ponty is introduced as providing an alternative framework for thinking of the complex inter-relations between all of these factors. This [End Page 300] philosophy enables us...

  14. ToxPi Graphical User Interface 2.0: Dynamic exploration, visualization, and sharing of integrated data models.

    Science.gov (United States)

    Marvel, Skylar W; To, Kimberly; Grimm, Fabian A; Wright, Fred A; Rusyn, Ivan; Reif, David M

    2018-03-05

    Drawing integrated conclusions from diverse source data requires synthesis across multiple types of information. The ToxPi (Toxicological Prioritization Index) is an analytical framework that was developed to enable integration of multiple sources of evidence by transforming data into integrated, visual profiles. Methodological improvements have advanced ToxPi and expanded its applicability, necessitating a new, consolidated software platform to provide functionality, while preserving flexibility for future updates. We detail the implementation of a new graphical user interface for ToxPi (Toxicological Prioritization Index) that provides interactive visualization, analysis, reporting, and portability. The interface is deployed as a stand-alone, platform-independent Java application, with a modular design to accommodate inclusion of future analytics. The new ToxPi interface introduces several features, from flexible data import formats (including legacy formats that permit backward compatibility) to similarity-based clustering to options for high-resolution graphical output. We present the new ToxPi interface for dynamic exploration, visualization, and sharing of integrated data models. The ToxPi interface is freely-available as a single compressed download that includes the main Java executable, all libraries, example data files, and a complete user manual from http://toxpi.org .

  15. A Visual Approach to Investigating Shared and Global Memory Behavior of CUDA Kernels

    KAUST Repository

    Rosen, Paul

    2013-01-01

    We present an approach to investigate the memory behavior of a parallel kernel executing on thousands of threads simultaneously within the CUDA architecture. Our top-down approach allows for quickly identifying any significant differences between the execution of the many blocks and warps. As interesting warps are identified, we allow further investigation of memory behavior by visualizing the shared memory bank conflicts and global memory coalescence, first with an overview of a single warp with many operations and, subsequently, with a detailed view of a single warp and a single operation. We demonstrate the strength of our approach in the context of a parallel matrix transpose kernel and a parallel 1D Haar Wavelet transform kernel. © 2013 The Author(s) Computer Graphics Forum © 2013 The Eurographics Association and Blackwell Publishing Ltd.

  16. A Visual Approach to Investigating Shared and Global Memory Behavior of CUDA Kernels

    KAUST Repository

    Rosen, Paul

    2013-06-01

    We present an approach to investigate the memory behavior of a parallel kernel executing on thousands of threads simultaneously within the CUDA architecture. Our top-down approach allows for quickly identifying any significant differences between the execution of the many blocks and warps. As interesting warps are identified, we allow further investigation of memory behavior by visualizing the shared memory bank conflicts and global memory coalescence, first with an overview of a single warp with many operations and, subsequently, with a detailed view of a single warp and a single operation. We demonstrate the strength of our approach in the context of a parallel matrix transpose kernel and a parallel 1D Haar Wavelet transform kernel. © 2013 The Author(s) Computer Graphics Forum © 2013 The Eurographics Association and Blackwell Publishing Ltd.

  17. Feature-based memory-driven attentional capture: Visual working memory content affects visual attention.

    NARCIS (Netherlands)

    Olivers, C.N.L.; Meijer, F.; Theeuwes, J.

    2006-01-01

    In 7 experiments, the authors explored whether visual attention (the ability to select relevant visual information) and visual working memory (the ability to retain relevant visual information) share the same content representations. The presence of singleton distractors interfered more strongly

  18. A neural-network approach for visual cryptography and authorization.

    Science.gov (United States)

    Yue, Tai-Wen; Chiang, Suchen

    2004-06-01

    In this paper, we propose a neural-network approach for visual authorization, which is an application of visual cryptography (VC). The scheme contains a key-share and a set of user-shares. The administrator owns the key-share, and each user owns a user-share issued by the administrator from the user-share set. The shares in the user-share set are visually indistinguishable, i.e. they have the same pictorial meaning. However, the stacking of the key-share with different user-shares will reveal significantly different images. Therefore, the administrator (in fact, only the administrator) can visually recognize the authority assigned to a particular user by viewing the information appearing in the superposed image of key-share and user-share. This approach is completely different from traditional VC approaches. The salient features include: (i) the access schemes are described using a set of graytone images, and (ii) the codebooks to fulfil them are not required; and (iii) the size of share images is the same as the size of target image.

  19. Shared decision making observed in clinical practice: visual displays of communication sequence and patterns.

    Science.gov (United States)

    Elwyn, G; Edwards, A; Wensing, M; Hibbs, R; Wilkinson, C; Grol, R

    2001-05-01

    The aim of the study was to examine the communication strategies of general practitioners attempting to involve patients in treatment or management decisions. This empirical data was then compared with theoretical 'competences' derived for 'shared decision making'. The subjects were four general practitioners, who taped conducted consultations with the specific intent of involving patients in the decision-making process. The consultations were transcribed, coded into skill categorizations and presented as visual display using a specifically devised sequential banding The empirical data from these purposively selected consultation from clinicians who are experienced in shared decision making did not match suggested theoretical frameworks. The views of patients about treatment possibilities and their preferred role in decision making were not explored. The interactions were initiated by a problem-defining phase, statements of 'equipoise' consistently appeared and the portrayal of option information was often intermingled with opportunities to allow patients to question and reflect. A decision-making stage occurred consistently after approximately 80% of the total consultation duration and arrangements were consistently made for follow-up and review. Eight of the 10 consultations took more than 11 min - these specific consultations were characterized by significant proportions of time provided for information exchange and patient interaction. The results demonstrate that some theoretical competences are not distinguishable in practice and other stages, not previously described, such as the 'portrayal of equipoise', are observed. The suggested ideal of a shared decision-making interaction will either require more time than currently allocated, or alternative strategies to enable information exchange outside the consultation.

  20. Feature-Based Memory-Driven Attentional Capture: Visual Working Memory Content Affects Visual Attention

    Science.gov (United States)

    Olivers, Christian N. L.; Meijer, Frank; Theeuwes, Jan

    2006-01-01

    In 7 experiments, the authors explored whether visual attention (the ability to select relevant visual information) and visual working memory (the ability to retain relevant visual information) share the same content representations. The presence of singleton distractors interfered more strongly with a visual search task when it was accompanied by…

  1. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  2. MASY: Management of secret keys in federated wireless sensor networks

    OpenAIRE

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  3. Visual acuity test

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003396.htm Visual acuity test To use the sharing features on this page, please enable JavaScript. The visual acuity test is used to determine the smallest ...

  4. Utilizing visualization for shared knowledge spaces

    Science.gov (United States)

    Mareda, John F.; Marek, Edward L., Jr.; Smith, Steven A.

    1997-04-01

    The amount and variety of data on the Web continues to grow exponentially, greatly complicating the process of finding relevant information, and making it increasingly difficult to understand information in the context of related material. Advanced visualization techniques, as long as they are compatible and effective ion the context of the widely distributed nature of data on the Web, can provide some measure of order to this chaos. Despite the proliferation of automated tools which attempt to deal with this sea of data, there is still a pressing need for human involvement in the organization and representation of information. People 'living' on the Web tend to form little 'knowledge spaces', revolving around those subjects that they are interested in. We describe several research efforts currently underway which address the problem of organizing and finding information in Cyberspace. We conclude with 'CiteMaps', a technology we are developing which combines Web-relevant visualization techniques with concepts and tools, to allow 'real people' to develop shareable clusters of related information.

  5. Käyttäjäystävällisen SharePoint 2013 -ohjeen laatiminen : Case VisualWeb Group Oy

    OpenAIRE

    Pynttäri, Henna

    2014-01-01

    Tässä toimintakeskeisessä opinnäytetyössä suunniteltiin ja toteutettiin VisualWeb Group Oy :n asiakkaille käyttäjäystävällinen ohje SharePoint 2013 -alustan käyttöön. Manuaali on suunnattu peruskäyttäjille, ja se sisältää ohjeet sellaisista toiminnoista, joita käyttäjä tarvitsee aloittaessaan SharePoint-alustan päälle rakennetun sivustonsa päivittämisen. Päätavoitteena oli laatia käyttöohjeesta mahdollisimman selkeä ja yksinkertainen, koska se on suunnattu käyttäjäryhmälle, jolla on vähän tai...

  6. Beginning SharePoint Designer 2010

    CERN Document Server

    Windischman, Woodrow W; Rehmani, Asif

    2010-01-01

    Teaching Web designers, developers, and IT professionals how to use the new version of SharePoint Designer. Covering both the design and business applications of SharePoint Designer, this complete Wrox guide brings readers thoroughly up to speed on how to use SharePoint Designer in an enterprise. You'll learn to create and modify web pages, use CSS editing tools to modify themes, use Data View to create interactivity with SharePoint and other data, and much more. Coverage includes integration points with Visual Studio, Visio, and InfoPath.: Shows web designers, developers, and IT professionals

  7. SeeDB: Efficient Data-Driven Visualization Recommendations to Support Visual Analytics.

    Science.gov (United States)

    Vartak, Manasi; Rahman, Sajjadur; Madden, Samuel; Parameswaran, Aditya; Polyzotis, Neoklis

    2015-09-01

    Data analysts often build visualizations as the first step in their analytical workflow. However, when working with high-dimensional datasets, identifying visualizations that show relevant or desired trends in data can be laborious. We propose SeeDB, a visualization recommendation engine to facilitate fast visual analysis: given a subset of data to be studied, SeeDB intelligently explores the space of visualizations, evaluates promising visualizations for trends, and recommends those it deems most "useful" or "interesting". The two major obstacles in recommending interesting visualizations are (a) scale : evaluating a large number of candidate visualizations while responding within interactive time scales, and (b) utility : identifying an appropriate metric for assessing interestingness of visualizations. For the former, SeeDB introduces pruning optimizations to quickly identify high-utility visualizations and sharing optimizations to maximize sharing of computation across visualizations. For the latter, as a first step, we adopt a deviation-based metric for visualization utility, while indicating how we may be able to generalize it to other factors influencing utility. We implement SeeDB as a middleware layer that can run on top of any DBMS. Our experiments show that our framework can identify interesting visualizations with high accuracy. Our optimizations lead to multiple orders of magnitude speedup on relational row and column stores and provide recommendations at interactive time scales. Finally, we demonstrate via a user study the effectiveness of our deviation-based utility metric and the value of recommendations in supporting visual analytics.

  8. Enhancing interdisciplinary collaboration and decisionmaking with J-Earth: an open source data sharing, visualization and GIS analysis platform

    Science.gov (United States)

    Prashad, L. C.; Christensen, P. R.; Fink, J. H.; Anwar, S.; Dickenshied, S.; Engle, E.; Noss, D.

    2010-12-01

    Our society currently is facing a number of major environmental challenges, most notably the threat of climate change. A multifaceted, interdisciplinary approach involving physical and social scientists, engineers and decisionmakers is critical to adequately address these complex issues. To best facilitate this interdisciplinary approach, data and models at various scales - from local to global - must be quickly and easily shared between disciplines to effectively understand environmental phenomena and human-environmental interactions. When data are acquired and studied on different scales and within different disciplines, researchers and practitioners may not be able to easily learn from each others results. For example, climate change models are often developed at a global scale, while strategies that address human vulnerability to climate change and mitigation/adaptation strategies are often assessed on a local level. Linkages between urban heat island phenomena and global climate change may be better understood with increased data flow amongst researchers and those making policy decisions. In these cases it would be useful have a single platform to share, visualize, and analyze numerical model and satellite/airborne remote sensing data with social, environmental, and economic data between researchers and practitioners. The Arizona State University 100 Cities Project and Mars Space Flight Facility are developing the open source application J-Earth, with the goal of providing this single platform, that facilitates data sharing, visualization, and analysis between researchers and applied practitioners around environmental and other sustainability challenges. This application is being designed for user communities including physical and social scientists, NASA researchers, non-governmental organizations, and decisionmakers to share and analyze data at multiple scales. We are initially focusing on urban heat island and urban ecology studies, with data and users from

  9. Learning representation hierarchies by sharing visual features: a computational investigation of Persian character recognition with unsupervised deep learning.

    Science.gov (United States)

    Sadeghi, Zahra; Testolin, Alberto

    2017-08-01

    In humans, efficient recognition of written symbols is thought to rely on a hierarchical processing system, where simple features are progressively combined into more abstract, high-level representations. Here, we present a computational model of Persian character recognition based on deep belief networks, where increasingly more complex visual features emerge in a completely unsupervised manner by fitting a hierarchical generative model to the sensory data. Crucially, high-level internal representations emerging from unsupervised deep learning can be easily read out by a linear classifier, achieving state-of-the-art recognition accuracy. Furthermore, we tested the hypothesis that handwritten digits and letters share many common visual features: A generative model that captures the statistical structure of the letters distribution should therefore also support the recognition of written digits. To this aim, deep networks trained on Persian letters were used to build high-level representations of Persian digits, which were indeed read out with high accuracy. Our simulations show that complex visual features, such as those mediating the identification of Persian symbols, can emerge from unsupervised learning in multilayered neural networks and can support knowledge transfer across related domains.

  10. Secreted single‐stranded DNA is involved in the initial phase of biofilm formation by Neisseria gonorrhoeae

    DEFF Research Database (Denmark)

    Zweig, Maria; Schork, Sabine; Koerdt, Andrea

    2014-01-01

    plays an important role in biofilm formation. Many clinical isolates contain a gonococcal genetic island that encodes a type IV secretion system (T4SS). The T4SS of N. gonorrhoeae strain MS11 secretes ssDNA directly into the medium. Biofilm formation, studied in continuous flow‐chamber systems...... was developed in which thermostable fluorescently labelled ssDNA‐ and ss/dsDNA‐binding proteins were used to visualize ssDNA and total DNA in biofilms and planktonic cultures. Remarkably, mainly dsDNA was detected in biofilms of the ssDNA secreting strain. We conclude that the secreted ssDNA facilitates initial...

  11. Showing/Sharing: Analysing Visual Communication from a Praxeological Perspective

    Directory of Open Access Journals (Sweden)

    Maria Schreiber

    2017-12-01

    Full Text Available This contribution proposes a methodological framework for empirical research into visual practices on social media. The framework identifies practices, pictures and platforms as relevant dimensions of analysis. It is mainly developed within, and is compatible with qualitative, interpretive approaches which focus on visual communication as part of everyday personal communicative practices. Two screenshots from Instagram and Facebook are introduced as empirical examples to investigate collaborative practices of meaning-making relating to pictures on social media. While social media seems to augment reflexive, processual practices of negotiating identities, visual media, in particular, amps up aesthetic, ambivalent and embodied dimensions within these practices.

  12. Visual memory and visual perception: when memory improves visual search.

    Science.gov (United States)

    Riou, Benoit; Lesourd, Mathieu; Brunel, Lionel; Versace, Rémy

    2011-08-01

    This study examined the relationship between memory and perception in order to identify the influence of a memory dimension in perceptual processing. Our aim was to determine whether the variation of typical size between items (i.e., the size in real life) affects visual search. In two experiments, the congruency between typical size difference and perceptual size difference was manipulated in a visual search task. We observed that congruency between the typical and perceptual size differences decreased reaction times in the visual search (Exp. 1), and noncongruency between these two differences increased reaction times in the visual search (Exp. 2). We argue that these results highlight that memory and perception share some resources and reveal the intervention of typical size difference on the computation of the perceptual size difference.

  13. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  14. Relativity of Visual Communication

    OpenAIRE

    Arto Mutanen

    2016-01-01

    Communication is sharing and conveying information. In visual communication especially visual messages have to be formulated and interpreted. The interpretation is relative to a method of information presentation method which is human construction. This holds also in the case of visual languages. The notions of syntax and semantics for visual languages are not so well founded as they are for natural languages. Visual languages are both syntactically and semantically dense. The density is conn...

  15. Shared visual attention and memory systems in the Drosophila brain.

    Directory of Open Access Journals (Sweden)

    Bruno van Swinderen

    Full Text Available BACKGROUND: Selective attention and memory seem to be related in human experience. This appears to be the case as well in simple model organisms such as the fly Drosophila melanogaster. Mutations affecting olfactory and visual memory formation in Drosophila, such as in dunce and rutabaga, also affect short-term visual processes relevant to selective attention. In particular, increased optomotor responsiveness appears to be predictive of visual attention defects in these mutants. METHODOLOGY/PRINCIPAL FINDINGS: To further explore the possible overlap between memory and visual attention systems in the fly brain, we screened a panel of 36 olfactory long term memory (LTM mutants for visual attention-like defects using an optomotor maze paradigm. Three of these mutants yielded high dunce-like optomotor responsiveness. We characterized these three strains by examining their visual distraction in the maze, their visual learning capabilities, and their brain activity responses to visual novelty. We found that one of these mutants, D0067, was almost completely identical to dunce(1 for all measures, while another, D0264, was more like wild type. Exploiting the fact that the LTM mutants are also Gal4 enhancer traps, we explored the sufficiency for the cells subserved by these elements to rescue dunce attention defects and found overlap at the level of the mushroom bodies. Finally, we demonstrate that control of synaptic function in these Gal4 expressing cells specifically modulates a 20-30 Hz local field potential associated with attention-like effects in the fly brain. CONCLUSIONS/SIGNIFICANCE: Our study uncovers genetic and neuroanatomical systems in the fly brain affecting both visual attention and odor memory phenotypes. A common component to these systems appears to be the mushroom bodies, brain structures which have been traditionally associated with odor learning but which we propose might be also involved in generating oscillatory brain activity

  16. Open Secrets

    OpenAIRE

    Madison, Michael

    2017-01-01

    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...

  17. Writing virtual environments for software visualization

    CERN Document Server

    Jeffery, Clinton

    2015-01-01

    This book describes the software for creating networked, 3D multi-user virtual environments that allow users to create and remotely share visualizations of program behavior. The authors cover the major features of collaborative virtual environments and how to program them in a very high level language, and show how visualization can enable important advances in our ability to understand and reduce the costs of maintaining software. The book also examines the application of popular game-like software technologies.   • Discusses the acquisition of program behavior data to be visualized • Demonstrates the integration of multiple 2D and 3D dynamic views within a 3Dscene • Presents the network messaging capabilities to share those visualizations

  18. Infants' visual and auditory communication when a partner is or is not visually attending.

    Science.gov (United States)

    Liszkowski, Ulf; Albrecht, Konstanze; Carpenter, Malinda; Tomasello, Michael

    2008-04-01

    In the current study we investigated infants' communication in the visual and auditory modalities as a function of the recipient's visual attention. We elicited pointing at interesting events from thirty-two 12-month olds and thirty-two 18-month olds in two conditions: when the recipient either was or was not visually attending to them before and during the point. The main result was that infants initiated more pointing when the recipient's visual attention was on them than when it was not. In addition, when the recipient did not respond by sharing interest in the designated event, infants initiated more repairs (repeated pointing) than when she did, again, especially when the recipient was visually attending to them. Interestingly, accompanying vocalizations were used intentionally and increased in both experimental conditions when the recipient did not share attention and interest. However, there was little evidence that infants used their vocalizations to direct attention to their gestures when the recipient was not attending to them.

  19. Thyrotropin-secreting pituitary adenomas: biological and molecular features, diagnosis and therapy.

    Science.gov (United States)

    Losa, M; Fortunato, M; Molteni, L; Peretti, E; Mortini, P

    2008-12-01

    Central hyperthyroidism due to a thyrotropin (TSH)-secreting pituitary adenoma is a rare cause of hyperthyroidism, representing 0.5-1.0% of all pituitary adenomas. The etiopathogenesis of TSH-secreting-adenomas is unknown and no definite role for various oncogenes has been proven. Patients with TSH-secreting adenoma usually present with signs and symptoms of hyperthyroidism milder than those in patients with hyperthyroidism of thyroid origin, in addition to symptoms secondary to mass effects of the pituitary tumour. Mixed pituitary tumours co-secrete growth hormone and prolactin. The characteristic biochemical abnormalities are normal or high serum TSH concentrations in the presence of elevated total and/or free thyroid hormones concentrations. Measurement of markers of peripheral thyroid hormone action and dynamic tests may aid in the differential diagnosis with the syndrome of resistance to thyroid hormone. Neuroimaging is fundamental to visualize the pituitary tumor. Therapy of TSH-secreting adenomas can be accomplished by surgery, radiation therapies, and medical treatment with somatostatin analogs or dopamine agonists. Nowadays, and in contrast with the first reports on this rare disease, most patients are well controlled by current therapies.

  20. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  1. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El; Salem, Ahmed Sultan; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal

    2017-01-01

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  2. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  3. Shared Decision-Making for Nursing Practice: An Integrative Review.

    Science.gov (United States)

    Truglio-Londrigan, Marie; Slyer, Jason T

    2018-01-01

    Shared decision-making has received national and international interest by providers, educators, researchers, and policy makers. The literature on shared decision-making is extensive, dealing with the individual components of shared decision-making rather than a comprehensive process. This view of shared decision-making leaves healthcare providers to wonder how to integrate shared decision-making into practice. To understand shared decision-making as a comprehensive process from the perspective of the patient and provider in all healthcare settings. An integrative review was conducted applying a systematic approach involving a literature search, data evaluation, and data analysis. The search included articles from PubMed, CINAHL, the Cochrane Central Register of Controlled Trials, and PsycINFO from 1970 through 2016. Articles included quantitative experimental and non-experimental designs, qualitative, and theoretical articles about shared decision-making between all healthcare providers and patients in all healthcare settings. Fifty-two papers were included in this integrative review. Three categories emerged from the synthesis: (a) communication/ relationship building; (b) working towards a shared decision; and (c) action for shared decision-making. Each major theme contained sub-themes represented in the proposed visual representation for shared decision-making. A comprehensive understanding of shared decision-making between the nurse and the patient was identified. A visual representation offers a guide that depicts shared decision-making as a process taking place during a healthcare encounter with implications for the continuation of shared decisions over time offering patients an opportunity to return to the nurse for reconsiderations of past shared decisions.

  4. Inspection of Pole-Like Structures Using a Visual-Inertial Aided VTOL Platform with Shared Autonomy.

    Science.gov (United States)

    Sa, Inkyu; Hrabar, Stefan; Corke, Peter

    2015-09-02

    This paper presents an algorithm and a system for vertical infrastructure inspection using a vertical take-off and landing (VTOL) unmanned aerial vehicle and shared autonomy. Inspecting vertical structures such as light and power distribution poles is a difficult task that is time-consuming, dangerous and expensive. Recently, micro VTOL platforms (i.e., quad-, hexa- and octa-rotors) have been rapidly gaining interest in research, military and even public domains. The unmanned, low-cost and VTOL properties of these platforms make them ideal for situations where inspection would otherwise be time-consuming and/or hazardous to humans. There are, however, challenges involved with developing such an inspection system, for example flying in close proximity to a target while maintaining a fixed stand-off distance from it, being immune to wind gusts and exchanging useful information with the remote user. To overcome these challenges, we require accurate and high-update rate state estimation and high performance controllers to be implemented onboard the vehicle. Ease of control and a live video feed are required for the human operator. We demonstrate a VTOL platform that can operate at close-quarters, whilst maintaining a safe stand-off distance and rejecting environmental disturbances. Two approaches are presented: Position-Based Visual Servoing (PBVS) using an Extended Kalman Filter (EKF) and estimator-free Image-Based Visual Servoing (IBVS). Both use monocular visual, inertia, and sonar data, allowing the approaches to be applied for indoor or GPS-impaired environments. We extensively compare the performances of PBVS and IBVS in terms of accuracy, robustness and computational costs. Results from simulations Sensors 2015, 15 22004 and indoor/outdoor (day and night) flight experiments demonstrate the system is able to successfully inspect and circumnavigate a vertical pole.

  5. Inspection of Pole-Like Structures Using a Visual-Inertial Aided VTOL Platform with Shared Autonomy

    Directory of Open Access Journals (Sweden)

    Inkyu Sa

    2015-09-01

    Full Text Available This paper presents an algorithm and a system for vertical infrastructure inspection using a vertical take-off and landing (VTOL unmanned aerial vehicle and shared autonomy. Inspecting vertical structures such as light and power distribution poles is a difficult task that is time-consuming, dangerous and expensive. Recently, micro VTOL platforms (i.e., quad-, hexa- and octa-rotors have been rapidly gaining interest in research, military and even public domains. The unmanned, low-cost and VTOL properties of these platforms make them ideal for situations where inspection would otherwise be time-consuming and/or hazardous to humans. There are, however, challenges involved with developing such an inspection system, for example flying in close proximity to a target while maintaining a fixed stand-off distance from it, being immune to wind gusts and exchanging useful information with the remote user. To overcome these challenges, we require accurate and high-update rate state estimation and high performance controllers to be implemented onboard the vehicle. Ease of control and a live video feed are required for the human operator. We demonstrate a VTOL platform that can operate at close-quarters, whilst maintaining a safe stand-off distance and rejecting environmental disturbances. Two approaches are presented: Position-Based Visual Servoing (PBVS using an Extended Kalman Filter (EKF and estimator-free Image-Based Visual Servoing (IBVS. Both use monocular visual, inertia, and sonar data, allowing the approaches to be applied for indoor or GPS-impaired environments. We extensively compare the performances of PBVS and IBVS in terms of accuracy, robustness and computational costs. Results from simulations Sensors 2015, 15 22004 and indoor/outdoor (day and night flight experiments demonstrate the system is able to successfully inspect and circumnavigate a vertical pole.

  6. Inspection of Pole-Like Structures Using a Visual-Inertial Aided VTOL Platform with Shared Autonomy

    Science.gov (United States)

    Sa, Inkyu; Hrabar, Stefan; Corke, Peter

    2015-01-01

    This paper presents an algorithm and a system for vertical infrastructure inspection using a vertical take-off and landing (VTOL) unmanned aerial vehicle and shared autonomy. Inspecting vertical structures such as light and power distribution poles is a difficult task that is time-consuming, dangerous and expensive. Recently, micro VTOL platforms (i.e., quad-, hexa- and octa-rotors) have been rapidly gaining interest in research, military and even public domains. The unmanned, low-cost and VTOL properties of these platforms make them ideal for situations where inspection would otherwise be time-consuming and/or hazardous to humans. There are, however, challenges involved with developing such an inspection system, for example flying in close proximity to a target while maintaining a fixed stand-off distance from it, being immune to wind gusts and exchanging useful information with the remote user. To overcome these challenges, we require accurate and high-update rate state estimation and high performance controllers to be implemented onboard the vehicle. Ease of control and a live video feed are required for the human operator. We demonstrate a VTOL platform that can operate at close-quarters, whilst maintaining a safe stand-off distance and rejecting environmental disturbances. Two approaches are presented: Position-Based Visual Servoing (PBVS) using an Extended Kalman Filter (EKF) and estimator-free Image-Based Visual Servoing (IBVS). Both use monocular visual, inertia, and sonar data, allowing the approaches to be applied for indoor or GPS-impaired environments. We extensively compare the performances of PBVS and IBVS in terms of accuracy, robustness and computational costs. Results from simulations and indoor/outdoor (day and night) flight experiments demonstrate the system is able to successfully inspect and circumnavigate a vertical pole. PMID:26340631

  7. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    Directory of Open Access Journals (Sweden)

    Gao Hongmei

    2011-05-01

    Full Text Available Abstract Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the Lab

  8. Secrets and disclosure in donor conception.

    Science.gov (United States)

    Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga

    2018-01-01

    This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.

  9. Advancing Collaboration through Hydrologic Data and Model Sharing

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.

    2015-12-01

    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  10. Global-local visual biases correspond with visual-spatial orientation.

    Science.gov (United States)

    Basso, Michael R; Lowery, Natasha

    2004-02-01

    Within the past decade, numerous investigations have demonstrated reliable associations of global-local visual processing biases with right and left hemisphere function, respectively (cf. Van Kleeck, 1989). Yet the relevance of these biases to other cognitive functions is not well understood. Towards this end, the present research examined the relationship between global-local visual biases and perception of visual-spatial orientation. Twenty-six women and 23 men completed a global-local judgment task (Kimchi and Palmer, 1982) and the Judgment of Line Orientation Test (JLO; Benton, Sivan, Hamsher, Varney, and Spreen, 1994), a measure of visual-spatial orientation. As expected, men had better performance on JLO. Extending previous findings, global biases were related to better visual-spatial acuity on JLO. The findings suggest that global-local biases and visual-spatial orientation may share underlying cerebral mechanisms. Implications of these findings for other visually mediated cognitive outcomes are discussed.

  11. Brain Information Sharing During Visual Short-Term Memory Binding Yields a Memory Biomarker for Familial Alzheimer's Disease.

    Science.gov (United States)

    Parra, Mario A; Mikulan, Ezequiel; Trujillo, Natalia; Sala, Sergio Della; Lopera, Francisco; Manes, Facundo; Starr, John; Ibanez, Agustin

    2017-01-01

    Alzheimer's disease (AD) as a disconnection syndrome which disrupts both brain information sharing and memory binding functions. The extent to which these two phenotypic expressions share pathophysiological mechanisms remains unknown. To unveil the electrophysiological correlates of integrative memory impairments in AD towards new memory biomarkers for its prodromal stages. Patients with 100% risk of familial AD (FAD) and healthy controls underwent assessment with the Visual Short-Term Memory binding test (VSTMBT) while we recorded their EEG. We applied a novel brain connectivity method (Weighted Symbolic Mutual Information) to EEG data. Patients showed significant deficits during the VSTMBT. A reduction of brain connectivity was observed during resting as well as during correct VSTM binding, particularly over frontal and posterior regions. An increase of connectivity was found during VSTM binding performance over central regions. While decreased connectivity was found in cases in more advanced stages of FAD, increased brain connectivity appeared in cases in earlier stages. Such altered patterns of task-related connectivity were found in 89% of the assessed patients. VSTM binding in the prodromal stages of FAD are associated to altered patterns of brain connectivity thus confirming the link between integrative memory deficits and impaired brain information sharing in prodromal FAD. While significant loss of brain connectivity seems to be a feature of the advanced stages of FAD increased brain connectivity characterizes its earlier stages. These findings are discussed in the light of recent proposals about the earliest pathophysiological mechanisms of AD and their clinical expression. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  12. The Computable Catchment: An executable document for model-data software sharing, reproducibility and interactive visualization

    Science.gov (United States)

    Gil, Y.; Duffy, C.

    2015-12-01

    This paper proposes the concept of a "Computable Catchment" which is used to develop a collaborative platform for watershed modeling and data analysis. The object of the research is a sharable, executable document similar to a pdf, but one that includes documentation of the underlying theoretical concepts, interactive computational/numerical resources, linkage to essential data repositories and the ability for interactive model-data visualization and analysis. The executable document for each catchment is stored in the cloud with automatic provisioning and a unique identifier allowing collaborative model and data enhancements for historical hydroclimatic reconstruction and/or future landuse or climate change scenarios to be easily reconstructed or extended. The Computable Catchment adopts metadata standards for naming all variables in the model and the data. The a-priori or initial data is derived from national data sources for soils, hydrogeology, climate, and land cover available from the www.hydroterre.psu.edu data service (Leonard and Duffy, 2015). The executable document is based on Wolfram CDF or Computable Document Format with an interactive open-source reader accessible by any modern computing platform. The CDF file and contents can be uploaded to a website or simply shared as a normal document maintaining all interactive features of the model and data. The Computable Catchment concept represents one application for Geoscience Papers of the Future representing an extensible document that combines theory, models, data and analysis that are digitally shared, documented and reused among research collaborators, students, educators and decision makers.

  13. Working memory resources are shared across sensory modalities.

    Science.gov (United States)

    Salmela, V R; Moisala, M; Alho, K

    2014-10-01

    A common assumption in the working memory literature is that the visual and auditory modalities have separate and independent memory stores. Recent evidence on visual working memory has suggested that resources are shared between representations, and that the precision of representations sets the limit for memory performance. We tested whether memory resources are also shared across sensory modalities. Memory precision for two visual (spatial frequency and orientation) and two auditory (pitch and tone duration) features was measured separately for each feature and for all possible feature combinations. Thus, only the memory load was varied, from one to four features, while keeping the stimuli similar. In Experiment 1, two gratings and two tones-both containing two varying features-were presented simultaneously. In Experiment 2, two gratings and two tones-each containing only one varying feature-were presented sequentially. The memory precision (delayed discrimination threshold) for a single feature was close to the perceptual threshold. However, as the number of features to be remembered was increased, the discrimination thresholds increased more than twofold. Importantly, the decrease in memory precision did not depend on the modality of the other feature(s), or on whether the features were in the same or in separate objects. Hence, simultaneously storing one visual and one auditory feature had an effect on memory precision equal to those of simultaneously storing two visual or two auditory features. The results show that working memory is limited by the precision of the stored representations, and that working memory can be described as a resource pool that is shared across modalities.

  14. A Conceptual Framework of Immersive Shared Environments Emphasizing Social Interaction

    Directory of Open Access Journals (Sweden)

    Mi Jeong Kim

    2015-11-01

    Full Text Available The effectiveness of visual displays has often been linked to the sense of presence embodied by immersive visualization. However, efforts analyzing how presence is associated with multi-users’ quality of communication, including visualization capabilities to assist in architecture, engineering and construction (AEC, are still unfolding. This research is an exploratory study on social interaction, which aims to improve the presentation and communication of complex data through immersive simulation techniques. This paper reviews key concepts such as presence and immersion to identify factors that influence communication in the representative literature. It then introduces the Hub for Immersive Visualization and eResearch (HIVE with a focus on the technological components. Finally it presents a conceptual framework of immersive shared environment, which enables multi-users to understand how to implement social interaction in a system efficiently or to determine whether a visualization system could support communication effectively. Future studies to validate the proposed framework are discussed, particularly in the context of cognitive factors in a shared environment.

  15. A study on haptic collaborative game in shared virtual environment

    Science.gov (United States)

    Lu, Keke; Liu, Guanyang; Liu, Lingzhi

    2013-03-01

    A study on collaborative game in shared virtual environment with haptic feedback over computer networks is introduced in this paper. A collaborative task was used where the players located at remote sites and played the game together. The player can feel visual and haptic feedback in virtual environment compared to traditional networked multiplayer games. The experiment was desired in two conditions: visual feedback only and visual-haptic feedback. The goal of the experiment is to assess the impact of force feedback on collaborative task performance. Results indicate that haptic feedback is beneficial for performance enhancement for collaborative game in shared virtual environment. The outcomes of this research can have a powerful impact on the networked computer games.

  16. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  17. The RhoGAP Stard13 controls insulin secretion through F-actin remodeling

    Directory of Open Access Journals (Sweden)

    Heike Naumann

    2018-02-01

    Full Text Available Objective: Actin cytoskeleton remodeling is necessary for glucose-stimulated insulin secretion in pancreatic β-cells. A mechanistic understanding of actin dynamics in the islet is paramount to a better comprehension of β-cell dysfunction in diabetes. Here, we investigate the Rho GTPase regulator Stard13 and its role in F-actin cytoskeleton organization and islet function in adult mice. Methods: We used Lifeact-EGFP transgenic animals to visualize actin cytoskeleton organization and dynamics in vivo in the mouse islets. Furthermore, we applied this model to study actin cytoskeleton and insulin secretion in mutant mice deleted for Stard13 selectively in pancreatic cells. We isolated transgenic islets for 3D-imaging and perifusion studies to measure insulin secretion dynamics. In parallel, we performed histological and morphometric analyses of the pancreas and used in vivo approaches to study glucose metabolism in the mouse. Results: In this study, we provide the first genetic evidence that Stard13 regulates insulin secretion in response to glucose. Postnatally, Stard13 expression became restricted to the mouse pancreatic islets. We showed that Stard13 deletion results in a marked increase in actin polymerization in islet cells, which is accompanied by severe reduction of insulin secretion in perifusion experiments. Consistently, Stard13-deleted mice displayed impaired glucose tolerance and reduced glucose-stimulated insulin secretion. Conclusions: Taken together, our results suggest a previously unappreciated role for the RhoGAP protein Stard13 in the interplay between actin cytoskeletal remodeling and insulin secretion. Keywords: F-actin, Insulin secretion, Islet, Pancreas, Lifeact, Stard13

  18. Finding the Secret of Image Saliency in the Frequency Domain.

    Science.gov (United States)

    Li, Jia; Duan, Ling-Yu; Chen, Xiaowu; Huang, Tiejun; Tian, Yonghong

    2015-12-01

    There are two sides to every story of visual saliency modeling in the frequency domain. On the one hand, image saliency can be effectively estimated by applying simple operations to the frequency spectrum. On the other hand, it is still unclear which part of the frequency spectrum contributes the most to popping-out targets and suppressing distractors. Toward this end, this paper tentatively explores the secret of image saliency in the frequency domain. From the results obtained in several qualitative and quantitative experiments, we find that the secret of visual saliency may mainly hide in the phases of intermediate frequencies. To explain this finding, we reinterpret the concept of discrete Fourier transform from the perspective of template-based contrast computation and thus develop several principles for designing the saliency detector in the frequency domain. Following these principles, we propose a novel approach to design the saliency detector under the assistance of prior knowledge obtained through both unsupervised and supervised learning processes. Experimental results on a public image benchmark show that the learned saliency detector outperforms 18 state-of-the-art approaches in predicting human fixations.

  19. Visual Literacy in Bloom: Using Bloom's Taxonomy to Support Visual Learning Skills

    Science.gov (United States)

    Arneson, Jessie B.; Offerdahl, Erika G.

    2018-01-01

    "Vision and Change" identifies science communication as one of the core competencies in undergraduate biology. Visual representations are an integral part of science communication, allowing ideas to be shared among and between scientists and the public. As such, development of scientific visual literacy should be a desired outcome of…

  20. Cortisol Secretion and Change in Sleep Problems in Early Childhood: Moderation by Maternal Overcontrol

    Science.gov (United States)

    Kiel, Elizabeth J.; Hummel, Alexandra C.; Luebbe, Aaron M.

    2015-01-01

    Childhood sleep problems are prevalent and relate to a wide range of negative psychological outcomes. However, it remains unclear how biological processes, such as HPA activity, may predict sleep problems over time in childhood in the context of certain parenting environments. Fifty-one mothers and their 18–20 month-old toddlers participated in a short-term longitudinal study assessing how shared variance among morning levels, diurnal change, and nocturnal change in toddlers’ cortisol secretion predicted change in sleep problems in the context of maternal overprotection and critical control. A composite characterized by low variability in, and, to a lesser extent, high morning values of cortisol, predicted increasing sleep problems from age 2 to age 3 when mothers reported high critical control. Results suggest value in assessing shared variance among different indices of cortisol secretion patterns and the interaction between cortisol and the environment in predicting sleep problems in early childhood. PMID:25766262

  1. Toward a Shared Vocabulary for Visual Analysis: An Analytic Toolkit for Deconstructing the Visual Design of Graphic Novels

    Science.gov (United States)

    Connors, Sean P.

    2012-01-01

    Literacy educators might advocate using graphic novels to develop students' visual literacy skills, but teachers who lack a vocabulary for engaging in close analysis of visual texts may be reluctant to teach them. Recognizing this, teacher educators should equip preservice teachers with a vocabulary for analyzing visual texts. This article…

  2. Growth hormone-secreting pituitary adenoma:clinical and MR imaging findings

    International Nuclear Information System (INIS)

    Park, Hong Suk; Chang, Kee Hyun; Han, Moon Hee; Sim, Jung Suk; Lee, Sang Hyun; Song, Jae Uoo; Yoo, In Kyu; Jung, Hee Won; Yeon, Kyung Mo

    1996-01-01

    To describe clinical and MRI findings of growth hormone-secreting pituitary adenoma, to determine if there are any characteristic MRI findings different from those of other pituitary adenomas, to evaluate the relationship between tumor size and serum growth hormone level, and to assess the results of immunohi-stochemical study. We retrospectively analysed clinical and MRI findings of 29 patients with growth hormone-secreting pituitary adenoma confirmed by serum growth hormone level and surgery. We also evaluated the relationship between the tumor volume and serum growth hormone level, and the results of immunohistochemical study. Coronal and sagittal T1-weighted MR images in all patients and gadolinium-enhanced T1-weighted MR images in 28 patients were obtained with 2.0 T(24 cases) and 0.5 T(5 cases) MR imagers. The images were analyzed in terms of tumor size, signal intensity, degree of contrast enhancement, extent of tumor growth and the presence or absence of cystic change, hemorrhage and calcification. Clinical manifestations included facial feature change and soft tissue swelling of hands and feet(n=29), headache(n=12), impaired visual acuity(n=9), symptoms of hyperprolactinemia(n=8), visual field defect(n=5), and others(n=6). On MR images, all of the 29 cases were seen to be macroadenomas and the size of the tumors averaged 2.2cm(1-5.2cm). Supra- and infrasellar extensions were seen in 21 and 22 patients, respectively. Cavernous sinus invasion was noted in seven, and in one this was bilateral. Signal intensity was isointense with cortical grey matter in 26 cases(90%). Cystic change or necrosis was seen in eight cases(28%), hemorrhage in four(14%), and calcification in two(7%). After enhancement, most(25/28) of the tumors enhanced less than normal pituitary in degree. There was no correlation between serum growth hormone level and tumor size. Immunohistochemical study showed positive growth hormone-secreting pituitary adenomas were various and included

  3. Growth hormone-secreting pituitary adenoma:clinical and MR imaging findings

    Energy Technology Data Exchange (ETDEWEB)

    Park, Hong Suk; Chang, Kee Hyun; Han, Moon Hee; Sim, Jung Suk; Lee, Sang Hyun; Song, Jae Uoo; Yoo, In Kyu; Jung, Hee Won; Yeon, Kyung Mo [Seoul National Univ. College of Medicine, Seoul (Korea, Republic of)

    1996-10-01

    To describe clinical and MRI findings of growth hormone-secreting pituitary adenoma, to determine if there are any characteristic MRI findings different from those of other pituitary adenomas, to evaluate the relationship between tumor size and serum growth hormone level, and to assess the results of immunohi-stochemical study. We retrospectively analysed clinical and MRI findings of 29 patients with growth hormone-secreting pituitary adenoma confirmed by serum growth hormone level and surgery. We also evaluated the relationship between the tumor volume and serum growth hormone level, and the results of immunohistochemical study. Coronal and sagittal T1-weighted MR images in all patients and gadolinium-enhanced T1-weighted MR images in 28 patients were obtained with 2.0 T(24 cases) and 0.5 T(5 cases) MR imagers. The images were analyzed in terms of tumor size, signal intensity, degree of contrast enhancement, extent of tumor growth and the presence or absence of cystic change, hemorrhage and calcification. Clinical manifestations included facial feature change and soft tissue swelling of hands and feet(n=29), headache(n=12), impaired visual acuity(n=9), symptoms of hyperprolactinemia(n=8), visual field defect(n=5), and others(n=6). On MR images, all of the 29 cases were seen to be macroadenomas and the size of the tumors averaged 2.2cm(1-5.2cm). Supra- and infrasellar extensions were seen in 21 and 22 patients, respectively. Cavernous sinus invasion was noted in seven, and in one this was bilateral. Signal intensity was isointense with cortical grey matter in 26 cases(90%). Cystic change or necrosis was seen in eight cases(28%), hemorrhage in four(14%), and calcification in two(7%). After enhancement, most(25/28) of the tumors enhanced less than normal pituitary in degree. There was no correlation between serum growth hormone level and tumor size. Immunohistochemical study showed positive growth hormone-secreting pituitary adenomas were various and included

  4. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis.

    Science.gov (United States)

    Ates, Louis S; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R; van der Woude, Aniek D; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payán, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jiménez, Connie R; Pain, Arnab; Houben, Edith N G; Warren, Robin M; Brosch, Roland; Hernández-Pando, Rogelio; Bitter, Wilbert

    2018-02-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems 1,2 . The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus 3,4 . However, the role of these proteins remains largely elusive 1 . Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion 5 . Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the 'modern' Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution 6,7 .

  5. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.

    2018-01-12

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  6. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R.; van der Woude, Aniek D.; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payá n, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jimé nez, Connie R.; Pain, Arnab; Houben, Edith N. G.; Warren, Robin M.; Brosch, Roland; Herná ndez-Pando, Rogelio; Bitter, Wilbert

    2018-01-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  7. A cyber-physical approach to secret key generation in smart environments

    OpenAIRE

    Barsocchi, Paolo; Chessa, Stefano; Martinovic, Ivan; Oligeri, Gabriele

    2011-01-01

    Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computa...

  8. Super-Resolution Imaging of Protein Secretion Systems and the Cell Surface of Gram-Negative Bacteria

    Directory of Open Access Journals (Sweden)

    Sachith D. Gunasinghe

    2017-05-01

    Full Text Available Gram-negative bacteria have a highly evolved cell wall with two membranes composed of complex arrays of integral and peripheral proteins, as well as phospholipids and glycolipids. In order to sense changes in, respond to, and exploit their environmental niches, bacteria rely on structures assembled into or onto the outer membrane. Protein secretion across the cell wall is a key process in virulence and other fundamental aspects of bacterial cell biology. The final stage of protein secretion in Gram-negative bacteria, translocation across the outer membrane, is energetically challenging so sophisticated nanomachines have evolved to meet this challenge. Advances in fluorescence microscopy now allow for the direct visualization of the protein secretion process, detailing the dynamics of (i outer membrane biogenesis and the assembly of protein secretion systems into the outer membrane, (ii the spatial distribution of these and other membrane proteins on the bacterial cell surface, and (iii translocation of effector proteins, toxins and enzymes by these protein secretion systems. Here we review the frontier research imaging the process of secretion, particularly new studies that are applying various modes of super-resolution microscopy.

  9. Evolutionary Interactions Between Visual and Chemical Signals: Chemosignals Compensate for the Loss of a Visual Signal in Male Sceloporus Lizards.

    Science.gov (United States)

    Pruett, Jake A; Zúñiga-Vega, J Jaime; Campos, Stephanie M; Soini, Helena A; Novotny, Milos V; Vital-García, Cuauhcihuatl; Martins, Emília P; Hews, Diana K

    2016-11-01

    Animals rely on multimodal signals to obtain information from conspecifics through alternative sensory systems, and the evolutionary loss of a signal in one modality may lead to compensation through increased use of signals in an alternative modality. We investigated associations between chemical signaling and evolutionary loss of abdominal color patches in males of four species (two plain-bellied and two colorful-bellied) of Sceloporus lizards. We conducted field trials to compare behavioral responses of male lizards to swabs with femoral gland (FG) secretions from conspecific males and control swabs (clean paper). We also analyzed the volatile organic compound (VOC) composition of male FG secretions by stir bar extraction and gas chromatography-mass spectrometry (GC-MS) to test the hypothesis that loss of the visual signal is associated with elaboration of the chemical signal. Males of plain-bellied, but not colorful-bellied species exhibited different rates of visual displays when exposed to swabs of conspecific FG secretions relative to control swabs. The VOC composition of male Sceloporus FG secretions was similar across all four species, and no clear association between relative abundances of VOCs and evolutionary loss of abdominal color patches was observed. The emerging pattern is that behavioral responses to conspecific chemical signals are species- and context-specific in male Sceloporus, and compensatory changes in receivers, but not signalers may be involved in mediating increased responsiveness to chemical signals in males of plain-bellied species.

  10. Creativity, visualization abilities, and visual cognitive style.

    Science.gov (United States)

    Kozhevnikov, Maria; Kozhevnikov, Michael; Yu, Chen Jiao; Blazhenkova, Olesya

    2013-06-01

    Despite the recent evidence for a multi-component nature of both visual imagery and creativity, there have been no systematic studies on how the different dimensions of creativity and imagery might interrelate. The main goal of this study was to investigate the relationship between different dimensions of creativity (artistic and scientific) and dimensions of visualization abilities and styles (object and spatial). In addition, we compared the contributions of object and spatial visualization abilities versus corresponding styles to scientific and artistic dimensions of creativity. Twenty-four undergraduate students (12 females) were recruited for the first study, and 75 additional participants (36 females) were recruited for an additional experiment. Participants were administered a number of object and spatial visualization abilities and style assessments as well as a number of artistic and scientific creativity tests. The results show that object visualization relates to artistic creativity and spatial visualization relates to scientific creativity, while both are distinct from verbal creativity. Furthermore, our findings demonstrate that style predicts corresponding dimension of creativity even after removing shared variance between style and visualization ability. The results suggest that styles might be a more ecologically valid construct in predicting real-life creative behaviour, such as performance in different professional domains. © 2013 The British Psychological Society.

  11. High levels of DegU-P activate an Esat-6-like secretion system in Bacillus subtilis.

    Directory of Open Access Journals (Sweden)

    Catarina Baptista

    Full Text Available The recently discovered Type VII/Esat-6 secretion systems seem to be widespread among bacteria of the phyla Actinobacteria and Firmicutes. In some species they play an important role in pathogenic interactions with eukaryotic hosts. Several studies have predicted that the locus yukEDCByueBC of the non-pathogenic, Gram-positive bacterium Bacillus subtilis would encode an Esat-6-like secretion system (Ess. We provide here for the first time evidences for the functioning of this secretion pathway in an undomesticated B. subtilis strain. We show that YukE, a small protein with the typical features of the secretion substrates from the WXG100 superfamily is actively secreted to culture media. YukE secretion depends on intact yukDCByueBC genes, whose products share sequence or structural homology with known components of the S. aureus Ess. Biochemical characterization of YukE indicates that it exists as a dimer both in vitro and in vivo. We also show that the B. subtilis Ess essentially operates in late stationary growth phase in absolute dependence of phosphorylated DegU, the response regulator of the two-component system DegS-DegU. We present possible reasons that eventually have precluded the study of this secretion system in the B. subtilis laboratory strain 168.

  12. VisComposer: A Visual Programmable Composition Environment for Information Visualization

    Directory of Open Access Journals (Sweden)

    Honghui Mei

    2018-03-01

    Full Text Available As the amount of data being collected has increased, the need for tools that can enable the visual exploration of data has also grown. This has led to the development of a variety of widely used programming frameworks for information visualization. Unfortunately, such frameworks demand comprehensive visualization and coding skills and require users to develop visualization from scratch. An alternative is to create interactive visualization design environments that require little to no programming. However, these tools only supports a small portion of visual forms.We present a programmable integrated development environment (IDE, VisComposer, that supports the development of expressive visualization using a drag-and-drop visual interface. VisComposer exposes the programmability by customizing desired components within a modularized visualization composition pipeline, effectively balancing the capability gap between expert coders and visualization artists. The implemented system empowers users to compose comprehensive visualizations with real-time preview and optimization features, and supports prototyping, sharing and reuse of the effects by means of an intuitive visual composer. Visual programming and textual programming integrated in our system allow users to compose more complex visual effects while retaining the simplicity of use. We demonstrate the performance of VisComposer with a variety of examples and an informal user evaluation. Keywords: Information Visualization, Visualization authoring, Interactive development environment

  13. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  14. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Jorswieck, Eduard A.; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  15. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  16. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  17. Visual Analytics and Storytelling through Video

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Pak C.; Perrine, Kenneth A.; Mackey, Patrick S.; Foote, Harlan P.; Thomas, Jim

    2005-10-31

    This paper supplements a video clip submitted to the Video Track of IEEE Symposium on Information Visualization 2005. The original video submission applies a two-way storytelling approach to demonstrate the visual analytics capabilities of a new visualization technique. The paper presents our video production philosophy, describes the plot of the video, explains the rationale behind the plot, and finally, shares our production experiences with our readers.

  18. Relativity of Visual Communication

    Directory of Open Access Journals (Sweden)

    Arto Mutanen

    2016-03-01

    Full Text Available Communication is sharing and conveying information. In visual communication especially visual messages have to be formulated and interpreted. The interpretation is relative to a method of information presentation method which is human construction. This holds also in the case of visual languages. The notions of syntax and semantics for visual languages are not so well founded as they are for natural languages. Visual languages are both syntactically and semantically dense. The density is connected to the compositionality of the (pictorial languages. In the paper Charles Sanders Peirce’s theory of signs will be used in characterizing visual languages. This allows us to relate visual languages to natural languages. The foundation of information presentation methods for visual languages is the logic of perception, but only if perception is understood as propositional perception. This allows us to understand better the relativity of information presentation methods, and hence to evaluate the cultural relativity of visual communication.

  19. Seeking to Expand Middle Level Success to All Students: A Not-So-Secret Recipe

    Science.gov (United States)

    White, Jesse

    2014-01-01

    The recipe for success of Strive Preparatory Charter School (formerly West Denver Preparatory Charter School) is not a secret. This summer program, turned four-campus, middle level phenomenon, is proving to satisfy the appetite of parents hungry for a change in their children's educational opportunities. The intent of this article is to share a…

  20. Salmonella-secreted Virulence Factors

    Energy Technology Data Exchange (ETDEWEB)

    Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.

    2011-05-01

    In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.

  1. Venom allergen-like proteins in secretions of plant-parasitic nematodes activate and suppress extracellular plant immune receptors

    NARCIS (Netherlands)

    Lozano Torres, J.L.

    2014-01-01

    Parasitic worms threaten human, animal and plant health by infecting people, livestock and crops worldwide. Animals and plants share an anciently evolved innate immune system. Parasites modulate this immune system by secreting proteins to maintain their parasitic lifestyle. This thesis

  2. A Shared Secret

    Science.gov (United States)

    Lyngstad, Idar

    2014-01-01

    This article is based on an interview with a Norwegian physical education (PE) teacher on the social contact she had with pupils when teaching them PE. The article examines a two-dimensional aspect of a teaching situation relating to swimming instruction in PE, especially focusing on pupils' positive experiences of learning to swim and the…

  3. Classification of cognitive systems dedicated to data sharing

    Science.gov (United States)

    Ogiela, Lidia; Ogiela, Marek R.

    2017-08-01

    In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and cryptographic threshold schemes will be used to improve processes of secure and efficient information management with application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information management and encryption will be also described.

  4. VISUALIZATION OF REGISTERED SUBSURFACE ANATOMY

    DEFF Research Database (Denmark)

    2010-01-01

    A system and method for visualization of subsurface anatomy includes obtaining a first image from a first camera and a second image from a second camera or a second channel of the first camera, where the first and second images contain shared anatomical structures. The second camera and the secon....... A visual interface displays the registered visualization of the first and second images. The system and method are particularly useful for imaging during minimally invasive surgery, such as robotic surgery....

  5. Rocinante, a virtual collaborative visualizer

    International Nuclear Information System (INIS)

    McDonald, M.J.

    1996-01-01

    With the goal of improving the ability of people around the world to share the development and use of intelligent systems, Sandia National Laboratories' Intelligent Systems and Robotics Center is developing new Virtual Collaborative Engineering (VCE) and Virtual Collaborative Control (VCC) technologies. A key area of VCE and VCC research is in shared visualization of virtual environments. This paper describes a Virtual Collaborative Visualizer (VCV), named Rocinante, that Sandia developed for VCE and VCC applications. Rocinante allows multiple participants to simultaneously view dynamic geometrically-defined environments. Each viewer can exclude extraneous detail or include additional information in the scene as desired. Shared information can be saved and later replayed in a stand-alone mode. Rocinante automatically scales visualization requirements with computer system capabilities. Models with 30,000 polygons and 4 Megabytes of texture display at 12 to 15 frames per second (fps) on an SGI Onyx and at 3 to 8 fps (without texture) on Indigo 2 Extreme computers. In its networked mode, Rocinante synchronizes its local geometric model with remote simulators and sensory systems by monitoring data transmitted through UDP packets. Rocinante's scalability and performance make it an ideal VCC tool. Users throughout the country can monitor robot motions and the thinking behind their motion planners and simulators

  6. Rocinante, a virtual collaborative visualizer

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, M.J. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center; Ice, L.G. [Univ. of New Mexico, Albuquerque, NM (United States)

    1996-12-31

    With the goal of improving the ability of people around the world to share the development and use of intelligent systems, Sandia National Laboratories` Intelligent Systems and Robotics Center is developing new Virtual Collaborative Engineering (VCE) and Virtual Collaborative Control (VCC) technologies. A key area of VCE and VCC research is in shared visualization of virtual environments. This paper describes a Virtual Collaborative Visualizer (VCV), named Rocinante, that Sandia developed for VCE and VCC applications. Rocinante allows multiple participants to simultaneously view dynamic geometrically-defined environments. Each viewer can exclude extraneous detail or include additional information in the scene as desired. Shared information can be saved and later replayed in a stand-alone mode. Rocinante automatically scales visualization requirements with computer system capabilities. Models with 30,000 polygons and 4 Megabytes of texture display at 12 to 15 frames per second (fps) on an SGI Onyx and at 3 to 8 fps (without texture) on Indigo 2 Extreme computers. In its networked mode, Rocinante synchronizes its local geometric model with remote simulators and sensory systems by monitoring data transmitted through UDP packets. Rocinante`s scalability and performance make it an ideal VCC tool. Users throughout the country can monitor robot motions and the thinking behind their motion planners and simulators.

  7. The HydroShare Collaborative Repository for the Hydrology Community

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Couch, A.; Hooper, R. P.; Dash, P. K.; Stealey, M.; Yi, H.; Bandaragoda, C.; Castronova, A. M.

    2017-12-01

    HydroShare is an online, collaboration system for sharing of hydrologic data, analytical tools, and models. It supports the sharing of, and collaboration around, "resources" which are defined by standardized content types for data formats and models commonly used in hydrology. With HydroShare you can: Share your data and models with colleagues; Manage who has access to the content that you share; Share, access, visualize and manipulate a broad set of hydrologic data types and models; Use the web services application programming interface (API) to program automated and client access; Publish data and models and obtain a citable digital object identifier (DOI); Aggregate your resources into collections; Discover and access data and models published by others; Use web apps to visualize, analyze and run models on data in HydroShare. This presentation will describe the functionality and architecture of HydroShare highlighting our approach to making this system easy to use and serving the needs of the hydrology community represented by the Consortium of Universities for the Advancement of Hydrologic Sciences, Inc. (CUAHSI). Metadata for uploaded files is harvested automatically or captured using easy to use web user interfaces. Users are encouraged to add or create resources in HydroShare early in the data life cycle. To encourage this we allow users to share and collaborate on HydroShare resources privately among individual users or groups, entering metadata while doing the work. HydroShare also provides enhanced functionality for users through web apps that provide tools and computational capability for actions on resources. HydroShare's architecture broadly is comprised of: (1) resource storage, (2) resource exploration website, and (3) web apps for actions on resources. System components are loosely coupled and interact through APIs, which enhances robustness, as components can be upgraded and advanced relatively independently. The full power of this paradigm is the

  8. Sharing medicine: the candidacy of medicines and other household items for sharing, Dominican Republic.

    Directory of Open Access Journals (Sweden)

    Michael N Dohn

    Full Text Available People share medicines and problems can result from this behavior. Successful interventions to change sharing behavior will require understanding people's motives and purposes for sharing medicines. Better information about how medicines fit into the gifting and reciprocity system could be useful in designing interventions to modify medicine sharing behavior. However, it is uncertain how people situate medicines among other items that might be shared. This investigation is a descriptive study of how people sort medicines and other shareable items.This study in the Dominican Republic examined how a convenience sample (31 people sorted medicines and rated their shareability in relation to other common household items. We used non-metric multidimensional scaling to produce association maps in which the distances between items offer a visual representation of the collective opinion of the participants regarding the relationships among the items. In addition, from a pile sort constrained by four categories of whether sharing or loaning the item was acceptable (on a scale from not shareable to very shareable, we assessed the degree to which the participants rated the medicines as shareable compared to other items. Participants consistently grouped medicines together in all pile sort activities; yet, medicines were mixed with other items when rated by their candidacy to be shared. Compared to the other items, participants had more variability of opinion as to whether medicines should be shared.People think of medicines as a distinct group, suggesting that interventions might be designed to apply to medicines as a group. People's differing opinions as to whether it was appropriate to share medicines imply a degree of uncertainty or ambiguity that health promotion interventions might exploit to alter attitudes and behaviors. These findings have implications for the design of health promotion interventions to impact medicine sharing behavior.

  9. Shared memories reveal shared structure in neural activity across individuals

    Science.gov (United States)

    Chen, J.; Leong, Y.C.; Honey, C.J.; Yong, C.H.; Norman, K.A.; Hasson, U.

    2016-01-01

    Our lives revolve around sharing experiences and memories with others. When different people recount the same events, how similar are their underlying neural representations? Participants viewed a fifty-minute movie, then verbally described the events during functional MRI, producing unguided detailed descriptions lasting up to forty minutes. As each person spoke, event-specific spatial patterns were reinstated in default-network, medial-temporal, and high-level visual areas. Individual event patterns were both highly discriminable from one another and similar between people, suggesting consistent spatial organization. In many high-order areas, patterns were more similar between people recalling the same event than between recall and perception, indicating systematic reshaping of percept into memory. These results reveal the existence of a common spatial organization for memories in high-level cortical areas, where encoded information is largely abstracted beyond sensory constraints; and that neural patterns during perception are altered systematically across people into shared memory representations for real-life events. PMID:27918531

  10. Cholecystokinin inhibits gastrin secretion independently of paracrine somatostatin secretion in the pig

    DEFF Research Database (Denmark)

    Schmidt, P T; Hansen, L; Hilsted, L

    2004-01-01

    BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...

  11. Shared Visualizations in Support of Distributed Creative Communities

    Directory of Open Access Journals (Sweden)

    Alastair Weakley

    2004-05-01

    Full Text Available The paper is concerned with support for distributed groups of creative knowledge workers: in this case designers. We consider requirements that designers have regarding internalisation and externalisation of ideas and concepts as well as requirements relating to collaboration. We review an online system whose facilities for the graphical representation of data were found to be popular. The evaluation was in the context of a group task and the results, including instances of tacit knowledge sharing, have led us to formulate a number of recommendations as to how such systems might be made still more effective for collaborative working.

  12. Common Visual Preference for Curved Contours in Humans and Great Apes.

    Science.gov (United States)

    Munar, Enric; Gómez-Puerto, Gerardo; Call, Josep; Nadal, Marcos

    2015-01-01

    Among the visual preferences that guide many everyday activities and decisions, from consumer choices to social judgment, preference for curved over sharp-angled contours is commonly thought to have played an adaptive role throughout human evolution, favoring the avoidance of potentially harmful objects. However, because nonhuman primates also exhibit preferences for certain visual qualities, it is conceivable that humans' preference for curved contours is grounded on perceptual and cognitive mechanisms shared with extant nonhuman primate species. Here we aimed to determine whether nonhuman great apes and humans share a visual preference for curved over sharp-angled contours using a 2-alternative forced choice experimental paradigm under comparable conditions. Our results revealed that the human group and the great ape group indeed share a common preference for curved over sharp-angled contours, but that they differ in the manner and magnitude with which this preference is expressed behaviorally. These results suggest that humans' visual preference for curved objects evolved from earlier primate species' visual preferences, and that during this process it became stronger, but also more susceptible to the influence of higher cognitive processes and preference for other visual features.

  13. Let's share a story : socially enhanced multimedia storytelling

    NARCIS (Netherlands)

    Mu, M.; Simpson, S.; Race, N.; Niamut, O.A.; Koot, G.; Kaptein, A.M.; Taal, J.; Mori, L.

    2015-01-01

    An online multimedia storytelling ecosystem comprised of user applications, a collaborative storyauthoring engine, social context integration, and socially aware media services offers a mdium for inormation sharing and social storytelling about live events. User-generated audio-visual content is

  14. Let's share a story : Socially-enhanced multimedia storytelling

    NARCIS (Netherlands)

    Mu, M.; Simpson, S.; Race, N.; Niamut, O.; Koot, G.; Kaptein, R.; Taal, J.; Mori, L.

    2015-01-01

    User-generated audio-visual content is becoming the most popular medium for information sharing and social storytelling around a live event. This paper introduces an online multimedia storytelling ecosystem comprised of purpose-built user applications, a collaborative story authoring engine, social

  15. Oral administration of royal jelly restores tear secretion capacity in rat blink-suppressed dry eye model by modulating lacrimal gland function.

    Directory of Open Access Journals (Sweden)

    Toshihiro Imada

    Full Text Available Tears are secreted from the lacrimal gland (LG, a dysfunction in which induces dry eye, resulting in ocular discomfort and visual impairment. Honey bee products are used as a nutritional source in daily life and medicine; however, little is known about their effects on dry eye. The aim of the present study was to investigate the effects of honey bee products on tear secretion capacity in dry eye. We selected raw honey, propolis, royal jelly (RJ, pollen, or larva from commercially available honey bee products. Tear secretion capacity was evaluated following the oral administration of each honey bee product in a rat blink-suppressed dry eye model. Changes in tear secretion, LG ATP content, and LG mitochondrial levels were measured. RJ restored the tear secretion capacity and decrease in LG ATP content and mitochondrial levels to the largest extent. Royal jelly can be used as a preventative intervention for dry eye by managing tear secretion capacity in the LG.

  16. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  17. Antifungal activity of lectins against yeast of vaginal secretion

    Directory of Open Access Journals (Sweden)

    Bruno Severo Gomes

    2012-06-01

    Full Text Available Lectins are carbohydrate-binding proteins of non-imune origin. This group of proteins is distributed widely in nature and they have been found in viruses, microorganisms, plants and animals. Lectins of plants have been isolated and characterized according to their chemical, physical-chemical, structural and biological properties. Among their biological activities, we can stress its fungicidal action. It has been previously described the effect of the lectins Dviol, DRL, ConBr and LSL obtained from the seeds of leguminous plants on the growth of yeasts isolated from vaginal secretions. In the present work the experiments were carried out in microtiter plates and the results interpreted by both methods: visual observations and a microplate reader at 530nm. The lectin concentrations varied from 0.5 to 256µg/mL, and the inoculum was established between 65-70% of trammitance. All yeast samples isolated from vaginal secretion were evaluated taxonomically, where were observed macroscopic and microscopic characteristics to each species. The LSL lectin did not demonstrate any antifungal activity to any isolate studied. The other lectins DRL, ConBr and DvioL, showed antifungal potential against yeast isolated from vaginal secretion. These findings offering offer a promising field of investigation to develop new therapeutic strategies against vaginal yeast infections, collaborating to improve women's health.

  18. Adapted shared reading at school for minimally verbal students with autism.

    Science.gov (United States)

    Mucchetti, Charlotte A

    2013-05-01

    Almost nothing is known about the capacity of minimally verbal students with autism to develop literacy skills. Shared reading is a regular practice in early education settings and is widely thought to encourage language and literacy development. There is some evidence that children with severe disabilities can be engaged in adapted shared reading activities. The current study examines the impact of teacher-led adapted shared reading activities on engagement and story comprehension in minimally verbal 5-6-year-old children with autism using a multiple baseline/alternating treatment design. Four students and three teachers participated. Teachers conducted adapted shared reading activities with modified books (visual supports, three-dimensional objects, simplified text) and used specific strategies for increasing student engagement. Student performance during adapted activities was compared to performance during standard shared reading sessions. All four students showed increased story comprehension and engagement during adapted shared reading. Average percentage of session engaged was 87%-100% during adapted sessions, compared with 41%-52% during baseline. Average number of correct responses to story comprehension questions was 4.2-4.8 out of 6 during adapted sessions compared with 1.2-2 during baseline. Visual supports, tactile objects, and specific teaching strategies offer ways for minimally verbal students to meaningfully participate in literacy activities. Future research should investigate adapted shared reading activities implemented classroom-wide as well as joint engagement, language, and literacy outcomes after using such activities over time.

  19. A novel secretion pathway of Salmonella enterica acts as an antivirulence modulator during salmonellosis.

    Directory of Open Access Journals (Sweden)

    Ohad Gal-Mor

    2008-04-01

    Full Text Available Salmonella spp. are Gram-negative enteropathogenic bacteria that infect a variety of vertebrate hosts. Like any other living organism, protein secretion is a fundamental process essential for various aspects of Salmonella biology. Herein we report the identification and characterization of a horizontally acquired, autonomous and previously unreported secretion pathway. In Salmonella enterica serovar Typhimurium, this novel secretion pathway is encoded by STM1669 and STM1668, designated zirT and zirS, respectively. We show that ZirT is localized to the bacterial outer membrane, expected to adopt a compact beta-barrel conformation, and functions as a translocator for ZirS. ZirS is an exoprotein, which is secreted into the extracellular environment in a ZirT-dependent manner. The ZirTS secretion pathway was found to share several important features with two-partner secretion (TPS systems and members of the intimin/invasin family of adhesions. We show that zirTS expression is affected by zinc; and that in vivo, induction of zirT occurs distinctively in Salmonella colonizing the small intestine, but not in systemic sites. Additionally, strong expression of zirT takes place in Salmonella shed in fecal pellets during acute and persistent infections of mice. Inactivation of ZirTS results in a hypervirulence phenotype of Salmonella during oral infection of mice. Cumulatively, these results indicate that the ZirTS pathway plays a unique role as an antivirulence modulator during systemic disease and is involved in fine-tuning a host-pathogen balance during salmonellosis.

  20. Engaging Audiences in Planetary Science Through Visualizations

    Science.gov (United States)

    Shupla, C. B.; Mason, T.; Peticolas, L. M.; Hauck, K.

    2017-12-01

    One way to share compelling stories is through visuals. The Lunar and Planetary Institute (LPI), in collaboration with Laboratory for Atmospheric and Space Physics (LASP) and Space Science Laboratory at the University of California, Berkeley, has been working with planetary scientists to reach and engage audiences in their research through the use of visualizations. We will share how images and animations have been used in multiple mediums, including the planetarium, Science on a Sphere, the hyperwall, and within apps. Our objectives are to provide a tool that planetary scientists can use to tell their stories, as well as to increase audience awareness of and interest in planetary science. While scientists are involved in the selection of topics and the development of the visuals, LPI and partners seek to increase the planetary science community's awareness of these resources and their ability to incorporate them into their own public engagement efforts. This presentation will share our own resources and efforts, as well as the input received from scientists on how education and public engagement teams can best assist them in developing and using these resources, and disseminating them to both scientists and to informal science education venues.

  1. A trajectory-preserving synchronization method for collaborative visualization.

    Science.gov (United States)

    Li, Lewis W F; Li, Frederick W B; Lau, Rynson W H

    2006-01-01

    In the past decade, a lot of research work has been conducted to support collaborative visualization among remote users over the networks, allowing them to visualize and manipulate shared data for problem solving. There are many applications of collaborative visualization, such as oceanography, meteorology and medical science. To facilitate user interaction, a critical system requirement for collaborative visualization is to ensure that remote users will perceive a synchronized view of the shared data. Failing this requirement, the user's ability in performing the desirable collaborative tasks will be affected. In this paper, we propose a synchronization method to support collaborative visualization. It considers how interaction with dynamic objects is perceived by application participants under the existence of network latency, and remedies the motion trajectory of the dynamic objects. It also handles the false positive and false negative collision detection problems. The new method is particularly well designed for handling content changes due to unpredictable user interventions or object collisions. We demonstrate the effectiveness of our method through a number of experiments.

  2. Glycosylation in secreted proteins from yeast Kluyveromyces lactis

    Energy Technology Data Exchange (ETDEWEB)

    Santos, A.V.; Passos, F.M.L. [Universidade Federal de Vicosa (UFV), MG (Brazil). Dept. de Microbiologia. Lab. de Fisiologia de Microrganismos; Azevedo, B.R.; Pimenta, A.M.C.; Santoro, M.M. [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Bioquimica e Imunologia. Lab. de Enzimologia e Fisico-Quimica de Proteina

    2008-07-01

    Full text: The nutritional status of a cell culture affects either the expression or the traffic of a number of proteins. The identification of the physiological conditions which favor protein secretion has important biotechnological consequences in designing systems for recombinant extracellular protein industrial production. Yeast Kluyvromyces lactis has been cultured in a continuous stirring tank bioreactor (CSTR) under nitrogen limitation at growth rates (0.03 h{sup -1} and 0.09 h{sup -1}) close to either exponential or stationary batch growth phases, respectively the objective was to investigate the extracellular glycoproteins at these two level of nitrogen limitation. Proteins from free cell extracts were separated by gradient SDS-PAGE (5-15%) and two-dimensional chromatography, and were analyzed by mass spectrometry (MALDI-TOF-TOF-MS). In SDS-PAGE analysis, differences in extracellular proteome were visualized: different proteins profiles at these two growth rates. The 0.09 h-1 growth rate showed larger number of bands using colloidal Coma ssie Blue staining. Different bands were detected at these two growth rates when the PAS assay for glycoprotein detection in polyacrylamide gel was used. The two-dimensional chromatogram profiles were comparatively distinguished between the 0.03 h{sup -1} and 0.09 h{sup -1} growth rate samples. Protein peaks from the second dimension, were subjected to mass spectrometry. The mass spectrums visualized showed glycosylated proteins with N-acetylglucosamine molecules and 8, 9 or 15 hexoses molecules. Comparisons between the proteins averaged mass values with the deduced proteins masses from K. lactis secreted proteins database indicated possible post-translational modifications, such as post-translational proteolysis, acetylation, deamidation and myristoylation.

  3. Glycosylation in secreted proteins from yeast Kluyveromyces lactis

    International Nuclear Information System (INIS)

    Santos, A.V.; Passos, F.M.L.; Azevedo, B.R.; Pimenta, A.M.C.; Santoro, M.M.

    2008-01-01

    Full text: The nutritional status of a cell culture affects either the expression or the traffic of a number of proteins. The identification of the physiological conditions which favor protein secretion has important biotechnological consequences in designing systems for recombinant extracellular protein industrial production. Yeast Kluyvromyces lactis has been cultured in a continuous stirring tank bioreactor (CSTR) under nitrogen limitation at growth rates (0.03 h -1 and 0.09 h -1 ) close to either exponential or stationary batch growth phases, respectively the objective was to investigate the extracellular glycoproteins at these two level of nitrogen limitation. Proteins from free cell extracts were separated by gradient SDS-PAGE (5-15%) and two-dimensional chromatography, and were analyzed by mass spectrometry (MALDI-TOF-TOF-MS). In SDS-PAGE analysis, differences in extracellular proteome were visualized: different proteins profiles at these two growth rates. The 0.09 h-1 growth rate showed larger number of bands using colloidal Coma ssie Blue staining. Different bands were detected at these two growth rates when the PAS assay for glycoprotein detection in polyacrylamide gel was used. The two-dimensional chromatogram profiles were comparatively distinguished between the 0.03 h -1 and 0.09 h -1 growth rate samples. Protein peaks from the second dimension, were subjected to mass spectrometry. The mass spectrums visualized showed glycosylated proteins with N-acetylglucosamine molecules and 8, 9 or 15 hexoses molecules. Comparisons between the proteins averaged mass values with the deduced proteins masses from K. lactis secreted proteins database indicated possible post-translational modifications, such as post-translational proteolysis, acetylation, deamidation and myristoylation

  4. Shared sensory estimates for human motion perception and pursuit eye movements.

    Science.gov (United States)

    Mukherjee, Trishna; Battifarano, Matthew; Simoncini, Claudio; Osborne, Leslie C

    2015-06-03

    Are sensory estimates formed centrally in the brain and then shared between perceptual and motor pathways or is centrally represented sensory activity decoded independently to drive awareness and action? Questions about the brain's information flow pose a challenge because systems-level estimates of environmental signals are only accessible indirectly as behavior. Assessing whether sensory estimates are shared between perceptual and motor circuits requires comparing perceptual reports with motor behavior arising from the same sensory activity. Extrastriate visual cortex both mediates the perception of visual motion and provides the visual inputs for behaviors such as smooth pursuit eye movements. Pursuit has been a valuable testing ground for theories of sensory information processing because the neural circuits and physiological response properties of motion-responsive cortical areas are well studied, sensory estimates of visual motion signals are formed quickly, and the initiation of pursuit is closely coupled to sensory estimates of target motion. Here, we analyzed variability in visually driven smooth pursuit and perceptual reports of target direction and speed in human subjects while we manipulated the signal-to-noise level of motion estimates. Comparable levels of variability throughout viewing time and across conditions provide evidence for shared noise sources in the perception and action pathways arising from a common sensory estimate. We found that conditions that create poor, low-gain pursuit create a discrepancy between the precision of perception and that of pursuit. Differences in pursuit gain arising from differences in optic flow strength in the stimulus reconcile much of the controversy on this topic. Copyright © 2015 the authors 0270-6474/15/358515-16$15.00/0.

  5. The Yersinia enterocolitica type three secretion chaperone SycO is integrated into the Yop regulatory network and binds to the Yop secretion protein YscM1

    Directory of Open Access Journals (Sweden)

    Heesemann Jürgen

    2007-07-01

    Full Text Available Abstract Background Pathogenic yersiniae (Y. pestis, Y. pseudotuberculosis, Y. enterocolitica share a virulence plasmid encoding a type three secretion system (T3SS. This T3SS comprises more than 40 constituents. Among these are the transport substrates called Yops (Yersinia outer proteins, the specific Yop chaperones (Sycs, and the Ysc (Yop secretion proteins which form the transport machinery. The effectors YopO and YopP are encoded on an operon together with SycO, the chaperone of YopO. The characterization of SycO is the focus of this study. Results We have established the large-scale production of recombinant SycO in its outright form. We confirm that Y. enterocolitica SycO forms homodimers which is typical for Syc chaperones. SycO overproduction in Y. enterocolitica decreases secretion of Yops into the culture supernatant suggesting a regulatory role of SycO in type III secretion. We demonstrate that in vitro SycO interacts with YscM1, a negative regulator of Yop expression in Y. enterocolitica. However, the SycO overproduction phenotype was not mediated by YscM1, YscM2, YopO or YopP as revealed by analysis of isogenic deletion mutants. Conclusion We present evidence that SycO is integrated into the regulatory network of the Yersinia T3SS. Our picture of the Yersinia T3SS interactome is supplemented by identification of the SycO/YscM1 interaction. Further, our results suggest that at least one additional interaction partner of SycO has to be identified.

  6. Visual Journaling: Engaging Adolescents in Sketchbook Activities

    Science.gov (United States)

    Cummings, Karen L.

    2011-01-01

    A wonderful way to engage high-school students in sketchbook activities is to have them create journals that combine images with words to convey emotions, ideas, and understandings. Visual journaling is a creative way for them to share their experiences and personal responses to life's events in visual and written form. Through selecting and…

  7. Mammalian protein secretion without signal peptide removal. Biosynthesis of plasminogen activator inhibitor-2 in U-937 cells

    International Nuclear Information System (INIS)

    Ye, R.D.; Wun, T.C.; Sadler, J.E.

    1988-01-01

    Plasminogen activator inhibitor-2 (PAI-2) is a serine protease inhibitor that regulates plasmin generation by inhibiting urokinase and tissue plasminogen activator. The primary structure of PAI-2 suggests that it may be secreted without cleavage of a single peptide. To confirm this hypothesis we have studied the glycosylation and secretion of PAI-2 in human monocytic U-937 cells by metabolic labeling, immunoprecipitation, glycosidase digestion, and protein sequencing. PAI-2 is variably glycosylated on asparagine residues to yield intracellular intermediates with zero, one, two, or three high mannose-type oligosaccharide units. Secretion of the N-glycosylated species began by 1 h of chase and the secreted molecules contained both complex-type N-linked and O-linked oligosaccharides. Enzymatically deglycosylated PAI-2 had an electrophoretic mobility identical to that of the nonglycosylated precursor and also to that of PAI-2 synthesized in vitro in a rabbit reticulocyte lysate from synthetic mRNA derived from full length PAI-2 cDNA. The amino-terminal protein sequence of secreted PAI-2 began with the initiator methionine residue. These results indicate that PAI-2 is glycosylated and secreted efficiently without the cleavage of a signal peptide. PAI-2 shares this property with its nearest homologue in the serine protease inhibitor family, chicken ovalbumin, and appears to be the first well characterized example of this phenomenon among natural mammalian proteins

  8. Understanding Digital Note-Taking Practice for Visualization.

    Science.gov (United States)

    Willett, Wesley; Goffin, Pascal; Isenberg, Petra

    2015-05-13

    We present results and design implications from a study of digital note-taking practice to examine how visualization can support revisitation, reflection, and collaboration around notes. As digital notebooks become common forms of external memory, keeping track of volumes of content is increasingly difficult. Information visualization tools can help give note-takers an overview of their content and allow them to explore diverse sets of notes, find and organize related content, and compare their notes with their collaborators. To ground the design of such tools, we conducted a detailed mixed-methods study of digital note-taking practice. We identify a variety of different editing, organization, and sharing methods used by digital note-takers, many of which result in notes becoming "lost in the pile''. These findings form the basis for our design considerations that examine how visualization can support the revisitation, organization, and sharing of digital notes.

  9. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  10. Lactobacilli require physical contact to reduce staphylococcal TSST-1 secretion and vaginal epithelial inflammatory response.

    Science.gov (United States)

    Younes, Jessica A; Reid, Gregor; van der Mei, Henny C; Busscher, Henk J

    2016-06-01

    ITALIC! Staphylococcus aureusbiofilms can be found on vaginal epithelia, secreting toxins and causing inflammation. The co-vaginal species ITALIC! Lactobacilluscan alter staphylococcal-induced epithelial secretion of inflammatory cytokines and quench staphylococcal toxic shock syndrome toxin-1 secretion. It is hypothesized that these effects of lactobacilli require direct physical contact between lactobacilli, staphylococci and the epithelium. Indeed, lactobacilli only reduced ITALIC! S. aureus-induced inflammatory cytokine expression when allowed physical contact with vaginal epithelial cells. Furthermore, a reduction in toxic shock syndrome toxin-1 secretion only occurred when a probiotic ITALIC! Lactobacillusstrain was allowed contact, but not when being physically separated from ITALIC! S. aureus Bacterial-probe atomic force microscopy demonstrated that lactobacilli and staphylococci strongly adhere to epithelial cells, while lactobacilli adhere stronger to staphylococci than staphylococci to each other, giving lactobacilli opportunity to penetrate and reside in staphylococcal biofilms, as visualized using confocal laser scanning microscopy with fluorescence ITALIC! in situhybridization probes. These results identify that physical contact and biochemical signaling by lactobacilli are intrinsically linked mechanisms that reduce virulence of ITALIC! S. aureusbiofilm. © FEMS 2016. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Je Min, E-mail: jemin@knu.ac.kr [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of); Department of Horticultural Science, Kyungpook National University, Daegu (Korea, Republic of); Lee, Sang-Jik [Biotechnology Institute, Nongwoo Bio Co, Ltd, Yeoju (Korea, Republic of); Department of Plant Biology, Cornell University, Ithaca, NY (United States); Rose, Jocelyn K.C. [Department of Plant Biology, Cornell University, Ithaca, NY (United States); Yeam, Inhwa [Department of Horticulture and Breeding, Andong National University, Andong (Korea, Republic of); Kim, Byung-Dong [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of)

    2014-04-18

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening.

  12. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    International Nuclear Information System (INIS)

    Lee, Je Min; Lee, Sang-Jik; Rose, Jocelyn K.C.; Yeam, Inhwa; Kim, Byung-Dong

    2014-01-01

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening

  13. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  14. Genetic and biochemical characterization of the cell wall hydrolase activity of the major secreted protein of Lactobacillus rhamnosus GG

    NARCIS (Netherlands)

    Claes, I.J.; Schoofs, G.; Regulski, K.; Vos, de W.M.

    2012-01-01

    Lactobacillus rhamnosus GG (LGG) produces two major secreted proteins, designated here Msp1 (LGG_00324 or p75) and Msp2 (LGG_00031 or p40), which have been reported to promote the survival and growth of intestinal epithelial cells. Intriguingly, although each of these proteins shares homology with

  15. GABAA agonist reduces visual awareness : a masking-EEG experiment

    NARCIS (Netherlands)

    van Loon, Anouk M; Scholte, H Steven; van Gaal, Simon; van der Hoort, Björn J J; Lamme, Victor A F

    Consciousness can be manipulated in many ways. Here, we seek to understand whether two such ways, visual masking and pharmacological intervention, share a common pathway in manipulating visual consciousness. We recorded EEG from human participants who performed a backward-masking task in which they

  16. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  17. Sharing "Sex Secrets" on Facebook: A Content Analysis of Youth Peer Communication and Advice Exchange on Social Media about Sexual Health and Intimate Relations.

    Science.gov (United States)

    Yeo, Tien Ee Dominic; Chu, Tsz Hang

    2017-09-01

    Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.

  18. A comparative psychophysical approach to visual perception in primates.

    Science.gov (United States)

    Matsuno, Toyomi; Fujita, Kazuo

    2009-04-01

    Studies on the visual processing of primates, which have well developed visual systems, provide essential information about the perceptual bases of their higher-order cognitive abilities. Although the mechanisms underlying visual processing are largely shared between human and nonhuman primates, differences have also been reported. In this article, we review psychophysical investigations comparing the basic visual processing that operates in human and nonhuman species, and discuss the future contributions potentially deriving from such comparative psychophysical approaches to primate minds.

  19. Common neural substrates for visual working memory and attention.

    Science.gov (United States)

    Mayer, Jutta S; Bittner, Robert A; Nikolić, Danko; Bledowski, Christoph; Goebel, Rainer; Linden, David E J

    2007-06-01

    Humans are severely limited in their ability to memorize visual information over short periods of time. Selective attention has been implicated as a limiting factor. Here we used functional magnetic resonance imaging to test the hypothesis that this limitation is due to common neural resources shared by visual working memory (WM) and selective attention. We combined visual search and delayed discrimination of complex objects and independently modulated the demands on selective attention and WM encoding. Participants were presented with a search array and performed easy or difficult visual search in order to encode one or three complex objects into visual WM. Overlapping activation for attention-demanding visual search and WM encoding was observed in distributed posterior and frontal regions. In the right prefrontal cortex and bilateral insula blood oxygen-level-dependent activation additively increased with increased WM load and attentional demand. Conversely, several visual, parietal and premotor areas showed overlapping activation for the two task components and were severely reduced in their WM load response under the condition with high attentional demand. Regions in the left prefrontal cortex were selectively responsive to WM load. Areas selectively responsive to high attentional demand were found within the right prefrontal and bilateral occipital cortex. These results indicate that encoding into visual WM and visual selective attention require to a high degree access to common neural resources. We propose that competition for resources shared by visual attention and WM encoding can limit processing capabilities in distributed posterior brain regions.

  20. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  1. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  2. EDITORIAL: Focus on Visualization in Physics FOCUS ON VISUALIZATION IN PHYSICS

    Science.gov (United States)

    Sanders, Barry C.; Senden, Tim; Springel, Volker

    2008-12-01

    Advances in physics are intimately connected with developments in a new technology, the telescope, precision clocks, even the computer all have heralded a shift in thinking. These landmark developments open new opportunities accelerating research and in turn new scientific directions. These technological drivers often correspond to new instruments, but equally might just as well flag a new mathematical tool, an algorithm or even means to visualize physics in a new way. Early on in this twenty-first century, scientific communities are just starting to explore the potential of digital visualization. Whether visualization is used to represent and communicate complex concepts, or to understand and interpret experimental data, or to visualize solutions to complex dynamical equations, the basic tools of visualization are shared in each of these applications and implementations. High-performance computing exemplifies the integration of visualization with leading research. Visualization is an indispensable tool for analyzing and interpreting complex three-dimensional dynamics as well as to diagnose numerical problems in intricate parallel calculation algorithms. The effectiveness of visualization arises by exploiting the unmatched capability of the human eye and visual cortex to process the large information content of images. In a brief glance, we recognize patterns or identify subtle features even in noisy data, something that is difficult or impossible to achieve with more traditional forms of data analysis. Importantly, visualizations guide the intuition of researchers and help to comprehend physical phenomena that lie far outside of direct experience. In fact, visualizations literally allow us to see what would otherwise remain completely invisible. For example, artificial imagery created to visualize the distribution of dark matter in the Universe has been instrumental to develop the notion of a cosmic web, and for helping to establish the current standard model of

  3. The Precategorical Nature of Visual Short-Term Memory

    Science.gov (United States)

    Quinlan, Philip T.; Cohen, Dale J.

    2016-01-01

    We conducted a series of recognition experiments that assessed whether visual short-term memory (VSTM) is sensitive to shared category membership of to-be-remembered (tbr) images of common objects. In Experiment 1 some of the tbr items shared the same basic level category (e.g., hand axe): Such items were no better retained than others. In the…

  4. Risk Management Collaboration through Sharing Interactive Graphics

    Science.gov (United States)

    Slingsby, Aidan; Dykes, Jason; Wood, Jo; Foote, Matthew

    2010-05-01

    Risk management involves the cooperation of scientists, underwriters and actuaries all of whom analyse data to support decision-making. Results are often disseminated through static documents with graphics that convey the message the analyst wishes to communicate. Interactive graphics are increasingly popular means of communicating the results of data analyses because they enable other parties to explore and visually analyse some of the data themselves prior to and during discussion. Discussion around interactive graphics can occur synchronously in face-to-face meetings or with video-conferencing and screen sharing or they can occur asynchronously through web-sites such as ManyEyes, web-based fora, blogs, wikis and email. A limitation of approaches that do not involve screen sharing is the difficulty in sharing the results of insights from interacting with the graphic. Static images accompanied can be shared but these themselves cannot be interacted, producing a discussion bottleneck (Baker, 2008). We address this limitation by allowing the state and configuration of graphics to be shared (rather than static images) so that a user can reproduce someone else's graphic, interact with it and then share the results of this accompanied with some commentary. HiVE (Slingsby et al, 2009) is a compact and intuitive text-based language that has been designed for this purpose. We will describe the vizTweets project (a 9-month project funded by JISC) in which we are applying these principles to insurance risk management in the context of the Willis Research Network, the world's largest collaboration between the insurance industry and the academia). The project aims to extend HiVE to meet the needs of the sector, design, implement free-available web services and tools and to provide case studies. We will present a case study that demonstrate the potential of this approach for collaboration within the Willis Research Network. Baker, D. Towards Transparency in Visualisation Based

  5. Secrets of mlearning failures: confronting reality

    Directory of Open Access Journals (Sweden)

    Thomas Cochrane

    2012-08-01

    Full Text Available Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as “failures” and compares them to successful projects to draw out critical implications for mlearning project design and implementation to avoid common pitfalls leading to potential project failure. This article uses the researcher's six critical success factors identified across the 35 mlearning projects to evaluate these three projects, and concludes that projects resulting in “no significant difference” in pedagogical outcomes are the result of attempts to shoehorn old pedagogies into new technologies. Lecturer professional development and sustained collaborative support are critical to fostering new pedagogies utilising the unique affordances of mobile devices.

  6. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  7. Novel Kazal-type proteinase inhibitors from the skin secretion of the Splendid leaf frog, Cruziohyla calcarifer

    Directory of Open Access Journals (Sweden)

    Carolina Proaño-Bolaños

    2017-06-01

    Full Text Available Peptidase inhibitors have an important role controlling a variety of biological processes. Here, we employed a peptidomic approach including molecular cloning, tandem mass spectrometry and enzymatic assays to reveal 7 Kazal-type proteinase inhibitors (CCKPs (18 variants in the skin secretion of the unexplored frog, Cruziohyla calcarifer. All 18 proteins shared the Kazal pattern C-X(7-C-X(6,7-C-X(6,7-Y-X(3-C-X(2-C-X(15-21-C and 3 disulphide bridges. Based on structural comparative analysis, we deemed trypsin and chymotrypsin inhibitory activity in CCKP-1, 4 and CCKP 2, 5, 7, respectively. These peptidase inhibitors presumably play a role to control the balance between other functional peptides produced in the amphibian skin secretions.

  8. Is a visual worth more than a thousand words? An investigation into brand engagement and social shopping on visual social media

    OpenAIRE

    Bennett, DR; Kunze, C

    2016-01-01

    Social media networking is now the most popular online activity worldwide and a large part of social media interaction involves sharing visual content on platforms such as Instagram and Pinterest. The phenomenal growth in numbers of users makes visual platforms enticing for marketers who spend ever-increasing time, effort and money on social media in the hope of generating consumer engagement for their brands. This research investigates customer behaviour for the largest visual social media p...

  9. Proteomic analysis of secreted proteins by human bronchial epithelial cells in response to cadmium toxicity.

    Science.gov (United States)

    Chen, De-Ju; Xu, Yan-Ming; Zheng, Wei; Huang, Dong-Yang; Wong, Wing-Yan; Tai, William Chi-Shing; Cho, Yong-Yeon; Lau, Andy T Y

    2015-09-01

    For years, many studies have been conducted to investigate the intracellular response of cells challenged with toxic metal(s), yet, the corresponding secretome responses, especially in human lung cells, are largely unexplored. Here, we provide a secretome analysis of human bronchial epithelial cells (BEAS-2B) treated with cadmium chloride (CdCl2 ), with the aim of identifying secreted proteins in response to Cd toxicity. Proteins from control and spent media were separated by two-dimensional electrophoresis and visualized by silver staining. Differentially-secreted proteins were identified by MALDI-TOF-MS analysis and database searching. We characterized, for the first time, the extracellular proteome changes of BEAS-2B dosed with Cd. Our results unveiled that Cd treatment led to the marked upregulation of molecular chaperones, antioxidant enzymes, enzymes associated with glutathione metabolic process, proteins involved in cellular energy metabolism, as well as tumor-suppressors. Pretreatment of cells with the thiol antioxidant glutathione before Cd treatment effectively abrogated the secretion of these proteins and prevented cell death. Taken together, our results demonstrate that Cd causes oxidative stress-induced cytotoxicity; and the differentially-secreted protein signatures could be considered as targets for potential use as extracellular biomarkers upon Cd exposure. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Visualization and Data Analysis for High-Performance Computing

    Energy Technology Data Exchange (ETDEWEB)

    Sewell, Christopher Meyer [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-27

    This is a set of slides from a guest lecture for a class at the University of Texas, El Paso on visualization and data analysis for high-performance computing. The topics covered are the following: trends in high-performance computing; scientific visualization, such as OpenGL, ray tracing and volume rendering, VTK, and ParaView; data science at scale, such as in-situ visualization, image databases, distributed memory parallelism, shared memory parallelism, VTK-m, "big data", and then an analysis example.

  11. Visual system manifestations of Alzheimer's disease.

    Science.gov (United States)

    Kusne, Yael; Wolf, Andrew B; Townley, Kate; Conway, Mandi; Peyman, Gholam A

    2017-12-01

    Alzheimer's disease (AD) is an increasingly common disease with massive personal and economic costs. While it has long been known that AD impacts the visual system, there has recently been an increased focus on understanding both pathophysiological mechanisms that may be shared between the eye and brain and how related biomarkers could be useful for AD diagnosis. Here, were review pertinent cellular and molecular mechanisms of AD pathophysiology, the presence of AD pathology in the visual system, associated functional changes, and potential development of diagnostic tools based on the visual system. Additionally, we discuss links between AD and visual disorders, including possible pathophysiological mechanisms and their relevance for improving our understanding of AD. © 2016 Acta Ophthalmologica Scandinavica Foundation. Published by John Wiley & Sons Ltd.

  12. Resource-sharing between internal maintenance and external selection modulates attentional capture by working memory content

    Directory of Open Access Journals (Sweden)

    Anastasia eKiyonaga

    2014-08-01

    Full Text Available It is unclear why and under what circumstances working memory (WM and attention interact. Here, we apply the logic of the time-based resource-sharing (TBRS model of WM (e.g., Barrouillet, Bernardin, & Camos, 2004 to explore the mixed findings of a separate, but related, literature that studies the guidance of visual attention by WM contents. Specifically, we hypothesize that the linkage between WM representations and visual attention is governed by a time-shared cognitive resource that alternately refreshes internal (WM and selects external (visual attention information. If this were the case, WM content should guide visual attention (involuntarily, but only when there is time for it to be refreshed in an internal focus of attention. To provide an initial test for this hypothesis, we examined whether the amount of unoccupied time during a WM delay could impact the magnitude of attentional capture by WM contents. Participants were presented with a series of visual search trials while they maintained a WM cue for a delayed-recognition test. WM cues could coincide with the search target, a distracter, or neither. We varied both the number of searches to be performed, and the amount of available time to perform them. Slowing of visual search by a WM matching distracter—and facilitation by a matching target—were curtailed when the delay was filled with fast-paced (refreshing-preventing search trials, as was subsequent memory probe accuracy. WM content may, therefore, only capture visual attention when it can be refreshed, suggesting that internal (WM and external attention demands reciprocally impact one another because they share a limited resource. The TBRS rationale can thus be applied in a novel context to explain why WM contents capture attention, and under what conditions that effect should be observed.

  13. A distributed execution environment for large data visualization

    International Nuclear Information System (INIS)

    Huang Jian; Liu Huadong; Beck, Micah; Gao Jinzhu; Moore, Terry

    2006-01-01

    Over the years, homogeneous computer cluster have been the most popular, and, in some sense, the only viable, platform for use in parallel visualization. In this work, we designed an execution environment for data-intensive visualization that is suitable to handle SciDAC scale datasets. This environment is solely based on computers distributed across the Internet that are owned and operated by independent institutions, while being openly shared for free. Those Internet computers are inherently of heterogeneous hardware configuration and running a variety of operating systems. Using 100 processors of such kind, we have been able to obtain the same level of performance offered by a 64-node cluster of 2.2 GHz P4 processors, while processing a 75GBs subset of TSI simulation data. Due to its inherently shared nature, this execution environment for data-intensive visualization could provide a viable means of collaboration among geographically separated SciDAC scientists

  14. Glucagon-like peptide-1 secretion in women with gestational diabetes mellitus during and after pregnancy.

    Science.gov (United States)

    Lencioni, C; Resi, V; Romero, F; Lupi, R; Volpe, L; Bertolotto, A; Ghio, A; Del Prato, S; Marchetti, P; Di Cianni, G

    2011-10-01

    Gestational diabetes mellitus (GDM) predisposes women to future development of Type 2 diabetes mellitus (DM2) and the two conditions share similar metabolic alterations. Recent observations suggest that a defective glucose stimulated insulin secretion by glucagon-like peptide-1 (GLP- 1) plays a role in the pathogenesis of DM2. Whether such a defect is impaired in GDM remains to be ascertained. We have determined GLP-1 secretion in response to oral glucose tolerance test (OGTT) in GDM and normal glucose tolerance (NGT) during and after pregnancy. 100-g-3h OGTT was performed in 12 GDM and 16 NGT women at 27.3 ± 4.1 weeks of gestation, for determination of plasma GLP-1, glucose, insulin, and C-peptide. Insulin sensitivity (ISI) and insulin secretion (first and second phase); as well as ISI-secretion index (ISSI) were also derived. NGT and GDM women were comparable for age pre-pregnancy body mass index (BMI) and weight gain. GDM had higher glucose area under the curve (AUC): 27,575.5 ± 3448 vs 20,685.88 ± 2715 mg/dl min (pwomen (2542 ± 273 vs 10,092 ± 7367 pmol·l-1·min-1, pwomen is inadequate for the prevailing glycemic levels both in pregnancy and post partum. Moreover, we cannot exclude that other important aspects of the incretin effect may be involved in GDM development.

  15. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  16. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...... enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct...

  17. Neuro-Ophthalmological Disorders in Cerebral Palsy: Ophthalmological, Oculomotor, and Visual Aspects

    Science.gov (United States)

    Fazzi, Elisa; Signorini, Sabrina G.; La Piana, Roberta; Bertone, Chiara; Misefari, Walter; Galli, Jessica; Balottin, Umberto; Bianchi, Paolo Emilio

    2012-01-01

    Aim: Cerebral visual impairment (CVI) is a disorder caused by damage to the retrogeniculate visual pathways. Cerebral palsy (CP) and CVI share a common origin: 60 to 70% of children with CP also have CVI. We set out to describe visual dysfunction in children with CP. A further aim was to establish whether different types of CP are associated with…

  18. Similarity relations in visual search predict rapid visual categorization

    Science.gov (United States)

    Mohan, Krithika; Arun, S. P.

    2012-01-01

    How do we perform rapid visual categorization?It is widely thought that categorization involves evaluating the similarity of an object to other category items, but the underlying features and similarity relations remain unknown. Here, we hypothesized that categorization performance is based on perceived similarity relations between items within and outside the category. To this end, we measured the categorization performance of human subjects on three diverse visual categories (animals, vehicles, and tools) and across three hierarchical levels (superordinate, basic, and subordinate levels among animals). For the same subjects, we measured their perceived pair-wise similarities between objects using a visual search task. Regardless of category and hierarchical level, we found that the time taken to categorize an object could be predicted using its similarity to members within and outside its category. We were able to account for several classic categorization phenomena, such as (a) the longer times required to reject category membership; (b) the longer times to categorize atypical objects; and (c) differences in performance across tasks and across hierarchical levels. These categorization times were also accounted for by a model that extracts coarse structure from an image. The striking agreement observed between categorization and visual search suggests that these two disparate tasks depend on a shared coarse object representation. PMID:23092947

  19. Cognitive approaches for patterns analysis and security applications

    Science.gov (United States)

    Ogiela, Marek R.; Ogiela, Lidia

    2017-08-01

    In this paper will be presented new opportunities for developing innovative solutions for semantic pattern classification and visual cryptography, which will base on cognitive and bio-inspired approaches. Such techniques can be used for evaluation of the meaning of analyzed patterns or encrypted information, and allow to involve such meaning into the classification task or encryption process. It also allows using some crypto-biometric solutions to extend personalized cryptography methodologies based on visual pattern analysis. In particular application of cognitive information systems for semantic analysis of different patterns will be presented, and also a novel application of such systems for visual secret sharing will be described. Visual shares for divided information can be created based on threshold procedure, which may be dependent on personal abilities to recognize some image details visible on divided images.

  20. Braille and Tactile Graphics: Youths with Visual Impairments Share Their Experiences

    Science.gov (United States)

    Rosenblum, L. Penny; Herzberg, Tina S.

    2015-01-01

    Introduction: Data were collected from youths with visual impairment about their experiences with tactile graphics and braille materials used in mathematics and science classes. Methods: Youths answered questions and explored four tactile graphics made using different production methods. They located specific information on each graphic and shared…

  1. Escher: A Web Application for Building, Sharing, and Embedding Data-Rich Visualizations of Biological Pathways

    DEFF Research Database (Denmark)

    King, Zachary A.; Draeger, Andreas; Ebrahim, Ali

    2015-01-01

    Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users c...... of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools....

  2. Nebhydro: Sharing Geospatial Data to Supportwater Management in Nebraska

    Science.gov (United States)

    Kamble, B.; Irmak, A.; Hubbard, K.; Deogun, J.; Dvorak, B.

    2012-12-01

    Recent advances in web-enabled geographical technologies have the potential to make a dramatic impact on development of highly interactive spatial applications on the web for visualization of large-scale geospatial data by water resources and irrigation scientists. Spatial and point scale water resources data visualization are an emerging and challenging application domain. Query based visual explorations of geospatial hydrological data can play an important role in stimulating scientific hypotheses and seeking causal relationships among hydro variables. The Nebraska Hydrological Information System (NebHydro) utilizes ESRI's ArcGIS server technology to increase technological awareness among farmers, irrigation managers and policy makers. Web-based geospatial applications are an effective way to expose scientific hydrological datasets to the research community and the public. NebHydro uses Adobe Flex technology to offer an online visualization and data analysis system for presentation of social and economic data. Internet mapping services is an integrated product of GIS and Internet technologies; it is a favored solution to achieve the interoperability of GIS. The development of Internet based GIS services in the state of Nebraska showcases the benefits of sharing geospatial hydrological data among agencies, resource managers and policy makers. Geospatial hydrological Information (Evapotranspiration from Remote Sensing, vegetation indices (NDVI), USGS Stream gauge data, Climatic data etc.) is generally generated through model simulation (METRIC, SWAP, Linux, Python based scripting etc). Information is compiled into and stored within object oriented relational spatial databases using a geodatabase information model that supports the key data types needed by applications including features, relationships, networks, imagery, terrains, maps and layers. The system provides online access, querying, visualization, and analysis of the hydrological data from several sources

  3. Trade Secrets in Life Science and Pharmaceutical Companies

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M.; Cai, Yu

    2015-01-01

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378

  4. Trade secrets in life science and pharmaceutical companies.

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M; Cai, Yu

    2014-11-20

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  5. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  6. Neural decoding of visual imagery during sleep.

    Science.gov (United States)

    Horikawa, T; Tamaki, M; Miyawaki, Y; Kamitani, Y

    2013-05-03

    Visual imagery during sleep has long been a topic of persistent speculation, but its private nature has hampered objective analysis. Here we present a neural decoding approach in which machine-learning models predict the contents of visual imagery during the sleep-onset period, given measured brain activity, by discovering links between human functional magnetic resonance imaging patterns and verbal reports with the assistance of lexical and image databases. Decoding models trained on stimulus-induced brain activity in visual cortical areas showed accurate classification, detection, and identification of contents. Our findings demonstrate that specific visual experience during sleep is represented by brain activity patterns shared by stimulus perception, providing a means to uncover subjective contents of dreaming using objective neural measurement.

  7. 5 CFR 1312.27 - Top secret control.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...

  8. Effect of adrenal hormones on thyroid secretion and thyroid hormones on adrenal secretion in the sheep.

    Science.gov (United States)

    Falconer, I R; Jacks, F

    1975-01-01

    1. Previous work has shown that after stressful stimuli, sheep initially secrete increased amounts of thyroid hormone, at a time when adrenal secretion is also elevated. 2. This study was designed to evaluate (a) any short-term activation or inhibition of thyroid secretion by exogenous cortisol or ACTH administered in quantities comparable to those secreted after stress in sheep and (b) any short-term effect that exogenous thyroxine or triiodothyronine may have on the concentration of plasma cortisol in the sheep. 3. Thyroid activity was measured by determination of plasma protein bound 125I (PB125I) and total 125I in thyroid vein and mixed venous (jugular) blood. Plasma cortisol and thyroxine concentrations were measured by a competitive protein-binding assay at intervals for up to 5 hr after commencement of the experiment. 4. No evidence of an activation of thyroid secretion was found during cortisol or ACTH infusion, as monitored by thyroid vein PB125I. Similarly there was no evidence of any inhibition of thyroid function, as measured by continued secretion of thyroid hormones into thyroid vein blood. 5. No effect on plasma cortisol concentration due to thyroid hormone treatment was observed. 6. It was concluded that (a) elevated circulating corticosteroids in physiological concentrations have no short-term effects on thyroid activity in the sheep and (b) the short-term alterations in thyroid and adrenal cortical secretion observed during stress in the sheep could not be attributed to direct interaction of elevated thyroid hormone concentrations with adrenal cortical secretion. PMID:170400

  9. Secretion Trap Tagging of Secreted and Membrane-Spanning Proteins Using Arabidopsis Gene Traps

    Science.gov (United States)

    Andrew T. Groover; Joseph R. Fontana; Juana M. Arroyo; Cristina Yordan; W. Richard McCombie; Robert A. Martienssen

    2003-01-01

    Secreted and membrane-spanning proteins play fundamental roles in plant development but pose challenges for genetic identification and characterization. We describe a "secretion trap" screen for gene trap insertions in genes encoding proteins routed through the secretory pathway. The gene trap transposon encodes a ß-glucuronidase reporter enzyme...

  10. 22 CFR 1421.15 - Secret ballot.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...

  11. BrainBrowser: distributed, web-based neurological data visualization

    Directory of Open Access Journals (Sweden)

    Tarek eSherif

    2015-01-01

    Full Text Available Recent years have seen massive, distributed datasets become the norm in neuroimaging research, and the methodologies used analyze them have, in response, become more collaborative and exploratory. Tools and infrastructure are continuously being developed and deployed to facilitate research in this context: grid computation platforms to process the data, distributed data stores to house and share them, high-speed networks to move them around and collaborative, often web-based, platforms to provide access to and sometimes manage the entire system. BrainBrowser is a lightweight, high-performance JavaScript visualization library built to provide easy-to-use, powerful, on-demand visualization of remote datasets in this new research environment. BrainBrowser leverages modern Web technologies, such as WebGL, HTML5 and Web Workers, to visualize 3D surface and volumetric neuroimaging data in any modern web browser without requiring any browser plugins. It is thus trivial to integrate BrainBrowser into any web-based platform. BrainBrowser is simple enough to produce a basic web-based visualization in a few lines of code, while at the same time being robust enough to create full-featured visualization applications. BrainBrowser can dynamically load the data required for a given visualization, so no network bandwidth needs to be waisted on data that will not be used. BrainBrowser's integration into the standardized web platform also allows users to consider using 3D data visualization in novel ways, such as for data distribution, data sharing and dynamic online publications. BrainBrowser is already being used in two major online platforms, CBRAIN and LORIS, and has been used to make the 1TB MACACC dataset openly accessible.

  12. Enhancing knowledge sharing management using BIM technology in construction.

    Science.gov (United States)

    Ho, Shih-Ping; Tserng, Hui-Ping; Jan, Shu-Hui

    2013-01-01

    Construction knowledge can be communicated and reused among project managers and jobsite engineers to alleviate problems on a construction jobsite and reduce the time and cost of solving problems related to constructability. This paper proposes a new methodology for the sharing of construction knowledge by using Building Information Modeling (BIM) technology. The main characteristics of BIM include illustrating 3D CAD-based presentations and keeping information in a digital format and facilitation of easy updating and transfer of information in the BIM environment. Using the BIM technology, project managers and engineers can gain knowledge related to BIM and obtain feedback provided by jobsite engineers for future reference. This study addresses the application of knowledge sharing management using BIM technology and proposes a BIM-based Knowledge Sharing Management (BIMKSM) system for project managers and engineers. The BIMKSM system is then applied in a selected case study of a construction project in Taiwan to demonstrate the effectiveness of sharing knowledge in the BIM environment. The results demonstrate that the BIMKSM system can be used as a visual BIM-based knowledge sharing management platform by utilizing the BIM technology.

  13. Visual Working Memory Enhances the Neural Response to Matching Visual Input.

    Science.gov (United States)

    Gayet, Surya; Guggenmos, Matthias; Christophel, Thomas B; Haynes, John-Dylan; Paffen, Chris L E; Van der Stigchel, Stefan; Sterzer, Philipp

    2017-07-12

    Visual working memory (VWM) is used to maintain visual information available for subsequent goal-directed behavior. The content of VWM has been shown to affect the behavioral response to concurrent visual input, suggesting that visual representations originating from VWM and from sensory input draw upon a shared neural substrate (i.e., a sensory recruitment stance on VWM storage). Here, we hypothesized that visual information maintained in VWM would enhance the neural response to concurrent visual input that matches the content of VWM. To test this hypothesis, we measured fMRI BOLD responses to task-irrelevant stimuli acquired from 15 human participants (three males) performing a concurrent delayed match-to-sample task. In this task, observers were sequentially presented with two shape stimuli and a retro-cue indicating which of the two shapes should be memorized for subsequent recognition. During the retention interval, a task-irrelevant shape (the probe) was briefly presented in the peripheral visual field, which could either match or mismatch the shape category of the memorized stimulus. We show that this probe stimulus elicited a stronger BOLD response, and allowed for increased shape-classification performance, when it matched rather than mismatched the concurrently memorized content, despite identical visual stimulation. Our results demonstrate that VWM enhances the neural response to concurrent visual input in a content-specific way. This finding is consistent with the view that neural populations involved in sensory processing are recruited for VWM storage, and it provides a common explanation for a plethora of behavioral studies in which VWM-matching visual input elicits a stronger behavioral and perceptual response. SIGNIFICANCE STATEMENT Humans heavily rely on visual information to interact with their environment and frequently must memorize such information for later use. Visual working memory allows for maintaining such visual information in the mind

  14. Alternative protein secretion: The Mam1 ABC transporter supports secretion of M-factor linked GFP in fission yeast

    International Nuclear Information System (INIS)

    Kjaerulff, Soren; Mueller, Sven; Jensen, Martin Roland

    2005-01-01

    To examine whether the fission yeast Mam1 ABC transporter can be used for secretion of heterologous proteins, thereby bypassing the classical secretion pathway, we have analyzed chimeric forms of the M-factor precursor. It was demonstrated that GFP can be exported when fused to both the amino-terminal prosequence from mfm1 and a CaaX motif. This secretion was dependent on the Mam1 transporter and not the classical secretion pathway. The secretion efficiency of GFP, however, was relatively low and most of the reporter protein was trapped in the vacuolar membranes. Our findings suggest that the Mam1 ABC protein is a promiscuous peptide transporter that can accommodate globular proteins of a relatively large size. Furthermore, our results help in defining the sequences required for processing and secretion of natural M-factor

  15. Discrete-Slots Models of Visual Working-Memory Response Times

    Science.gov (United States)

    Donkin, Christopher; Nosofsky, Robert M.; Gold, Jason M.; Shiffrin, Richard M.

    2014-01-01

    Much recent research has aimed to establish whether visual working memory (WM) is better characterized by a limited number of discrete all-or-none slots or by a continuous sharing of memory resources. To date, however, researchers have not considered the response-time (RT) predictions of discrete-slots versus shared-resources models. To complement the past research in this field, we formalize a family of mixed-state, discrete-slots models for explaining choice and RTs in tasks of visual WM change detection. In the tasks under investigation, a small set of visual items is presented, followed by a test item in 1 of the studied positions for which a change judgment must be made. According to the models, if the studied item in that position is retained in 1 of the discrete slots, then a memory-based evidence-accumulation process determines the choice and the RT; if the studied item in that position is missing, then a guessing-based accumulation process operates. Observed RT distributions are therefore theorized to arise as probabilistic mixtures of the memory-based and guessing distributions. We formalize an analogous set of continuous shared-resources models. The model classes are tested on individual subjects with both qualitative contrasts and quantitative fits to RT-distribution data. The discrete-slots models provide much better qualitative and quantitative accounts of the RT and choice data than do the shared-resources models, although there is some evidence for “slots plus resources” when memory set size is very small. PMID:24015956

  16. Cloned Erwinia chrysanthemi out genes enable Escherichia coli to selectively secrete a diverse family of heterologous proteins to its milieu.

    Science.gov (United States)

    He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A

    1991-02-01

    The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged.

  17. 29 CFR 401.11 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...

  18. Inhibition of type VI secretion by an anti-TssM llama nanobody.

    Directory of Open Access Journals (Sweden)

    Van Son Nguyen

    Full Text Available The type VI secretion system (T6SS is a secretion pathway widespread in Gram-negative bacteria that targets toxins in both prokaryotic and eukaryotic cells. Although most T6SSs identified so far are involved in inter-bacterial competition, a few are directly required for full virulence of pathogens. The T6SS comprises 13 core proteins that assemble a large complex structurally and functionally similar to a phage contractile tail structure anchored to the cell envelope by a trans-membrane spanning stator. The central part of this stator, TssM, is a 1129-amino-acid protein anchored in the inner membrane that binds to the TssJ outer membrane lipoprotein. In this study, we have raised camelid antibodies against the purified TssM periplasmic domain. We report the crystal structure of two specific nanobodies that bind to TssM in the nanomolar range. Interestingly, the most potent nanobody, nb25, competes with the TssJ lipoprotein for TssM binding in vitro suggesting that TssJ and the nb25 CDR3 loop share the same TssM binding site or causes a steric hindrance preventing TssM-TssJ complex formation. Indeed, periplasmic production of the nanobodies displacing the TssM-TssJ interaction inhibits the T6SS function in vivo. This study illustrates the power of nanobodies to specifically target and inhibit bacterial secretion systems.

  19. 29 CFR 1202.4 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...

  20. The Secret of Future Victories

    Science.gov (United States)

    1992-02-01

    Copy S of 320 copies AD--A25 0 718 IDA PAPER P-265 3 THE SECRET OF FUTURE VICTORIES Paul F. Gormnan General, USA (Retired) DTIC 05M February 1992 NAY...TYPE AND DATES COVERED IFebruary 1992 Final--June 1991-January 1992 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS The Secret of Future Victories C -MDA...8 2N0-102 IDA PAPER P-2653 THE SECRET OF FUTURE VICTORIES Paul F. Gorman General. LUSA (Retired) February 1992 Approved for public release

  1. Current Therapies That Modify Glucagon Secretion

    DEFF Research Database (Denmark)

    Grøndahl, Magnus F.; Keating, Damien J.; Vilsbøll, Tina

    2017-01-01

    and provide insights into how antidiabetic drugs influence glucagon secretion as well as a perspective on the future of glucagon-targeting drugs. Recent Findings: Several older as well as recent investigations have evaluated the effect of antidiabetic agents on glucagon secretion to understand how glucagon...... may be involved in the drugs’ efficacy and safety profiles. Based on these findings, modulation of glucagon secretion seems to play a hitherto underestimated role in the efficacy and safety of several glucose-lowering drugs. Summary: Numerous drugs currently available to diabetologists are capable...... of altering glucagon secretion: metformin, sulfonylurea compounds, insulin, glucagon-like peptide-1 receptor agonists, dipeptidyl peptidase-4 inhibitors, sodium-glucose cotransporter 2 inhibitors and amylin mimetics. Their diverse effects on glucagon secretion are of importance for their individual efficacy...

  2. Characterization of a secreted Chlamydia protease

    DEFF Research Database (Denmark)

    Shaw, A.C.; Vandahl, B.B.; Larsen, M.R.

    2002-01-01

    Chlamydiae are obligate intracellular bacteria that are important human pathogens. The Chlamydia genomes contain orthologues to secretion apparatus proteins from other intracellular bacteria, but only a few secreted proteins have been identified. Most likely, effector proteins are secreted in order...... to promote infection. Effector proteins cannot be identified by motif or similarity searches. As a new strategy for identification of secreted proteins we have compared 2D-PAGE profiles of [35S]-labelled Chlamydia proteins from whole lysates of infected cells to 2D-PAGE profiles of proteins from purified...... Chlamydia. Several secretion candidates from Chlamydia trachomatis D and Chlamydia pneumoniae were detected by this method. Two protein spots were identified among the candidates. These represent fragments of the 'chlamydial protease- or proteasome-like activity factor' (CPAF) and were clearly present in 2D...

  3. Inattentional Deafness: Visual Load Leads to Time-Specific Suppression of Auditory Evoked Responses.

    Science.gov (United States)

    Molloy, Katharine; Griffiths, Timothy D; Chait, Maria; Lavie, Nilli

    2015-12-09

    Due to capacity limits on perception, conditions of high perceptual load lead to reduced processing of unattended stimuli (Lavie et al., 2014). Accumulating work demonstrates the effects of visual perceptual load on visual cortex responses, but the effects on auditory processing remain poorly understood. Here we establish the neural mechanisms underlying "inattentional deafness"--the failure to perceive auditory stimuli under high visual perceptual load. Participants performed a visual search task of low (target dissimilar to nontarget items) or high (target similar to nontarget items) load. On a random subset (50%) of trials, irrelevant tones were presented concurrently with the visual stimuli. Brain activity was recorded with magnetoencephalography, and time-locked responses to the visual search array and to the incidental presence of unattended tones were assessed. High, compared to low, perceptual load led to increased early visual evoked responses (within 100 ms from onset). This was accompanied by reduced early (∼ 100 ms from tone onset) auditory evoked activity in superior temporal sulcus and posterior middle temporal gyrus. A later suppression of the P3 "awareness" response to the tones was also observed under high load. A behavioral experiment revealed reduced tone detection sensitivity under high visual load, indicating that the reduction in neural responses was indeed associated with reduced awareness of the sounds. These findings support a neural account of shared audiovisual resources, which, when depleted under load, leads to failures of sensory perception and awareness. The present work clarifies the neural underpinning of inattentional deafness under high visual load. The findings of near-simultaneous load effects on both visual and auditory evoked responses suggest shared audiovisual processing capacity. Temporary depletion of shared capacity in perceptually demanding visual tasks leads to a momentary reduction in sensory processing of auditory

  4. EFFECTS OF SECRETABLE PLACENTAL FACTORS UPON SECRETION OF CYTOKINES BY THP-1 MONOCYTE-LIKE CELLS

    Directory of Open Access Journals (Sweden)

    Ya. S. Onokhina

    2013-01-01

    Full Text Available Abstract. Мonocytes in feto-placental circulation are exposed to factors secreted by placental tissue. These factors influence monocyte functions in pregnancy. In present study, an in vitro model (monocyte-like THP-1 cells was used for assessing effects of soluble placental factors obtained from women with physiological pregnancies, or preeclampsia cases. The following effects of placental factors were revealed: increased secretion of VEGF by THP-1 cells along with decreased secretion of IL-6, IL-8 and MCP-1 under the influence of placental factors from the I. trimester of pregnancy in comparison with III. trimester. Secretion of IL-6 and MCP-1 by THP-1 cells was increased, and secretion of soluble TNFRII was decreased upon co-cultivation with soluble placental factors from the women with preeclampsia, as compared with placental products from physiological pregnancies.The work is supported by grants ГК № 02.740.11.0711 from Ministry of Education and Science, and НШ-3594.2010.7 grant from the President of Russian Federation.

  5. 5 CFR 2421.15 - Secret ballot.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Secret ballot. 2421.15 Section 2421.15... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine or otherwise, but in no event by proxy, of a...

  6. 29 CFR 452.97 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 452.97 Section 452.97 Labor Regulations... OF 1959 Election Procedures; Rights of Members § 452.97 Secret ballot. (a) A prime requisite of elections regulated by title IV is that they be held by secret ballot among the members or in appropriate...

  7. Recent Advances in Geospatial Visualization with the New Google Earth

    Science.gov (United States)

    Anderson, J. C.; Poyart, E.; Yan, S.; Sargent, R.

    2017-12-01

    Google Earth's detailed, world-wide imagery and terrain data provide a rich backdrop for geospatial visualization at multiple scales, from global to local. The Keyhole Markup Language (KML) is an open standard that has been the primary way for users to author and share data visualizations in Google Earth. Despite its ease of use and flexibility for relatively small amounts of data, users can quickly run into difficulties and limitations working with large-scale or time-varying datasets using KML in Google Earth. Recognizing these challenges, we present our recent work toward extending Google Earth to be a more powerful data visualization platform. We describe a new KML extension to simplify the display of multi-resolution map tile pyramids - which can be created by analysis platforms like Google Earth Engine, or by a variety of other map tile production pipelines. We also describe how this implementation can pave the way to creating novel data visualizations by leveraging custom graphics shaders. Finally, we present our investigations into native support in Google Earth for data storage and transport formats that are well-suited for big raster and vector data visualization. Taken together, these capabilities make it easier to create and share new scientific data visualization experiences using Google Earth, and simplify the integration of Google Earth with existing map data products, services, and analysis pipelines.

  8. Secretive eating among youth with overweight or obesity.

    Science.gov (United States)

    Kass, Andrea E; Wilfley, Denise E; Eddy, Kamryn T; Boutelle, Kerri N; Zucker, Nancy; Peterson, Carol B; Le Grange, Daniel; Celio-Doyle, Angela; Goldschmidt, Andrea B

    2017-07-01

    Secretive eating, characterized by eating privately to conceal being seen, may reflect eating- and/or body-related shame, be associated with depression, and correlate with binge eating, which predicts weight gain and eating disorder onset. Increasing understanding of secretive eating in youth may improve weight status and reduce eating disorder risk. This study evaluated the prevalence and correlates of secretive eating in youth with overweight or obesity. Youth (N = 577) presented to five research/clinical institutions. Using a cross-sectional design, secretive eating was evaluated in relation to eating-related and general psychopathology via linear and logistic regression analyses. Secretive eating was endorsed by 111 youth, who were, on average, older than youth who denied secretive eating (mean age = 12.07 ± 2.83 versus 10.97 ± 2.31). Controlling for study site and age, youth who endorsed secretive eating had higher eating-related psychopathology and were more likely to endorse loss of control eating and purging than their counterparts who did not endorse secretive eating. Groups did not differ in excessive exercise or behavioral problems. Dietary restraint and purging were elevated among adolescents (≥13y) but not children (<13y) who endorsed secretive eating; depression was elevated among children, but not adolescents, who endorsed secretive eating. Secretive eating may portend heightened risk for eating disorders, and correlates of secretive eating may differ across pediatric development. Screening for secretive eating may inform identification of problematic eating behaviors, and understanding factors motivating secretive eating may improve intervention tailoring. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Semantic and visual determinants of face recognition in a prosopagnosic patient.

    Science.gov (United States)

    Dixon, M J; Bub, D N; Arguin, M

    1998-05-01

    Prosopagnosia is the neuropathological inability to recognize familiar people by their faces. It can occur in isolation or can coincide with recognition deficits for other nonface objects. Often, patients whose prosopagnosia is accompanied by object recognition difficulties have more trouble identifying certain categories of objects relative to others. In previous research, we demonstrated that objects that shared multiple visual features and were semantically close posed severe recognition difficulties for a patient with temporal lobe damage. We now demonstrate that this patient's face recognition is constrained by these same parameters. The prosopagnosic patient ELM had difficulties pairing faces to names when the faces shared visual features and the names were semantically related (e.g., Tonya Harding, Nancy Kerrigan, and Josee Chouinard -three ice skaters). He made tenfold fewer errors when the exact same faces were associated with semantically unrelated people (e.g., singer Celine Dion, actress Betty Grable, and First Lady Hillary Clinton). We conclude that prosopagnosia and co-occurring category-specific recognition problems both stem from difficulties disambiguating the stored representations of objects that share multiple visual features and refer to semantically close identities or concepts.

  10. Attentional Capture to a Singleton Distractor Degrades Visual Marking in Visual Search

    Directory of Open Access Journals (Sweden)

    Kenji Yamauchi

    2017-05-01

    Full Text Available Visual search is easier after observing some distractors in advance; it is as if the previewed distractors were excluded from the search. This effect is referred to as the preview benefit, and a memory template that visually marks the old locations of the distractors is thought to help in prioritizing the locations of newly presented items. One remaining question is whether the presence of a conspicuous item during the sequential shift of attention within the new items reduces this preview benefit. To address this issue, we combined the above preview search and a conventional visual search paradigm using a singleton distractor and examined whether the search performance was affected by the presence of the singleton. The results showed that the slope of reaction time as a function of set size became steeper in the presence of a singleton, indicating that the singleton distractor reduced the preview benefit. Furthermore, this degradation effect was positively correlated with the degree of conventional attentional capture to a singleton measured in a separate experiment with simultaneous search. These findings suggest that the mechanism of visual marking shares common attentional resources with the search process.

  11. Extracellular secretion of a recombinant therapeutic peptide by Bacillus halodurans utilizing a modified flagellin type III secretion system

    CSIR Research Space (South Africa)

    Berger, E

    2011-08-01

    Full Text Available further 3.5-fold increase in the secretion of recombinant peptide fusions. Conclusions: The type III flagellar secretion system of B. halodurans has been shown to successfully secrete a therapeutic peptide as a heterologous flagellin fusion. Improvements...

  12. Visual perception and imagery: a new molecular hypothesis.

    Science.gov (United States)

    Bókkon, I

    2009-05-01

    Here, we put forward a redox molecular hypothesis about the natural biophysical substrate of visual perception and visual imagery. This hypothesis is based on the redox and bioluminescent processes of neuronal cells in retinotopically organized cytochrome oxidase-rich visual areas. Our hypothesis is in line with the functional roles of reactive oxygen and nitrogen species in living cells that are not part of haphazard process, but rather a very strict mechanism used in signaling pathways. We point out that there is a direct relationship between neuronal activity and the biophoton emission process in the brain. Electrical and biochemical processes in the brain represent sensory information from the external world. During encoding or retrieval of information, electrical signals of neurons can be converted into synchronized biophoton signals by bioluminescent radical and non-radical processes. Therefore, information in the brain appears not only as an electrical (chemical) signal but also as a regulated biophoton (weak optical) signal inside neurons. During visual perception, the topological distribution of photon stimuli on the retina is represented by electrical neuronal activity in retinotopically organized visual areas. These retinotopic electrical signals in visual neurons can be converted into synchronized biophoton signals by radical and non-radical processes in retinotopically organized mitochondria-rich areas. As a result, regulated bioluminescent biophotons can create intrinsic pictures (depictive representation) in retinotopically organized cytochrome oxidase-rich visual areas during visual imagery and visual perception. The long-term visual memory is interpreted as epigenetic information regulated by free radicals and redox processes. This hypothesis does not claim to solve the secret of consciousness, but proposes that the evolution of higher levels of complexity made the intrinsic picture representation of the external visual world possible by regulated

  13. Pituitary-hormone secretion by thyrotropinomas

    NARCIS (Netherlands)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading

  14. Toolkit for visualization of the cellular structure and organelles in Aspergillus niger.

    Science.gov (United States)

    Buren, Emiel B J Ten; Karrenbelt, Michiel A P; Lingemann, Marit; Chordia, Shreyans; Deng, Ying; Hu, JingJing; Verest, Johanna M; Wu, Vincen; Gonzalez, Teresita J Bello; Heck, Ruben G A van; Odoni, Dorett I; Schonewille, Tom; Straat, Laura van der; Graaff, Leo H de; Passel, Mark W J van

    2014-12-19

    Aspergillus niger is a filamentous fungus that is extensively used in industrial fermentations for protein expression and the production of organic acids. Inherent biosynthetic capabilities, such as the capacity to secrete these biomolecules in high amounts, make A. niger an attractive production host. Although A. niger is renowned for this ability, the knowledge of the molecular components that underlie its production capacity, intercellular trafficking processes and secretion mechanisms is far from complete. Here, we introduce a standardized set of tools, consisting of an N-terminal GFP-actin fusion and codon optimized eforRed chromoprotein. Expression of the GFP-actin construct facilitates visualization of the actin filaments of the cytoskeleton, whereas expression of the chromoprotein construct results in a clearly distinguishable red phenotype. These experimentally validated constructs constitute the first set of standardized A. niger biomarkers, which can be used to study morphology, intercellular trafficking, and secretion phenomena.

  15. Teach yourself visually WordPress

    CERN Document Server

    Majure, Janet

    2012-01-01

    Get your blog up and running with the latest version of WordPress WordPress is one of the most popular, easy-to-use blogging platforms and allows you to create a dynamic and engaging blog, even if you have no programming skills or experience. Ideal for the visual learner, Teach Yourself VISUALLY WordPress, Second Edition introduces you to the exciting possibilities of the newest version of WordPress and helps you get started, step by step, with creating and setting up a WordPress site. Author and experienced WordPress user Janet Majure shares advice, insight, and best practices for taking full

  16. Differences and Similarities among Parotoid Macrogland Secretions in South American Toads: A Preliminary Biochemical Delineation

    Directory of Open Access Journals (Sweden)

    Juliana Mozer Sciani

    2013-01-01

    Full Text Available Amphibians are known by cutaneous glands, spread over the skin, containing toxins (proteins, peptides, biogenic amines, steroidal bufadienolides, and alkaloids used as chemical defense against predators and microbial infection. Toads are characterized by the presence of parotoid macroglands. The common toads have lately been divided into two genera: Bufo (Europe, Asia, and Africa and Rhinella (South America. Basal Rhaebo genus is exclusively of Central America and Amazon region. Although Rhinella and Rhaebo are related, species may share differences due to the diversity of environments that they live in. In this work, we have performed a biochemical characterization of the components of the poison of eight Rhinella species and one Rhaebo by means of RP-HPLC with either UV or MS detection and by SDS-PAGE, in order to verify whether phylogenetic and biological differences, such as habitat, diet, and defensive strategies, between them may also be reflected in poison composition. Although some components were common among the secretions, we were able to identify exclusive molecules to some species. The fact that closely related animals living in different habitats secrete different molecules into the skin is an indication that biological features, and not only evolution, seem to directly influence the skin secretion composition.

  17. Normal and abnormal secretion by haemopoietic cells

    Science.gov (United States)

    STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M

    2001-01-01

    The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687

  18. Learning Category-Specific Dictionary and Shared Dictionary for Fine-Grained Image Categorization.

    Science.gov (United States)

    Gao, Shenghua; Tsang, Ivor Wai-Hung; Ma, Yi

    2014-02-01

    This paper targets fine-grained image categorization by learning a category-specific dictionary for each category and a shared dictionary for all the categories. Such category-specific dictionaries encode subtle visual differences among different categories, while the shared dictionary encodes common visual patterns among all the categories. To this end, we impose incoherence constraints among the different dictionaries in the objective of feature coding. In addition, to make the learnt dictionary stable, we also impose the constraint that each dictionary should be self-incoherent. Our proposed dictionary learning formulation not only applies to fine-grained classification, but also improves conventional basic-level object categorization and other tasks such as event recognition. Experimental results on five data sets show that our method can outperform the state-of-the-art fine-grained image categorization frameworks as well as sparse coding based dictionary learning frameworks. All these results demonstrate the effectiveness of our method.

  19. Some Economics of Trade Secret Law

    OpenAIRE

    David D. Friedman; William M. Landes; Richard A. Posner

    1991-01-01

    Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.

  20. Physiology of bile secretion.

    Science.gov (United States)

    Esteller, Alejandro

    2008-10-07

    The formation of bile depends on the structural and functional integrity of the bile-secretory apparatus and its impairment, in different situations, results in the syndrome of cholestasis. The structural bases that permit bile secretion as well as various aspects related with its composition and flow rate in physiological conditions will first be reviewed. Canalicular bile is produced by polarized hepatocytes that hold transporters in their basolateral (sinusoidal) and apical (canalicular) plasma membrane. This review summarizes recent data on the molecular determinants of this primary bile formation. The major function of the biliary tree is modification of canalicular bile by secretory and reabsorptive processes in bile-duct epithelial cells (cholangiocytes) as bile passes through bile ducts. The mechanisms of fluid and solute transport in cholangiocytes will also be discussed. In contrast to hepatocytes where secretion is constant and poorly controlled, cholangiocyte secretion is regulated by hormones and nerves. A short section dedicated to these regulatory mechanisms of bile secretion has been included. The aim of this revision was to set the bases for other reviews in this series that will be devoted to specific issues related with biliary physiology and pathology.

  1. Involving, Sharing, Analysing—Potential of the Participatory Photo Interview

    Directory of Open Access Journals (Sweden)

    Bettina Kolb

    2008-09-01

    Full Text Available This article discusses the photo interview method used in a participatory inter- and transdisciplinary research setting. The photo interview has proven particularly useful for sustainability and environmental studies in which eliciting community points of view is crucial to the research effort. Based on experiences in several countries, the author describes and analyses the photo interview process and its three phases—involving, sharing and analysing—and explores potential influences on data quality. In the first phase, researchers use the photo interview method to involve community residents from different levels of society in the research process. In the second phase, the photo interview method encourages community residents and scientists to share insights and perspectives and to partner in developing a common understanding of local structures, processes, and possible solutions. In the third phase, the photo interview method allows researchers to analyse visual and textual data as a representation of a local societal context. In decoding images, researchers ground the analysis in subjective perspectives, use residents' visual codes along with other methods to further analyse community data, and explore the wider societal context in which the study is embedded. URN: urn:nbn:de:0114-fqs0803127

  2. Unconventional Pathways of Secretion Contribute to Inflammation

    Directory of Open Access Journals (Sweden)

    Michael J. D. Daniels

    2017-01-01

    Full Text Available In the conventional pathway of protein secretion, leader sequence-containing proteins leave the cell following processing through the endoplasmic reticulum (ER and Golgi body. However, leaderless proteins also enter the extracellular space through mechanisms collectively known as unconventional secretion. Unconventionally secreted proteins often have vital roles in cell and organism function such as inflammation. Amongst the best-studied inflammatory unconventionally secreted proteins are interleukin (IL-1β, IL-1α, IL-33 and high-mobility group box 1 (HMGB1. In this review we discuss the current understanding of the unconventional secretion of these proteins and highlight future areas of research such as the role of nuclear localisation.

  3. Proton pump inhibitors inhibit pancreatic secretion

    DEFF Research Database (Denmark)

    Wang, Jing; Barbuskaite, Dagne; Tozzi, Marco

    2015-01-01

    +/K+-ATPases are expressed and functional in human pancreatic ducts and whether proton pump inhibitors (PPIs) have effect on those. Here we show that the gastric HKα1 and HKβ subunits (ATP4A; ATP4B) and non-gastric HKα2 subunits (ATP12A) of H+/K+-ATPases are expressed in human pancreatic cells. Pumps have similar...... of major ions in secretion follow similar excretory curves in control and PPI treated animals. In addition to HCO3-, pancreas also secretes K+. In conclusion, this study calls for a revision of the basic model for HCO3- secretion. We propose that proton transport is driving secretion, and that in addition...

  4. Hoopoes color their eggs with antimicrobial uropygial secretions

    Science.gov (United States)

    Soler, Juan J.; Martín-Vivaldi, M.; Peralta-Sánchez, J. M.; Arco, L.; Juárez-García-Pelayo, N.

    2014-09-01

    Uropygial gland secretions are used as cosmetics by some species of birds to color and enhance properties of feathers and teguments, which may signal individual quality. Uropygial secretions also reach eggshells during incubation and, therefore, may influence the coloration of birds' eggs, a trait that has attracted the attention of evolutionary biologists for more than one century. The color of hoopoe eggs typically changes along incubation, from bluish-gray to greenish-brown. Here, we test experimentally the hypothesis that dark uropygial secretion of females is responsible for such drastic color change. Moreover, since uropygial secretion of hoopoes has antimicrobial properties, we also explore the association between color and antimicrobial activity of the uropygial secretion of females. We found that eggs stayed bluish-gray in nests where female access to the uropygial secretion was experimentally blocked. Furthermore, experimental eggs that were maintained in incubators and manually smeared with uropygial secretion experienced similar color changes that naturally incubated eggs did, while control eggs that were not in contact with the secretions did not experience such color changes. All these results strongly support the hypothesis that female hoopoes use their uropygial gland secretion to color the eggs. Moreover, saturation of the uropygial secretion was associated with antimicrobial activity against Bacillus licheniformis. Given the known antimicrobial potential of uropygial secretions of birds, this finding opens the possibility that in scenarios of sexual selection, hoopoes in particular and birds in general signal antimicrobial properties of their uropygial secretion by mean of changes in egg coloration along incubation.

  5. The role of jasmonates in floral nectar secretion.

    Directory of Open Access Journals (Sweden)

    Venkatesan Radhika

    Full Text Available Plants produce nectar in their flowers as a reward for their pollinators and most of our crops depend on insect pollination, but little is known on the physiological control of nectar secretion. Jasmonates are well-known for their effects on senescence, the development and opening of flowers and on plant defences such as extrafloral nectar. Their role in floral nectar secretion has, however, not been explored so far. We investigated whether jasmonates have an influence on floral nectar secretion in oil-seed rape, Brassica napus. The floral tissues of this plant produced jasmonic acid (JA endogenously, and JA concentrations peaked shortly before nectar secretion was highest. Exogenous application of JA to flowers induced nectar secretion, which was suppressed by treatment with phenidone, an inhibitor of JA synthesis. This effect could be reversed by additional application of JA. Jasmonoyl-isoleucine and its structural mimic coronalon also increased nectar secretion. Herbivory or addition of JA to the leaves did not have an effect on floral nectar secretion, demonstrating a functional separation of systemic defence signalling from reproductive nectar secretion. Jasmonates, which have been intensively studied in the context of herbivore defences and flower development, have a profound effect on floral nectar secretion and, thus, pollination efficiency in B. napus. Our results link floral nectar secretion to jasmonate signalling and thereby integrate the floral nectar secretion into the complex network of oxylipid-mediated developmental processes of plants.

  6. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  7. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  8. Membrane fusion proteins of type I secretion system and tripartite efflux pumps share a binding motif for TolC in gram-negative bacteria.

    Directory of Open Access Journals (Sweden)

    Minho Lee

    Full Text Available The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA. In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed.

  9. Pancreatic bicarbonate secretion involves two proton pumps

    DEFF Research Database (Denmark)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L.

    2011-01-01

    Pancreas secretes fluid rich in digestive enzymes and bicarbonate. The alkaline secretion is important in buffering of acid chyme entering duodenum and for activation of enzymes. This secretion is formed in pancreatic ducts, and studies to date show that plasma membranes of duct epithelium expres...

  10. Gastric secretion elicited by conditioning in rats.

    Science.gov (United States)

    Caboclo, José Liberato Ferreira; Cury, Francico de Assis; Borin, Aldenis Albanese; Caboclo, Luís Otávio Sales Ferreira; Ribeiro, Maria Fernanda Sales Caboclo; de Freitas, Pedro José; Andersson, Sven

    2009-01-01

    To investigate whether interdigestive gastric acid secretion can be controlled by a possible memory-related cortical mechanism. To evaluate gastric secretion in rats, we used a methodology that allows gastric juice collection in rats in their habitual conditions (without any restraining) by pairing sound as the conditioning stimulus (CS) and food as the unconditioning stimulus (US). The levels of gastric acid secretion under basal conditions and under sound stimulation were recorded and the circulating gastrin levels determined. When the gastric juice was collected in the course of the conditioning procedure, the results showed that under noise stimulation a significant increase in gastric acid secretion occurred after 10 days of conditioning (p<0.01). The significance was definitively demonstrated after 13 days of conditioning (p<0.001). Basal secretions of the conditioned rats reached a significant level after 16 days of conditioning. The levels of noise-stimulated gastric acid secretion were the highest so far described in physiological experiments carried out in rats and there were no significant increases in the circulating gastrin levels. The results point to the important role played by cortical structures in the control of interdigestive gastric acid secretion in rats. If this mechanism is also present in humans, it may be involved in diseases caused by inappropriate gastric acid secretion during the interprandial periods.

  11. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  12. Molecular mechanism to recruit galectin-3 into multivesicular bodies for polarized exosomal secretion.

    Science.gov (United States)

    Bänfer, Sebastian; Schneider, Dominik; Dewes, Jenny; Strauss, Maximilian T; Freibert, Sven-A; Heimerl, Thomas; Maier, Uwe G; Elsässer, Hans-Peter; Jungmann, Ralf; Jacob, Ralf

    2018-05-08

    The beta-galactoside binding lectin galectin-3 (Gal3) is found intracellularly and in the extracellular space. Secretion of this lectin is mediated independently of the secretory pathway by a not yet defined nonclassical mechanism. Here, we found Gal3 in the lumen of exosomes. Superresolution and electron microscopy studies visualized Gal3 recruitment and sorting into intraluminal vesicles. Exosomal Gal3 release depends on the endosomal sorting complex required for transport I (ESCRT-I) component Tsg101 and functional Vps4a. Either Tsg101 knockdown or expression of dominant-negative Vps4a E228Q causes an intracellular Gal3 accumulation at multivesicular body formation sites. In addition, we identified a highly conserved tetrapeptide P(S/T)AP motif in the amino terminus of Gal3 that mediates a direct interaction with Tsg101. Mutation of the P(S/T)AP motif results in a loss of interaction and a dramatic decrease in exosomal Gal3 secretion. We conclude that Gal3 is a member of endogenous non-ESCRT proteins which are P(S/T)AP tagged for exosomal release.

  13. Correlated individual differences suggest a common mechanism underlying metacognition in visual perception and visual short-term memory.

    Science.gov (United States)

    Samaha, Jason; Postle, Bradley R

    2017-11-29

    Adaptive behaviour depends on the ability to introspect accurately about one's own performance. Whether this metacognitive ability is supported by the same mechanisms across different tasks is unclear. We investigated the relationship between metacognition of visual perception and metacognition of visual short-term memory (VSTM). Experiments 1 and 2 required subjects to estimate the perceived or remembered orientation of a grating stimulus and rate their confidence. We observed strong positive correlations between individual differences in metacognitive accuracy between the two tasks. This relationship was not accounted for by individual differences in task performance or average confidence, and was present across two different metrics of metacognition and in both experiments. A model-based analysis of data from a third experiment showed that a cross-domain correlation only emerged when both tasks shared the same task-relevant stimulus feature. That is, metacognition for perception and VSTM were correlated when both tasks required orientation judgements, but not when the perceptual task was switched to require contrast judgements. In contrast with previous results comparing perception and long-term memory, which have largely provided evidence for domain-specific metacognitive processes, the current findings suggest that metacognition of visual perception and VSTM is supported by a domain-general metacognitive architecture, but only when both domains share the same task-relevant stimulus feature. © 2017 The Author(s).

  14. Visualizing Practices in Project-based Design

    DEFF Research Database (Denmark)

    Whyte, Jennifer; Tryggestad, Kjell; Comi, Alice

    2016-01-01

    Project-based design involves a variety of visual representations, which are evolved to make decisions and accomplish project objectives. Yet, such mediated and distributed ways of working are difficult to capture through ethnographies that examine situated design. A novel approach is developed t...... representations enabled participants in project-based design to develop and share understanding. The complexity of projects and their distributed and mediated nature makes this approach timely and important in addressing new research questions and practical challenges.......Project-based design involves a variety of visual representations, which are evolved to make decisions and accomplish project objectives. Yet, such mediated and distributed ways of working are difficult to capture through ethnographies that examine situated design. A novel approach is developed...... of situated design. This allows the researcher to be nimble, tracing connections across complex engineering projects; reconstructing practices through their visual representations; and observing their effects. Second, it articulates how, in these empirical cases, interaction with a cascade of visual...

  15. Harnessing modern web application technology to create intuitive and efficient data visualization and sharing tools

    Directory of Open Access Journals (Sweden)

    Dylan eWood

    2014-08-01

    Full Text Available Neuroscientists increasingly need to work with big data in order to derive meaningful results in their field. Collecting, organizing and analyzing this data can be a major hurdle on the road to scientific discovery. This hurdle can be lowered using the same technologies that are currently revolutionizing the way that cultural and social media sites represent and share information with their users. Web application technologies and standards such as RESTful webservices, HTML5 and high-performance in-browser JavaScript engines are being utilized to vastly improve the way that the world accesses and shares information. The neuroscience community can also benefit tremendously from these technologies. We present here a web application that allows users to explore and request the complex datasets that need to be shared among the neuroimaging community. The COINS (Collaborative Informatics and Neuroimaging Suite Data Exchange uses web application technologies to facilitate data sharing in three phases: Exploration, Request/Communication, and Download. This paper will focus on the first phase, and how intuitive exploration of large and complex datasets is achieved using a framework that centers around asynchronous client-server communication (AJAX and also exposes a powerful API that can be utilized by other applications to explore available data. First opened to the neuroscience community in August 2012, the Data Exchange has already provided researchers with over 2500 GB of data.

  16. Harnessing modern web application technology to create intuitive and efficient data visualization and sharing tools.

    Science.gov (United States)

    Wood, Dylan; King, Margaret; Landis, Drew; Courtney, William; Wang, Runtang; Kelly, Ross; Turner, Jessica A; Calhoun, Vince D

    2014-01-01

    Neuroscientists increasingly need to work with big data in order to derive meaningful results in their field. Collecting, organizing and analyzing this data can be a major hurdle on the road to scientific discovery. This hurdle can be lowered using the same technologies that are currently revolutionizing the way that cultural and social media sites represent and share information with their users. Web application technologies and standards such as RESTful webservices, HTML5 and high-performance in-browser JavaScript engines are being utilized to vastly improve the way that the world accesses and shares information. The neuroscience community can also benefit tremendously from these technologies. We present here a web application that allows users to explore and request the complex datasets that need to be shared among the neuroimaging community. The COINS (Collaborative Informatics and Neuroimaging Suite) Data Exchange uses web application technologies to facilitate data sharing in three phases: Exploration, Request/Communication, and Download. This paper will focus on the first phase, and how intuitive exploration of large and complex datasets is achieved using a framework that centers around asynchronous client-server communication (AJAX) and also exposes a powerful API that can be utilized by other applications to explore available data. First opened to the neuroscience community in August 2012, the Data Exchange has already provided researchers with over 2500 GB of data.

  17. Air Force UAV’s: The Secret History

    Science.gov (United States)

    2010-07-01

    iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c... The Secret History 2 Air Force UAVs: The Secret History2 air Force uaVs: The secret history Has any airplane in the past decade captured the public

  18. Distributed visualization of gridded geophysical data: the Carbon Data Explorer, version 0.2.3

    Science.gov (United States)

    Endsley, K. A.; Billmire, M. G.

    2016-01-01

    Due to the proliferation of geophysical models, particularly climate models, the increasing resolution of their spatiotemporal estimates of Earth system processes, and the desire to easily share results with collaborators, there is a genuine need for tools to manage, aggregate, visualize, and share data sets. We present a new, web-based software tool - the Carbon Data Explorer - that provides these capabilities for gridded geophysical data sets. While originally developed for visualizing carbon flux, this tool can accommodate any time-varying, spatially explicit scientific data set, particularly NASA Earth system science level III products. In addition, the tool's open-source licensing and web presence facilitate distributed scientific visualization, comparison with other data sets and uncertainty estimates, and data publishing and distribution.

  19. Novel Kazal-type proteinase inhibitors from the skin secretion of the Splendid leaf frog, Cruziohyla calcarifer

    OpenAIRE

    Carolina Proaño-Bolaños; Renjie Li; Mei Zhou; Lei Wang; Xinping Xi; Elicio E. Tapia; Luis A. Coloma; Tianbao Chen; Chris Shaw

    2017-01-01

    Peptidase inhibitors have an important role controlling a variety of biological processes. Here, we employed a peptidomic approach including molecular cloning, tandem mass spectrometry and enzymatic assays to reveal 7 Kazal-type proteinase inhibitors (CCKPs) (18 variants) in the skin secretion of the unexplored frog, Cruziohyla calcarifer. All 18 proteins shared the Kazal pattern C-X(7)-C-X(6,7)-C-X(6,7)-Y-X(3)-C-X(2)-C-X(15-21)-C and 3 disulphide bridges. Based on structural comparative anal...

  20. OpinionSeer: interactive visualization of hotel customer feedback.

    Science.gov (United States)

    Wu, Yingcai; Wei, Furu; Liu, Shixia; Au, Norman; Cui, Weiwei; Zhou, Hong; Qu, Huamin

    2010-01-01

    The rapid development of Web technology has resulted in an increasing number of hotel customers sharing their opinions on the hotel services. Effective visual analysis of online customer opinions is needed, as it has a significant impact on building a successful business. In this paper, we present OpinionSeer, an interactive visualization system that could visually analyze a large collection of online hotel customer reviews. The system is built on a new visualization-centric opinion mining technique that considers uncertainty for faithfully modeling and analyzing customer opinions. A new visual representation is developed to convey customer opinions by augmenting well-established scatterplots and radial visualization. To provide multiple-level exploration, we introduce subjective logic to handle and organize subjective opinions with degrees of uncertainty. Several case studies illustrate the effectiveness and usefulness of OpinionSeer on analyzing relationships among multiple data dimensions and comparing opinions of different groups. Aside from data on hotel customer feedback, OpinionSeer could also be applied to visually analyze customer opinions on other products or services.

  1. Trade secrets protection mode of nuclear power plant

    International Nuclear Information System (INIS)

    Zeng Bin

    2015-01-01

    The paper analyzes the legal environment in which nuclear power enterprises are stayed, and mainly discusses the business secret protection modes of China's nuclear power enterprises. It is expected to provide a revelation and help for these enterprises to protect their business secrets. Firstly, the paper briefly expounds the legal basis of business secret protection and China's legalization status in this regard. Then it mainly puts forward the business secret management framework and postulations for nuclear power enterprises, and key points in application and protection of nuclear power business secret. (author)

  2. Ionizing radiation in secret services' conspirative actions

    International Nuclear Information System (INIS)

    Vogel, H.; Lotz, P.; Vogel, B.

    2007-01-01

    Introduction: The death of Litvinenko has been reported by the media. It has raised the question whether this case had been unique. The fall of the wall has allowed a glimpse in the planning and comporting of a secret service. Material and method: Documents of the secret service of the former German democratic republic (GDR), books of defectors, and media reports about secret service actions with radiating substances have been analyzed. Results: Since decades, secret services have been using radioactive nuclides and radiation for their tasks. Several killings with radiation have been reported. A complicated logistic had been developed. Conclusion: Only singular cases of the employment of radiating substances have become known. It is probable that the majority rests unknown. Government support seems necessary in secret services' conspirative actions with radiating substance

  3. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  4. Vaccine Images on Twitter: Analysis of What Images are Shared

    Science.gov (United States)

    Dredze, Mark

    2018-01-01

    Background Visual imagery plays a key role in health communication; however, there is little understanding of what aspects of vaccine-related images make them effective communication aids. Twitter, a popular venue for discussions related to vaccination, provides numerous images that are shared with tweets. Objective The objectives of this study were to understand how images are used in vaccine-related tweets and provide guidance with respect to the characteristics of vaccine-related images that correlate with the higher likelihood of being retweeted. Methods We collected more than one million vaccine image messages from Twitter and characterized various properties of these images using automated image analytics. We fit a logistic regression model to predict whether or not a vaccine image tweet was retweeted, thus identifying characteristics that correlate with a higher likelihood of being shared. For comparison, we built similar models for the sharing of vaccine news on Facebook and for general image tweets. Results Most vaccine-related images are duplicates (125,916/237,478; 53.02%) or taken from other sources, not necessarily created by the author of the tweet. Almost half of the images contain embedded text, and many include images of people and syringes. The visual content is highly correlated with a tweet’s textual topics. Vaccine image tweets are twice as likely to be shared as nonimage tweets. The sentiment of an image and the objects shown in the image were the predictive factors in determining whether an image was retweeted. Conclusions We are the first to study vaccine images on Twitter. Our findings suggest future directions for the study and use of vaccine imagery and may inform communication strategies around vaccination. Furthermore, our study demonstrates an effective study methodology for image analysis. PMID:29615386

  5. Vaccine Images on Twitter: Analysis of What Images are Shared.

    Science.gov (United States)

    Chen, Tao; Dredze, Mark

    2018-04-03

    Visual imagery plays a key role in health communication; however, there is little understanding of what aspects of vaccine-related images make them effective communication aids. Twitter, a popular venue for discussions related to vaccination, provides numerous images that are shared with tweets. The objectives of this study were to understand how images are used in vaccine-related tweets and provide guidance with respect to the characteristics of vaccine-related images that correlate with the higher likelihood of being retweeted. We collected more than one million vaccine image messages from Twitter and characterized various properties of these images using automated image analytics. We fit a logistic regression model to predict whether or not a vaccine image tweet was retweeted, thus identifying characteristics that correlate with a higher likelihood of being shared. For comparison, we built similar models for the sharing of vaccine news on Facebook and for general image tweets. Most vaccine-related images are duplicates (125,916/237,478; 53.02%) or taken from other sources, not necessarily created by the author of the tweet. Almost half of the images contain embedded text, and many include images of people and syringes. The visual content is highly correlated with a tweet's textual topics. Vaccine image tweets are twice as likely to be shared as nonimage tweets. The sentiment of an image and the objects shown in the image were the predictive factors in determining whether an image was retweeted. We are the first to study vaccine images on Twitter. Our findings suggest future directions for the study and use of vaccine imagery and may inform communication strategies around vaccination. Furthermore, our study demonstrates an effective study methodology for image analysis. ©Tao Chen, Mark Dredze. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 03.04.2018.

  6. Selective visual attention to emotional words: Early parallel frontal and visual activations followed by interactive effects in visual cortex.

    Science.gov (United States)

    Schindler, Sebastian; Kissler, Johanna

    2016-10-01

    Human brains spontaneously differentiate between various emotional and neutral stimuli, including written words whose emotional quality is symbolic. In the electroencephalogram (EEG), emotional-neutral processing differences are typically reflected in the early posterior negativity (EPN, 200-300 ms) and the late positive potential (LPP, 400-700 ms). These components are also enlarged by task-driven visual attention, supporting the assumption that emotional content naturally drives attention. Still, the spatio-temporal dynamics of interactions between emotional stimulus content and task-driven attention remain to be specified. Here, we examine this issue in visual word processing. Participants attended to negative, neutral, or positive nouns while high-density EEG was recorded. Emotional content and top-down attention both amplified the EPN component in parallel. On the LPP, by contrast, emotion and attention interacted: Explicit attention to emotional words led to a substantially larger amplitude increase than did explicit attention to neutral words. Source analysis revealed early parallel effects of emotion and attention in bilateral visual cortex and a later interaction of both in right visual cortex. Distinct effects of attention were found in inferior, middle and superior frontal, paracentral, and parietal areas, as well as in the anterior cingulate cortex (ACC). Results specify separate and shared mechanisms of emotion and attention at distinct processing stages. Hum Brain Mapp 37:3575-3587, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  7. Visualization of adrenocortical carcinoma with 131I-Adosterol

    International Nuclear Information System (INIS)

    Maruoka, Shin; Nakamura, Mamoru

    1987-01-01

    There are very few literatures on successful visualization of adrenocortical carcinoma by means of 131 I-iodocholesterol scintigraphy, although many reports have referred to utility of 131 I-iodocholesterol scintigraphy for adrenal disorders. Since 1976, we have experienced 4 cases of adrenocortical carcinoma which were delineated by 131 I-6β-iodomethyl-19-norcholesterol ( 131 I-Adosterol). Three of 4 cases were adrenocortical carcinoma with Cushing's syndrome, and one was adrenocortical carcinoma with adrenogenital syndrome. In 3 cases of cortisol secreting adrenocortical carcinoma, uptake in the tumor and lack of uptake in the contralateral adrenal gland were seen. Faint to moderate uptakes were observed in the 2 cases, but another one showed as high uptake as seen in adenoma. Patient with androgen secreting adrenocortical carcinoma had increased uptake in the tumor and showed faint uptake in the contralateral adrenal gland. Intensity of 131 I-Adosterol uptake in adrenocortical carcinoma seems to depend on the extent of tumor necrosis, cell differentiation and function. (author)

  8. Regulation of glucagon secretion by incretins

    DEFF Research Database (Denmark)

    Holst, Jens Juul; Christensen, M; Lund, A

    2011-01-01

    Glucagon secretion plays an essential role in the regulation of hepatic glucose production, and elevated fasting and postprandial plasma glucagon concentrations in patients with type 2 diabetes (T2DM) contribute to their hyperglycaemia. The reason for the hyperglucagonaemia is unclear, but recent...... studies have shown lack of suppression after oral but preserved suppression after isoglycaemic intravenous glucose, pointing to factors from the gut. Gastrointestinal hormones that are secreted in response to oral glucose include glucagon-like peptide-1 (GLP-1) that strongly inhibits glucagon secretion......, and GLP-2 and GIP, both of which stimulate secretion. When the three hormones are given together on top of isoglycaemic intravenous glucose, glucagon suppression is delayed in a manner similar to that observed after oral glucose. Studies with the GLP-1 receptor antagonist, exendin 9-39, suggest...

  9. Role of adipose secreted factors and kisspeptin in the metabolic control of gonadotropin secretion and puberty

    Science.gov (United States)

    Factors secreted by adipose tissue continue to be discovered. Evidence indicates a strong link between neural influences and adipocyte expression and secretion of a wide array of cytokines, neurotrophic factors, growth factors, binding proteins, and neuropeptides. These “adipokines” are linked to im...

  10. Burkholderia cenocepacia type VI secretion system mediates escape of type II secreted proteins into the cytoplasm of infected macrophages.

    Directory of Open Access Journals (Sweden)

    Roberto Rosales-Reyes

    Full Text Available Burkholderia cenocepacia is an opportunistic pathogen that survives intracellularly in macrophages and causes serious respiratory infections in patients with cystic fibrosis. We have previously shown that bacterial survival occurs in bacteria-containing membrane vacuoles (BcCVs resembling arrested autophagosomes. Intracellular bacteria stimulate IL-1β secretion in a caspase-1-dependent manner and induce dramatic changes to the actin cytoskeleton and the assembly of the NADPH oxidase complex onto the BcCV membrane. A Type 6 secretion system (T6SS is required for these phenotypes but surprisingly it is not required for the maturation arrest of the BcCV. Here, we show that macrophages infected with B. cenocepacia employ the NLRP3 inflammasome to induce IL-1β secretion and pyroptosis. Moreover, IL-1β secretion by B. cenocepacia-infected macrophages is suppressed in deletion mutants unable to produce functional Type VI, Type IV, and Type 2 secretion systems (SS. We provide evidence that the T6SS mediates the disruption of the BcCV membrane, which allows the escape of proteins secreted by the T2SS into the macrophage cytoplasm. This was demonstrated by the activity of fusion derivatives of the T2SS-secreted metalloproteases ZmpA and ZmpB with adenylcyclase. Supporting this notion, ZmpA and ZmpB are required for efficient IL-1β secretion in a T6SS dependent manner. ZmpA and ZmpB are also required for the maturation arrest of the BcCVs and bacterial intra-macrophage survival in a T6SS-independent fashion. Our results uncover a novel mechanism for inflammasome activation that involves cooperation between two bacterial secretory pathways, and an unanticipated role for T2SS-secreted proteins in intracellular bacterial survival.

  11. Politicizing Precarity, Producing Visual Dialogues on Migration: Transnational Public Spaces in Social Movements

    Directory of Open Access Journals (Sweden)

    Nicole Doerr

    2010-05-01

    Full Text Available In a period characterized by weak public consent over European integration, the purpose of this article is to analyze images created by transnational activists who aim to politicize the social question and migrants' subjectivity in the European Union (EU. I will explore the content of posters and images produced by social movement activists for their local and joint European protest actions, and shared on blogs and homepages. I suspect that the underexplored visual dimension of emerging transnational public spaces created by activists offers a promising field of analysis. My aim is to give an empirical example of how we can study potential "visual dialogues" in transnational public spaces created within social movements. An interesting case for visual analysis is the grassroots network of local activist groups that created a joint "EuroMayday" against precarity and which mobilized protest parades across Europe. I will first discuss the relevance of "visual dialogues" in the EuroMayday protests from the perspective of discursive theories of democracy and social movements studies. Then I discuss activists' transnational sharing of visual images as a potentially innovative cultural practice aimed at politicizing and re-interpreting official imaginaries of citizenship, labor flexibility and free mobility in Europe. I also discuss the limits on emerging transnational "visual dialogues" posed by place-specific visual cultures. URN: urn:nbn:de:0114-fqs1002308

  12. 29 CFR 1903.9 - Trade secrets.

    Science.gov (United States)

    2010-07-01

    ... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  13. Air Force UAVs: The Secret History

    Science.gov (United States)

    2010-07-01

    iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...opening phases of Operation Enduring Freedom in Afghanistan. By Thomas P. Ehrhard a miTchEll insTiTuTE sTudy July 2010 Air Force UAVs The Secret History

  14. Teach yourself visually Adobe Dreamweaver CS6

    CERN Document Server

    Warner, Janine

    2012-01-01

    Learn to design and maintain content-rich websites the Visual way With more than 90 percent market share, Dreamweaver is the preferred tool for professional website design and production. For those who learn best visually, this colorful, step-by-step guide is the perfect way to learn the program and start building websites with "wow". Numbered steps and full-color screen shots show you just how to navigate the program, format and style text, create web-based forms and pages, build data-driven sites, and maintain a fully functioning website. All the enhancements of the newest version are cover

  15. THE BUFFER CAPACITY OF AIRWAY EPITHELIAL SECRETIONS

    Directory of Open Access Journals (Sweden)

    Dusik eKim

    2014-06-01

    Full Text Available The pH of airway epithelial secretions influences bacterial killing and mucus properties and is reduced by acidic pollutants, gastric reflux, and respiratory diseases such as cystic fibrosis (CF. The effect of acute acid loads depends on buffer capacity, however the buffering of airway secretions has not been well characterized. In this work we develop a method for titrating micro-scale (30 µl volumes and use it to study fluid secreted by the human airway epithelial cell line Calu-3, a widely used model for submucosal gland serous cells. Microtitration curves revealed that HCO3- is the major buffer. Peak buffer capacity (β increased from 17 to 28 mM/pH during forskolin stimulation, and was reduced by >50% in fluid secreted by cystic fibrosis transmembrane conductance regulator (CFTR-deficient Calu-3 monolayers, confirming an important role of CFTR in HCO3- secretion. Back-titration with NaOH revealed non-volatile buffer capacity due to proteins synthesized and released by the epithelial cells. Lysozyme and mucin concentrations were too low to buffer Calu-3 fluid significantly, however model titrations of porcine gastric mucins at concentrations near the sol-gel transition suggest that mucins may contribute to the buffer capacity of ASL in vivo. We conclude that CFTR-dependent HCO3- secretion and epithelially-derived proteins are the predominant buffers in Calu-3 secretions.

  16. The ESX system in Bacillus subtilis mediates protein secretion.

    Directory of Open Access Journals (Sweden)

    Laura A Huppert

    Full Text Available Esat-6 protein secretion systems (ESX or Ess are required for the virulence of several human pathogens, most notably Mycobacterium tuberculosis and Staphylococcus aureus. These secretion systems are defined by a conserved FtsK/SpoIIIE family ATPase and one or more WXG100 family secreted substrates. Gene clusters coding for ESX systems have been identified amongst many organisms including the highly tractable model system, Bacillus subtilis. In this study, we demonstrate that the B. subtilis yuk/yue locus codes for a nonessential ESX secretion system. We develop a functional secretion assay to demonstrate that each of the locus gene products is specifically required for secretion of the WXG100 virulence factor homolog, YukE. We then employ an unbiased approach to search for additional secreted substrates. By quantitative profiling of culture supernatants, we find that YukE may be the sole substrate that depends on the FtsK/SpoIIIE family ATPase for secretion. We discuss potential functional implications for secretion of a unique substrate.

  17. Protection of visual functions by human neural progenitors in a rat model of retinal disease.

    Directory of Open Access Journals (Sweden)

    David M Gamm

    2007-03-01

    Full Text Available A promising clinical application for stem and progenitor cell transplantation is in rescue therapy for degenerative diseases. This strategy seeks to preserve rather than restore host tissue function by taking advantage of unique properties often displayed by these versatile cells. In studies using different neurodegenerative disease models, transplanted human neural progenitor cells (hNPC protected dying host neurons within both the brain and spinal cord. Based on these reports, we explored the potential of hNPC transplantation to rescue visual function in an animal model of retinal degeneration, the Royal College of Surgeons rat.Animals received unilateral subretinal injections of hNPC or medium alone at an age preceding major photoreceptor loss. Principal outcomes were quantified using electroretinography, visual acuity measurements and luminance threshold recordings from the superior colliculus. At 90-100 days postnatal, a time point when untreated rats exhibit little or no retinal or visual function, hNPC-treated eyes retained substantial retinal electrical activity and visual field with near-normal visual acuity. Functional efficacy was further enhanced when hNPC were genetically engineered to secrete glial cell line-derived neurotrophic factor. Histological examination at 150 days postnatal showed hNPC had formed a nearly continuous pigmented layer between the neural retina and retinal pigment epithelium, as well as distributed within the inner retina. A concomitant preservation of host cone photoreceptors was also observed.Wild type and genetically modified human neural progenitor cells survive for prolonged periods, migrate extensively, secrete growth factors and rescue visual functions following subretinal transplantation in the Royal College of Surgeons rat. These results underscore the potential therapeutic utility of hNPC in the treatment of retinal degenerative diseases and suggest potential mechanisms underlying their effect in

  18. 3D Visualization Development of SIUE Campus

    Science.gov (United States)

    Nellutla, Shravya

    Geographic Information Systems (GIS) has progressed from the traditional map-making to the modern technology where the information can be created, edited, managed and analyzed. Like any other models, maps are simplified representations of real world. Hence visualization plays an essential role in the applications of GIS. The use of sophisticated visualization tools and methods, especially three dimensional (3D) modeling, has been rising considerably due to the advancement of technology. There are currently many off-the-shelf technologies available in the market to build 3D GIS models. One of the objectives of this research was to examine the available ArcGIS and its extensions for 3D modeling and visualization and use them to depict a real world scenario. Furthermore, with the advent of the web, a platform for accessing and sharing spatial information on the Internet, it is possible to generate interactive online maps. Integrating Internet capacity with GIS functionality redefines the process of sharing and processing the spatial information. Enabling a 3D map online requires off-the-shelf GIS software, 3D model builders, web server, web applications and client server technologies. Such environments are either complicated or expensive because of the amount of hardware and software involved. Therefore, the second objective of this research was to investigate and develop simpler yet cost-effective 3D modeling approach that uses available ArcGIS suite products and the free 3D computer graphics software for designing 3D world scenes. Both ArcGIS Explorer and ArcGIS Online will be used to demonstrate the way of sharing and distributing 3D geographic information on the Internet. A case study of the development of 3D campus for the Southern Illinois University Edwardsville is demonstrated.

  19. Extrafloral nectar secretion from wounds of Solanum dulcamara.

    Science.gov (United States)

    Lortzing, Tobias; Calf, Onno W; Böhlke, Marlene; Schwachtje, Jens; Kopka, Joachim; Geuß, Daniel; Kosanke, Susanne; van Dam, Nicole M; Steppuhn, Anke

    2016-04-25

    Plants usually close wounds rapidly to prevent infections and the loss of valuable resources such as assimilates(1). However, herbivore-inflicted wounds on the bittersweet nightshade Solanum dulcamara appear not to close completely and produce sugary wound secretions visible as droplets. Many plants across the plant kingdom secrete sugary nectar from extrafloral nectaries(2) to attract natural enemies of herbivores for indirect defence(3,4). As ants forage on wound edges of S. dulcamara in the field, we hypothesized that wound secretions are a form of extrafloral nectar (EFN). We show that, unlike EFN from known nectaries, wound secretions are neither associated with any specific structure nor restricted to certain locations. However, similar to EFN, they are jasmonate-inducible and the plant controls their chemical composition. Wound secretions are attractive for ants, and application of wound secretion mimics increases ant attraction and reduces herbivory on S. dulcamara plants in a natural population. In greenhouse experiments, we reveal that ants can defend S. dulcamara from two of its native herbivores, slugs and flea beetle larvae. Since nectar is defined by its ecological function as a sugary secretion involved in interactions with animals(5), such 'plant bleeding' could be a primitive mode of nectar secretion exemplifying an evolutionary origin of structured extrafloral nectaries.

  20. Incretin hormone secretion over the day

    DEFF Research Database (Denmark)

    Ahren, B; Carr, RD; Deacon, Carolyn F.

    2010-01-01

    The two incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide-1 (GLP-1) are key factors in the regulation of islet function and glucose metabolism, and incretin-based therapy for type 2 diabetes has gained considerable interest during recent years. Regulat......The two incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide-1 (GLP-1) are key factors in the regulation of islet function and glucose metabolism, and incretin-based therapy for type 2 diabetes has gained considerable interest during recent years....... Regulation of incretin hormone secretion is less well characterized. The main stimulus for incretin hormone secretion is presence of nutrients in the intestinal lumen, and carbohydrate, fat as well as protein all have the capacity to stimulate GIP and GLP-1 secretion. More recently, it has been established...... that a diurnal regulation exists with incretin hormone secretion to an identical meal being greater when the meal is served in the morning compared to in the afternoon. Finally, whether incretin hormone secretion is altered in disease states is an area with, so far, controversial results in different studies...

  1. Exosome secretion affects social motility in Trypanosoma brucei.

    Directory of Open Access Journals (Sweden)

    Dror Eliaz

    2017-03-01

    Full Text Available Extracellular vesicles (EV secreted by pathogens function in a variety of biological processes. Here, we demonstrate that in the protozoan parasite Trypanosoma brucei, exosome secretion is induced by stress that affects trans-splicing. Following perturbations in biogenesis of spliced leader RNA, which donates its spliced leader (SL exon to all mRNAs, or after heat-shock, the SL RNA is exported to the cytoplasm and forms distinct granules, which are then secreted by exosomes. The exosomes are formed in multivesicular bodies (MVB utilizing the endosomal sorting complexes required for transport (ESCRT, through a mechanism similar to microRNA secretion in mammalian cells. Silencing of the ESCRT factor, Vps36, compromised exosome secretion but not the secretion of vesicles derived from nanotubes. The exosomes enter recipient trypanosome cells. Time-lapse microscopy demonstrated that cells secreting exosomes or purified intact exosomes affect social motility (SoMo. This study demonstrates that exosomes are delivered to trypanosome cells and can change their migration. Exosomes are used to transmit stress signals for communication between parasites.

  2. Private Sharing of User Location over Online Social Networks

    OpenAIRE

    Freudiger, Julien; Neu, Raoul; Hubaux, Jean-Pierre

    2010-01-01

    Online social networks increasingly allow mobile users to share their location with their friends. Much to the detriment of users’ privacy, this also means that social network operators collect users’ lo- cation. Similarly, third parties can learn users’ location from localization and location visualization services. Ideally, third-parties should not be given complete access to users’ location. To protect location privacy, we design and implement a platform-independent solution for users to s...

  3. Reappraisal of bicarbonate secretion by the human oesophagus

    DEFF Research Database (Denmark)

    Mertz-Nielsen, A; Hillingsø, J; Bukhave, Klaus

    1997-01-01

    BACKGROUND AND AIMS: Administration of omeprazole to healthy volunteers was recently reported to increase proximal duodenal mucosalbicarbonate secretion. As human oesophagus also secretes bicarbonate, the hypothesis was tested that omeprazole may stimulate oesophagealbicarbonate secretion and thus......: The median rates (95% confidence intervals)of intrinsic oesophageal bicarbonate secretion, corrected for contaminating salivary and gastric bicarbonate, were 89 (33-150) and 121 (63-203)mumol/h/10 cm (p > 0.5) in omeprazole and ranitidine treated subjects respectively. Salivary and gastric bicarbonate...... be overestimated. As omeprazole and ranitidine did not affect bicarbonate secretion differently there was no evidence that omeprazole acts on icarbonate secretory cells in the oesophageal mucosa....

  4. Indomethacin decreases gastroduodenal mucosal bicarbonate secretion in humans

    DEFF Research Database (Denmark)

    Mertz-Nielsen, A; Hillingsø, Jens; Bukhave, K

    1995-01-01

    BACKGROUND: Cyclooxygenase inhibitors reduce mucosal bicarbonate secretion in the duodenum, but the evidence for their effect on bicarbonate secretion in the stomach remains controversial. We have, therefore, studied how indomethacin influences gastroduodenal bicarbonate secretion and luminal...... healthy volunteers. Bicarbonate and PGE2 were measured in the gastroduodenal effluents by back-titration and radioimmunoassay, respectively. RESULTS: Vagal stimulation and duodenal luminal acidification (0.1 M HCl; 20 ml; 5 min) increased gastroduodenal bicarbonate secretion (p ... markedly inhibited both basal and stimulated gastric and duodenal mucosal bicarbonate secretion, and this reduction was similar to the degree of cyclooxygenase inhibition estimated by the luminal release of PGE2 (p

  5. High-functioning autism patients share similar but more severe impairments in verbal theory of mind than schizophrenia patients.

    Science.gov (United States)

    Tin, L N W; Lui, S S Y; Ho, K K Y; Hung, K S Y; Wang, Y; Yeung, H K H; Wong, T Y; Lam, S M; Chan, R C K; Cheung, E F C

    2018-06-01

    Evidence suggests that autism and schizophrenia share similarities in genetic, neuropsychological and behavioural aspects. Although both disorders are associated with theory of mind (ToM) impairments, a few studies have directly compared ToM between autism patients and schizophrenia patients. This study aimed to investigate to what extent high-functioning autism patients and schizophrenia patients share and differ in ToM performance. Thirty high-functioning autism patients, 30 schizophrenia patients and 30 healthy individuals were recruited. Participants were matched in age, gender and estimated intelligence quotient. The verbal-based Faux Pas Task and the visual-based Yoni Task were utilised to examine first- and higher-order, affective and cognitive ToM. The task/item difficulty of two paradigms was examined using mixed model analyses of variance (ANOVAs). Multiple ANOVAs and mixed model ANOVAs were used to examine group differences in ToM. The Faux Pas Task was more difficult than the Yoni Task. High-functioning autism patients showed more severely impaired verbal-based ToM in the Faux Pas Task, but shared similar visual-based ToM impairments in the Yoni Task with schizophrenia patients. The findings that individuals with high-functioning autism shared similar but more severe impairments in verbal ToM than individuals with schizophrenia support the autism-schizophrenia continuum. The finding that verbal-based but not visual-based ToM was more impaired in high-functioning autism patients than schizophrenia patients could be attributable to the varied task/item difficulty between the two paradigms.

  6. [Secret drug tribulations and French legislation].

    Science.gov (United States)

    Charlot, Colette

    2002-01-01

    From an official Montpellier prefecture paper of 18th century, we are interested in a secret drug from Provence origin: the Irroë powder. This purgative will pass from "secret" drug status to "patent" drug. It's notoriety will come from its arrival to Paris. The law of 21th germinal year XI, the decret of 25 prairial year XIII and this of 18th 1810 imposed to give the drug composition to an official status; that examined and permit it's sale. This secret will be produce for half century.

  7. Visualizing Mobility of Public Transportation System.

    Science.gov (United States)

    Zeng, Wei; Fu, Chi-Wing; Arisona, Stefan Müller; Erath, Alexander; Qu, Huamin

    2014-12-01

    Public transportation systems (PTSs) play an important role in modern cities, providing shared/massive transportation services that are essential for the general public. However, due to their increasing complexity, designing effective methods to visualize and explore PTS is highly challenging. Most existing techniques employ network visualization methods and focus on showing the network topology across stops while ignoring various mobility-related factors such as riding time, transfer time, waiting time, and round-the-clock patterns. This work aims to visualize and explore passenger mobility in a PTS with a family of analytical tasks based on inputs from transportation researchers. After exploring different design alternatives, we come up with an integrated solution with three visualization modules: isochrone map view for geographical information, isotime flow map view for effective temporal information comparison and manipulation, and OD-pair journey view for detailed visual analysis of mobility factors along routes between specific origin-destination pairs. The isotime flow map linearizes a flow map into a parallel isoline representation, maximizing the visualization of mobility information along the horizontal time axis while presenting clear and smooth pathways from origin to destinations. Moreover, we devise several interactive visual query methods for users to easily explore the dynamics of PTS mobility over space and time. Lastly, we also construct a PTS mobility model from millions of real passenger trajectories, and evaluate our visualization techniques with assorted case studies with the transportation researchers.

  8. Comparisons of memory for nonverbal auditory and visual sequential stimuli.

    Science.gov (United States)

    McFarland, D J; Cacace, A T

    1995-01-01

    Properties of auditory and visual sensory memory were compared by examining subjects' recognition performance of randomly generated binary auditory sequential frequency patterns and binary visual sequential color patterns within a forced-choice paradigm. Experiment 1 demonstrated serial-position effects in auditory and visual modalities consisting of both primacy and recency effects. Experiment 2 found that retention of auditory and visual information was remarkably similar when assessed across a 10s interval. Experiments 3 and 4, taken together, showed that the recency effect in sensory memory is affected more by the type of response required (recognition vs. reproduction) than by the sensory modality employed. These studies suggest that auditory and visual sensory memory stores for nonverbal stimuli share similar properties with respect to serial-position effects and persistence over time.

  9. B-CAN: a resource sharing platform to improve the operation, visualization and integrated analysis of TCGA breast cancer data.

    Science.gov (United States)

    Wen, Can-Hong; Ou, Shao-Min; Guo, Xiao-Bo; Liu, Chen-Feng; Shen, Yan-Bo; You, Na; Cai, Wei-Hong; Shen, Wen-Jun; Wang, Xue-Qin; Tan, Hai-Zhu

    2017-12-12

    Breast cancer is a high-risk heterogeneous disease with myriad subtypes and complicated biological features. The Cancer Genome Atlas (TCGA) breast cancer database provides researchers with the large-scale genome and clinical data via web portals and FTP services. Researchers are able to gain new insights into their related fields, and evaluate experimental discoveries with TCGA. However, it is difficult for researchers who have little experience with database and bioinformatics to access and operate on because of TCGA's complex data format and diverse files. For ease of use, we build the breast cancer (B-CAN) platform, which enables data customization, data visualization, and private data center. The B-CAN platform runs on Apache server and interacts with the backstage of MySQL database by PHP. Users can customize data based on their needs by combining tables from original TCGA database and selecting variables from each table. The private data center is applicable for private data and two types of customized data. A key feature of the B-CAN is that it provides single table display and multiple table display. Customized data with one barcode corresponding to many records and processed customized data are allowed in Multiple Tables Display. The B-CAN is an intuitive and high-efficient data-sharing platform.

  10. Google SketchUp Workshop Modeling, Visualizing, and Illustrating

    CERN Document Server

    Brixius, Laurent

    2010-01-01

    Discover the secrets of the Google SketchUp with the 16 real-world professional-level projects including parks, structures, concept art, and illustration. Google SketchUp Workshop includes all the wide variety of projects that SketchUp can be used for-architectural visualization, landscape design, video game and film conception, and more. SketchUp masters in every field will get you up to speed in this agile and intuitive software and then show you the real uses with through projects in architecture, engineering, and design. * Packed with 16 real-world Go

  11. Reelin secreted by GABAergic neurons regulates glutamate receptor homeostasis.

    Directory of Open Access Journals (Sweden)

    Cecilia Gonzalez Campo

    Full Text Available BACKGROUND: Reelin is a large secreted protein of the extracellular matrix that has been proposed to participate to the etiology of schizophrenia. During development, reelin is crucial for the correct cytoarchitecture of laminated brain structures and is produced by a subset of neurons named Cajal-Retzius. After birth, most of these cells degenerate and reelin expression persists in postnatal and adult brain. The phenotype of neurons that bind secreted reelin and whether the continuous secretion of reelin is required for physiological functions at postnatal stages remain unknown. METHODOLOGY/PRINCIPAL FINDINGS: Combining immunocytochemical and pharmacological approaches, we first report that two distinct patterns of reelin expression are present in cultured hippocampal neurons. We show that in hippocampal cultures, reelin is secreted by GABAergic neurons displaying an intense reelin immunoreactivity (IR. We demonstrate that secreted reelin binds to receptors of the lipoprotein family on neurons with a punctate reelin IR. Secondly, using calcium imaging techniques, we examined the physiological consequences of reelin secretion blockade. Blocking protein secretion rapidly and reversibly changes the subunit composition of N-methyl-D-aspartate glutamate receptors (NMDARs to a predominance of NR2B-containing NMDARs. Addition of recombinant or endogenously secreted reelin rescues the effects of protein secretion blockade and reverts the fraction of NR2B-containing NMDARs to control levels. Therefore, the continuous secretion of reelin is necessary to control the subunit composition of NMDARs in hippocampal neurons. CONCLUSIONS/SIGNIFICANCE: Our data show that the heterogeneity of reelin immunoreactivity correlates with distinct functional populations: neurons synthesizing and secreting reelin and/or neurons binding reelin. Furthermore, we show that continuous reelin secretion is a strict requirement to maintain the composition of NMDARs. We propose

  12. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    effect of remifentanil on melatonin secretion. We found that the risk of atypical sleep compared to normal sleep was significantly lower (p REM) sleep was only observed during the nonsedation period. We found preserved diurnal pattern of melatonin...... secretion in these patients. Remifentanil did not affect melatonin secretion but was associated with lower risk of atypical sleep pattern. REM sleep was only registered during the period of nonsedation.......Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...

  13. Thymidine secretion by hybridoma and myeloma cells

    International Nuclear Information System (INIS)

    Spilsberg, Bjorn; Rise, Frode; Petersen, Dirk; Nissen-Meyer, Jon

    2006-01-01

    Secretion of thymidine appeared to be a common property of hybridoma and myeloma cells, but not of other cell types, which were tested. Of three hybridoma cell lines tested, all secreted thymidine in amounts resulting in the accumulation of thymidine to concentrations of 10-20 μM in the culture medium. Also three of five myeloma cell lines that were analyzed secrete thymidine, but none of the other cell types that were studied. Thymidine was purified to homogeneity (4 mg purified from 3 l of culture medium) and identified as such by nuclear magnetic resonance spectroscopy. The cells that secreted thymidine showed high resistance to the growth inhibitory effect of thymidine

  14. Do We Know others' Visual Liking?

    Directory of Open Access Journals (Sweden)

    Ryosuke Niimi

    2014-12-01

    Full Text Available Although personal liking varies considerably, there is a general trend of liking shared by many people (public favour. Visual liking in particular may be largely shared by people, as it is strongly influenced by relatively low-level perceptual factors. If so, it is likely that people have correct knowledge of public favour. We examined the human ability to predict public favour. In three experiments, participants rated the subjective likability of various visual objects (e.g. car, chair, and predicted the mean liking rating by other participants. Irrespective of the object's category, the correlation between individual prediction and actual mean liking of others (prediction validity was not higher than the correlation between the predictor's own liking and the mean liking of others. Further, individual prediction correlated more with the predictor's own liking than it was with others' liking. Namely, predictions were biased towards the predictor's subjective liking (a variation of the false consensus effect. The results suggest that humans do not have (or cannot access correct knowledge of public favour. It was suggested that increasing the number of predictors is the appropriate strategy for making a good prediction of public favour.

  15. Attention Increases Spike Count Correlations between Visual Cortical Areas

    Science.gov (United States)

    Cohen, Marlene R.

    2016-01-01

    Visual attention, which improves perception of attended locations or objects, has long been known to affect many aspects of the responses of neuronal populations in visual cortex. There are two nonmutually exclusive hypotheses concerning the neuronal mechanisms that underlie these perceptual improvements. The first hypothesis, that attention improves the information encoded by a population of neurons in a particular cortical area, has considerable physiological support. The second hypothesis is that attention improves perception by selectively communicating relevant visual information. This idea has been tested primarily by measuring interactions between neurons on very short timescales, which are mathematically nearly independent of neuronal interactions on longer timescales. We tested the hypothesis that attention changes the way visual information is communicated between cortical areas on longer timescales by recording simultaneously from neurons in primary visual cortex (V1) and the middle temporal area (MT) in rhesus monkeys. We used two independent and complementary approaches. Our correlative experiment showed that attention increases the trial-to-trial response variability that is shared between the two areas. In our causal experiment, we electrically microstimulated V1 and found that attention increased the effect of stimulation on MT responses. Together, our results suggest that attention affects both the way visual stimuli are encoded within a cortical area and the extent to which visual information is communicated between areas on behaviorally relevant timescales. SIGNIFICANCE STATEMENT Visual attention dramatically improves the perception of attended stimuli. Attention has long been thought to act by selecting relevant visual information for further processing. It has been hypothesized that this selection is accomplished by increasing communication between neurons that encode attended information in different cortical areas. We recorded simultaneously

  16. Attention Increases Spike Count Correlations between Visual Cortical Areas.

    Science.gov (United States)

    Ruff, Douglas A; Cohen, Marlene R

    2016-07-13

    Visual attention, which improves perception of attended locations or objects, has long been known to affect many aspects of the responses of neuronal populations in visual cortex. There are two nonmutually exclusive hypotheses concerning the neuronal mechanisms that underlie these perceptual improvements. The first hypothesis, that attention improves the information encoded by a population of neurons in a particular cortical area, has considerable physiological support. The second hypothesis is that attention improves perception by selectively communicating relevant visual information. This idea has been tested primarily by measuring interactions between neurons on very short timescales, which are mathematically nearly independent of neuronal interactions on longer timescales. We tested the hypothesis that attention changes the way visual information is communicated between cortical areas on longer timescales by recording simultaneously from neurons in primary visual cortex (V1) and the middle temporal area (MT) in rhesus monkeys. We used two independent and complementary approaches. Our correlative experiment showed that attention increases the trial-to-trial response variability that is shared between the two areas. In our causal experiment, we electrically microstimulated V1 and found that attention increased the effect of stimulation on MT responses. Together, our results suggest that attention affects both the way visual stimuli are encoded within a cortical area and the extent to which visual information is communicated between areas on behaviorally relevant timescales. Visual attention dramatically improves the perception of attended stimuli. Attention has long been thought to act by selecting relevant visual information for further processing. It has been hypothesized that this selection is accomplished by increasing communication between neurons that encode attended information in different cortical areas. We recorded simultaneously from neurons in primary

  17. Intermittent subglottic secretion drainage may cause tracheal damage in patients with few oropharyngeal secretions.

    Science.gov (United States)

    Suys, E; Nieboer, K; Stiers, W; De Regt, J; Huyghens, L; Spapen, H

    2013-12-01

    Injurious prolapse of tracheal mucosa into the suction port has been reported in up to 50% of intubated patients receiving continuous aspiration of subglottic secretions. We investigated whether similar injury could be inflicted by automated intermittent aspiration. Six consecutive patients, intubated with the Mallinckrodt TaperGuard Evac™ endotracheal tube, were studied. A flow sensor was placed between the vacuum regulating system and the mucus collector. Intermittent suctioning was performed at a pressure of -125 mmHg with a 25s interval and duration of 15s. After 24h, a CT scan of the tracheal region was performed. Excessive negative suction pressure, a fast drop in aspiration flow to zero, and important "swinging" movements of secretions in the evacuation line were observed in all patients. Oral instillation of antiseptic mouthwash restored normal aspiration flow and secretion mobility. CT imaging showed marked entrapment of tracheal mucosa into the suction port in all patients. In patients with few oropharyngeal secretions, automated intermittent subglottic aspiration may result in significant and potential harmful invagination of tracheal mucosa into the suction lumen. A critical amount of fluid must be present in the oropharynx to assure adequate and safe aspiration. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Analysis of secreted proteins from Aspergillus flavus.

    Science.gov (United States)

    Medina, Martha L; Haynes, Paul A; Breci, Linda; Francisco, Wilson A

    2005-08-01

    MS/MS techniques in proteomics make possible the identification of proteins from organisms with little or no genome sequence information available. Peptide sequences are obtained from tandem mass spectra by matching peptide mass and fragmentation information to protein sequence information from related organisms, including unannotated genome sequence data. This peptide identification data can then be grouped and reconstructed into protein data. In this study, we have used this approach to study protein secretion by Aspergillus flavus, a filamentous fungus for which very little genome sequence information is available. A. flavus is capable of degrading the flavonoid rutin (quercetin 3-O-glycoside), as the only source of carbon via an extracellular enzyme system. In this continuing study, a proteomic analysis was used to identify secreted proteins from A. flavus when grown on rutin. The growth media glucose and potato dextrose were used to identify differentially expressed secreted proteins. The secreted proteins were analyzed by 1- and 2-DE and MS/MS. A total of 51 unique A. flavus secreted proteins were identified from the three growth conditions. Ten proteins were unique to rutin-, five to glucose- and one to potato dextrose-grown A. flavus. Sixteen secreted proteins were common to all three media. Fourteen identifications were of hypothetical proteins or proteins of unknown functions. To our knowledge, this is the first extensive proteomic study conducted to identify the secreted proteins from a filamentous fungus.

  19. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  20. Shared presence in physician-patient communication: A graphic representation.

    Science.gov (United States)

    Ventres, William B; Frankel, Richard M

    2015-09-01

    Shared presence is a state of being in which physicians and patients enter into a deep sense of trust, respect, and knowing that facilitates healing. Communication between physicians and patients (and, in fact, all providers and recipients of health care) is the medium through which shared presence occurs, regardless of the presenting problem, time available, location of care, or clinical history of the patient. Conceptualizing how communication leads to shared presence has been a challenging task, however. Pathways of this process have been routinely lumped together as the biopsychosocial model or patient, person, and relationship-centered care--all deceptive in their simplicity but, in fact, highly complex--or reduced to descriptive explications of one constituent element (e.g., empathy). In this article, we reconcile these pathways and elements by presenting a graphic image for clinicians and teachers in medical education. This conceptual image serves as a framework to synthesize the vast literature on physician-patient communication. We place shared presence, the fundamental characteristic of effective clinical communication, at the center of our figure. Around this focal point, we locate four elemental factors that either contribute to or result from shared presence, including interpersonal skills, relational contexts, actions in clinical encounters, and healing outcomes. By visually presenting various known and emergent theories of physician-patient communication, outlining the flow of successful encounters between physicians and patients, and noting how such encounters can improve outcomes, physicians, other health care professionals, and medical educators can better grasp the complexity, richness, and potential for achieving shared presence with their patients. (c) 2015 APA, all rights reserved).

  1. Large-Scale Astrophysical Visualization on Smartphones

    Science.gov (United States)

    Becciani, U.; Massimino, P.; Costa, A.; Gheller, C.; Grillo, A.; Krokos, M.; Petta, C.

    2011-07-01

    Nowadays digital sky surveys and long-duration, high-resolution numerical simulations using high performance computing and grid systems produce multidimensional astrophysical datasets in the order of several Petabytes. Sharing visualizations of such datasets within communities and collaborating research groups is of paramount importance for disseminating results and advancing astrophysical research. Moreover educational and public outreach programs can benefit greatly from novel ways of presenting these datasets by promoting understanding of complex astrophysical processes, e.g., formation of stars and galaxies. We have previously developed VisIVO Server, a grid-enabled platform for high-performance large-scale astrophysical visualization. This article reviews the latest developments on VisIVO Web, a custom designed web portal wrapped around VisIVO Server, then introduces VisIVO Smartphone, a gateway connecting VisIVO Web and data repositories for mobile astrophysical visualization. We discuss current work and summarize future developments.

  2. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    Science.gov (United States)

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole

  3. Seeing the Point: Using Visual Sources to Understand the Arguments for Women's Suffrage

    Science.gov (United States)

    Card, Jane

    2011-01-01

    Visual sources, Jane Card argues, are a powerful resource for historical learning but using them in the classroom requires careful thought and planning. Card here shares how she has used visual source material in order to teach her students about the women's suffrage movement. In particular, Card shows how a chain of questions that moves from the…

  4. Pituitary-hormone secretion by thyrotropinomas

    OpenAIRE

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2008-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore ev...

  5. Peptides and neurotransmitters that affect renin secretion

    Science.gov (United States)

    Ganong, W. F.; Porter, J. P.; Bahnson, T. D.; Said, S. I.

    1984-01-01

    Substance P inhibits renin secretion. This polypeptide is a transmitter in primary afferent neurons and is released from the peripheral as well as the central portions of these neurons. It is present in afferent nerves from the kidneys. Neuropeptide Y, which is a cotransmitter with norepinephrine and epinephrine, is found in sympathetic neurons that are closely associated with and presumably innervate the juxtagolmerular cells. Its effect on renin secretion is unknown, but it produces renal vasoconstriction and natriuresis. Vasoactive intestinal polypeptide (VIP) is a cotransmitter with acetylocholine in cholinergic neurons, and this polypeptide stimulates renin secretion. We cannot find any evidence for its occurence in neurons in the kidneys, but various stimuli increase plasma VIP to levels comparable to those produced by doses of exogenous VIP which stimulated renin secretion. Neostigmine increases plasma VIP and plasma renin activity, and the VIP appears to be responsible for the increase in renin secretion, since the increase is not blocked by renal denervation or propranolol. Stimulation of various areas in the brain produces sympathetically mediated increases in plasma renin activity associated with increases in blood pressure. However, there is pharmacological evidence that the renin response can be separated from the blood pressure response. In anaesthetized dogs, drugs that increase central serotonergic discharge increase renin secretion without increasing blood pressure. In rats, activation of sertonergic neurons in the dorsal raphe nucleus increases renin secretion by a pathway that projects from this nucleus to the ventral hypothalamus, and from there to the kidneys via the sympathetic nervous system. The serotonin releasing drug parachloramphetamine also increases plasma VIP, but VIP does not appear to be the primary mediator of the renin response. There is preliminary evidence that the serotonergic neurons in the dorsal raphe nucleus are part of the

  6. Fasting and meal-induced CCK and PP secretion following intragastric balloon treatment for obesity.

    Science.gov (United States)

    Mathus-Vliegen, Elisabeth M H; de Groot, Gerrit H

    2013-05-01

    Satiety is centrally and peripherally mediated by gastrointestinal peptides and the vagal nerve. We aimed to investigate whether intragastric balloon treatment affects satiety through effects on fasting and meal-stimulated cholecystokinin (CCK) and pancreatic polypeptide (PP) secretion. Patients referred for obesity treatment were randomised to 13 weeks of sham treatment followed by 13 weeks of balloon treatment (group 1; sham/balloon) or to twice a 13-week period of balloon treatment (group 2; balloon/balloon). Blood samples were taken for fasting and meal-stimulated CCK and PP levels at the start (T0) and after 13 (T1) and 26 (T2) weeks. Patients filled out visual analogue scales (VAS) to assess satiety. Forty-two patients (35 females, body weight 125.1 kg, BMI 43.3 kg/m(2)) participated. In group 1, basal CCK levels decreased but meal-stimulated response remained unchanged after 13 weeks of sham treatment. In group 2, basal and meal-stimulated CCK levels decreased after 13 weeks of balloon treatment. At the end of the second 13-week period, when group 1 had their first balloon treatment, they duplicated the initial 13-week results of group 2, whereas group 2 continued their balloon treatment and reduced meal-stimulated CCK release. Both groups showed reduced meal-stimulated PP secretions at T1 and T2 compared to T0. Changes in diet composition and VAS scores were similar. Improvements in glucose homeostasis partly explained the PP results. The reduced CCK and PP secretion after balloon positioning was unexpected and may reflect delayed gastric emptying induced by the balloon. Improved glucose metabolism partly explained the reduced PP secretion. Satiety and weight loss were not adversely influenced by these hormonal changes.

  7. Context and competition in the capture of visual attention

    NARCIS (Netherlands)

    Hickey, C.M.; Theeuwes, J.

    2011-01-01

    Competition-based models of visual attention propose that perceptual ambiguity is resolved through inhibition, which is stronger when objects share a greater number of neural receptive fields (RFs). According to this theory, the misallocation of attention to a salient distractor-that is, the capture

  8. Will They or Won't They? Secret Telling in Interpersonal Interactions.

    Science.gov (United States)

    Kowalski, Robin Marie; Morgan, Chad Alan; Whittaker, Elizabeth; Zaremba, Brittany; Frazee, Laura; Dean, Jessica

    2015-01-01

    This study investigated predictors of within-gender secret telling. Eighty-eight participants were exposed to either a "positive" or a "negative" secret about another individual. Just under 20% of participants told the secret. Conscientiousness, secret condition, empathy, and the conscientiousness by secret condition interaction had effects on the rate of secret telling, χ(2) (5,82) = 17.78, p = .003, AIC = 80.60. Conscientiousness had a negative effect on secret telling among participants that told the "negative" secret.

  9. Combined contributions of over-secreted glucagon-like peptide 1 and suppressed insulin secretion to hyperglycemia induced by gatifloxacin in rats

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Yunli, E-mail: chrisyu1255@yahoo.com.cn [Department of Pharmaceutics, The Second Affiliated Hospital of Soochow University, Suzhou 215004 (China); Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Wang, Xinting, E-mail: wxinting1986@yahoo.com.cn [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Liu, Can, E-mail: ltsan@163.com [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Yao, Dan, E-mail: erinyao@126.com [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Shanghai Institute of Materia Medica, Shanghai 201203 (China); Hu, Mengyue, E-mail: juliahmy@126.com [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Li, Jia, E-mail: ljbzd@163.com [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Hu, Nan, E-mail: hn_324@163.com [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Liu, Li, E-mail: liulee@cpu.edu.cn [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China); Liu, Xiaodong, E-mail: xdliu@cpu.edu.cn [Key Laboratory of Drug Metabolism and Pharmacokinetics, China Pharmaceutical University, Nanjing 210009 (China)

    2013-02-01

    Accumulating evidences have showed that gatifloxacin causes dysglycemia in both diabetic and non-diabetic patients. Our preliminary study demonstrated that gatifloxacin stimulated glucagon-like peptide 1 (GLP-1) secretion from intestinal cells. The aim of the study was to investigate the association between gatifloxacin-stimulated GLP-1 release and dysglycemia in both normal and streptozotocin-induced diabetic rats and explore the possible mechanisms. Oral administration of gatifloxacin (100 mg/kg/day and 200 mg/kg/day) for 3 and 12 days led to marked elevation of GLP-1 levels, accompanied by significant decrease in insulin levels and increase in plasma glucose. Similar results were found in normal rats treated with 3-day gatifloxacin. Gatifloxacin-stimulated GLP-1 release was further confirmed in NCI-H716 cells, which was abolished by diazoxide, a K{sub ATP} channel opener. QT-PCR analysis showed that gatifloxacin also upregulated expression of proglucagon and prohormone convertase 3 mRNA. To clarify the contradiction on elevated GLP-1 without insulinotropic effect, effects of GLP-1 and gatifloxacin on insulin release were investigated using INS-1 cells. We found that short exposure (2 h) to GLP-1 stimulated insulin secretion and biosynthesis, whereas long exposure (24 h and 48 h) to high level of GLP-1 inhibited insulin secretion and biosynthesis. Moreover, we also confirmed gatifloxacin acutely stimulated insulin secretion while chronically inhibited insulin biosynthesis. All the results gave an inference that gatifloxacin stimulated over-secretion of GLP-1, in turn, high levels of GLP-1 and gatifloxacin synergistically impaired insulin release, worsening hyperglycemia. -- Highlights: ► Gatifloxacin induced hyperglycemia both in diabetic rats and normal rats. ► Gatifloxacin enhanced GLP-1 secretion but inhibited insulin secretion in rats. ► Long-term exposure to high GLP-1 inhibited insulin secretion and biosynthesis. ► GLP-1 over-secretion may be

  10. Combined contributions of over-secreted glucagon-like peptide 1 and suppressed insulin secretion to hyperglycemia induced by gatifloxacin in rats

    International Nuclear Information System (INIS)

    Yu, Yunli; Wang, Xinting; Liu, Can; Yao, Dan; Hu, Mengyue; Li, Jia; Hu, Nan; Liu, Li; Liu, Xiaodong

    2013-01-01

    Accumulating evidences have showed that gatifloxacin causes dysglycemia in both diabetic and non-diabetic patients. Our preliminary study demonstrated that gatifloxacin stimulated glucagon-like peptide 1 (GLP-1) secretion from intestinal cells. The aim of the study was to investigate the association between gatifloxacin-stimulated GLP-1 release and dysglycemia in both normal and streptozotocin-induced diabetic rats and explore the possible mechanisms. Oral administration of gatifloxacin (100 mg/kg/day and 200 mg/kg/day) for 3 and 12 days led to marked elevation of GLP-1 levels, accompanied by significant decrease in insulin levels and increase in plasma glucose. Similar results were found in normal rats treated with 3-day gatifloxacin. Gatifloxacin-stimulated GLP-1 release was further confirmed in NCI-H716 cells, which was abolished by diazoxide, a K ATP channel opener. QT-PCR analysis showed that gatifloxacin also upregulated expression of proglucagon and prohormone convertase 3 mRNA. To clarify the contradiction on elevated GLP-1 without insulinotropic effect, effects of GLP-1 and gatifloxacin on insulin release were investigated using INS-1 cells. We found that short exposure (2 h) to GLP-1 stimulated insulin secretion and biosynthesis, whereas long exposure (24 h and 48 h) to high level of GLP-1 inhibited insulin secretion and biosynthesis. Moreover, we also confirmed gatifloxacin acutely stimulated insulin secretion while chronically inhibited insulin biosynthesis. All the results gave an inference that gatifloxacin stimulated over-secretion of GLP-1, in turn, high levels of GLP-1 and gatifloxacin synergistically impaired insulin release, worsening hyperglycemia. -- Highlights: ► Gatifloxacin induced hyperglycemia both in diabetic rats and normal rats. ► Gatifloxacin enhanced GLP-1 secretion but inhibited insulin secretion in rats. ► Long-term exposure to high GLP-1 inhibited insulin secretion and biosynthesis. ► GLP-1 over-secretion may be involved in

  11. Attentional Push: Augmenting Salience with Shared Attention Modeling

    OpenAIRE

    Gorji, Siavash; Clark, James J.

    2016-01-01

    We present a novel visual attention tracking technique based on Shared Attention modeling. Our proposed method models the viewer as a participant in the activity occurring in the scene. We go beyond image salience and instead of only computing the power of an image region to pull attention to it, we also consider the strength with which other regions of the image push attention to the region in question. We use the term Attentional Push to refer to the power of image regions to direct and man...

  12. Shigella IpaD has a dual role: signal transduction from the type III secretion system needle tip and intracellular secretion regulation.

    Science.gov (United States)

    Roehrich, A Dorothea; Guillossou, Enora; Blocker, Ariel J; Martinez-Argudo, Isabel

    2013-02-01

    Type III secretion systems (T3SSs) are protein injection devices essential for the interaction of many Gram-negative bacteria with eukaryotic cells. While Shigella assembles its T3SS when the environmental conditions are appropriate for invasion, secretion is only activated after physical contact with a host cell. First, the translocators are secreted to form a pore in the host cell membrane, followed by effectors which manipulate the host cell. Secretion activation is tightly controlled by conserved T3SS components: the needle tip proteins IpaD and IpaB, the needle itself and the intracellular gatekeeper protein MxiC. To further characterize the role of IpaD during activation, we combined random mutagenesis with a genetic screen to identify ipaD mutant strains unable to respond to host cell contact. Class II mutants have an overall defect in secretion induction. They map to IpaD's C-terminal helix and likely affect activation signal generation or transmission. The Class I mutant secretes translocators prematurely and is specifically defective in IpaD secretion upon activation. A phenotypically equivalent mutant was found in mxiC. We show that IpaD and MxiC act in the same intracellular pathway. In summary, we demonstrate that IpaD has a dual role and acts at two distinct locations during secretion activation. © 2013 Blackwell Publishing Ltd.

  13. Histaminergic regulation of prolactin secretion

    DEFF Research Database (Denmark)

    Knigge, U P

    1990-01-01

    Histamine (HA), which acts as a neurotransmitter in the central nervous system, participates in the neuroendocrine regulation of prolactin (PRL) secretion. HA has a predominant stimulatory effect which is mediated via H2-receptors following central administration and via H1-receptors following...... systemic infusion of the amine. In addition, HA seems to exert a minor inhibitory effect on PRL secretion, an effect unmasked only during blockade of the receptor mediating the stimulatory effect. Following central administration the inhibitory effect is mediated via H1-receptors, while following systemic...... administration this effect is mediated via H2-receptors. In accordance with these findings, the H2-receptor antagonist cimetidine (CIM) has an inhibitory (following central administration) or stimulatory (following systemic administration) effect on PRL secretion. However, high doses of CIM possess an additional...

  14. An unexpected knock on Corrigan's secret door.

    Science.gov (United States)

    Woywodt, Alexander

    2010-10-01

    Corrigan's secret door describes a metaphorical escape route for busy physicians. The term was derived from the successful and exceptionally busy professional life of Irish physician Dominic John Corrigan (1802-80). It is claimed that Corrigan's outpatient clinic was so busy that he required a secret door in his consulting rooms to escape from the ever-growing queue of eager patients. The origins of this charming story are unknown, and the door may have never existed. However, at present, Corrigan's secret door is often quoted when busy physicians have their own little ways in surviving a stressful professional life. Generations of British-trained doctors have grown up with Corrigan's secret door, as it was featured in the introduction of the Oxford Handbook of Clinical Medicine. Accordingly, trainees as well as more senior doctors are often reminded that having a 'secret door' is vital in surviving in the medical profession. My own escape is through classical music and the violoncello, in particular. As the name implies, my own secret door is normally invisible to colleagues and patients. This little article is about a patient who found me out, and a reflection on the role of classical music and the cello in my professional life.

  15. Salinity Alters the Polyisoprenoid Alcohol Content and Composition of Both Salt-Secreting and Non–Salt-Secreting Mangrove Seedlings

    Directory of Open Access Journals (Sweden)

    Mohammad Basyuni

    2017-10-01

    Full Text Available The effects of salinity on the polyisoprenoid alcohol content and composition of the salt-secreting mangrove species Avicennia marina and Sonneratia alba and the non–salt-secreting species Bruguiera gymnorrhiza and Kandelia obovata were studied. The seedlings of mangroves were grown for 5 months under 0% and 3% salt concentrations. The occurrence, content, and distribution of four mangrove seedlings were analyzed by two-dimensional thin layer chromatography. The structural groups of the polyprenols and dolichols in the leaves and roots were classified into two types (I and II. In type I, dolichols predominated over polyprenols (more than 90%, whereas in type II, the occurrence of both polyprenols and dolichols was observed. Polyprenols were not detected in the leaves of A. marina and B. gymnorrhiza under 0% salt (control, but were detected in small amounts in K. obovata leaves; however, significant amounts were found in the 3% salinity group. This finding in A. marina, B. gymnorrhiza, and K. obovata leaves implies a change to the structural group: under 0% salt concentrations, the groups are classified as type I, but become type II under 3% salt concentrations. The occurrence of ficaprenol (C50–55 was found only in the leaves of the non–salt-secreting species B. gymnorrhiza and K. obovata under 3% salinity and not in the salt-secreting species A. marina or S. alba. It is noteworthy that the polyisoprenoid type in the roots of the four species showed no change under salinity; the two salt-secreting species A. marina and S. alba contained type I under 0% and 3% salt concentrations. On the other hand, type II polyisoprenoids were identified in the non–salt-secreting species B. gymnorrhiza and K. obovata under 0% and 3% salinity conditions. This finding suggested that polyisoprenoids play a protective role against salinity in the mangrove leaves of both salt-secreting and non–salt-secreting species.

  16. Secrets and Disclosures: How Young Children Handle Secrets

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J.; Papathanasiou, Athanasia

    2013-01-01

    The authors examined the influence of content and verbal cues on young children's understanding of secret information and of its disclosure. Participants were 209 5- and 6-year-old children in an experiment where a puppet, named Zinc, was the protagonist. Children were asked to whom Zinc would disclose a list of pieces of information, some of…

  17. Transcranial magnetic stimulation of visual cortex in memory: cortical state, interference and reactivation of visual content in memory.

    Science.gov (United States)

    van de Ven, Vincent; Sack, Alexander T

    2013-01-01

    Memory for perceptual events includes the neural representation of the sensory information at short or longer time scales. Recent transcranial magnetic stimulation (TMS) studies of human visual cortex provided evidence that sensory cortex contributes to memory functions. In this review, we provide an exhaustive overview of these studies and ascertain how well the available evidence supports the idea of a causal role of sensory cortex in memory retention and retrieval. We discuss the validity and implications of the studies using a number of methodological and theoretical criteria that are relevant for brain stimulation of visual cortex. While most studies applied TMS to visual cortex to interfere with memory functions, a handful of pioneering studies used TMS to 'reactivate' memories in visual cortex. Interestingly, similar effects of TMS on memory were found in different memory tasks, which suggests that different memory systems share a neural mechanism of memory in visual cortex. At the same time, this neural mechanism likely interacts with higher order brain areas. Based on this overview and evaluation, we provide a first attempt to an integrative framework that describes how sensory processes contribute to memory in visual cortex, and how higher order areas contribute to this mechanism. Copyright © 2012 Elsevier B.V. All rights reserved.

  18. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    Directory of Open Access Journals (Sweden)

    Amy J. Gerc

    2015-09-01

    Full Text Available The Type VI secretion system (T6SS is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches.

  19. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    Science.gov (United States)

    Gerc, Amy J.; Diepold, Andreas; Trunk, Katharina; Porter, Michael; Rickman, Colin; Armitage, Judith P.; Stanley-Wall, Nicola R.; Coulthurst, Sarah J.

    2015-01-01

    Summary The Type VI secretion system (T6SS) is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches. PMID:26387948

  20. Indium-111 pentetreotide single-photon emission tomography in patients with TSH-secreting pituitary adenomas: correlation with the effect of a single administration of octreotide on serum TSH levels

    Energy Technology Data Exchange (ETDEWEB)

    Losa, M. [Department of Neurosurgery, IRCCS San Raffaele, University of Milan (Italy); Magnani, P. [INB-CNR Department of Nuclear Medicine, IRCCS San Raffaele, University of Milan (Italy); Mortini, P. [Department of Neurosurgery, IRCCS San Raffaele, University of Milan (Italy); Persani, L. [Centro Auxologico Italiano IRCCS, University of Milan (Italy); Acerno, S. [Department of Neurosurgery, IRCCS San Raffaele, University of Milan (Italy); Giugni, E. [Department of Neurosurgery, IRCCS San Raffaele, University of Milan (Italy); Songini, C. [INB-CNR Department of Nuclear Medicine, IRCCS San Raffaele, University of Milan (Italy); Fazio, F. [INB-CNR Department of Nuclear Medicine, IRCCS San Raffaele, University of Milan (Italy); Beck-Peccoz, P. [Institute of Endocrine Sciences, Istituto Clinico Humanitas, University of Milan (Italy); Giovanelli, M. [Department of Neurosurgery, IRCCS San Raffaele, University of Milan (Italy)

    1997-07-01

    Few data are available on the visualization of somatostatin receptors in vivo in patients with thyrotropin (TSH)-secreting adenoma. We studied five patients with TSH-secreting adenomas using single-photon emission tomography (SPET) after administration of indium-111 pentetreotide. The intensity of {sup 111}In-pentetreotide uptake by the tumours was correlated with the degree of TSH suppression after a single administration of 100 {mu}g octreotide s.c. Five patients (three women and two men) aged 27-46 years were investigated. Except for one patient with acromegaly, all had pure TSH-secreting tumours. One patient was previously untreated, while two had received octreotide, one antithyroid drugs, and one radioiodine. In all patients SPET demonstrated increased uptake of {sup 111}In-pentetreotide by the pituitary adenoma. The target to non-target ratio (T/nT) of {sup 111}In-pentetreotide uptake was higher than 10 in three patients. Administration of 100 {mu}g octreotide s.c. caused a significant reduction in TSH levels from 4.8{+-}1.4 mU/l to a nadir of 3.1{+-}1.1 mU/l after 6 h (P<0.001 by ANOVA). Suppression of TSH secretion ranged from 30% to 60% of the baseline value. The T/nT ratio showed a trend toward a direct relationship with the degree of TSH inhibition after acute octreotide administration (r=0.67; P=NS). Our study showed that {sup 111}In-pentetreotide scan visualized somatostatin receptors in all five of the patients with TSH-secreting pituitary adenomas, confirming the frequent presence of somatostatin receptors in these rare tumours, even though the correlation with the TSH inhibition after a single administration of octreotide did not reach significance. (orig.). With 1 fig., 1 tab.

  1. Regulation of atrial natriuretic peptide (ANP) secretion

    International Nuclear Information System (INIS)

    Ruskoaho, H.; Toth, M.; Lang, R.E.; Unger, Th.; Garten, D.

    1986-01-01

    To investigate the role of calcium, protein kinase C and adenylate cyclase in the ANP secretion, the secretory responses from isolated perfused rat hearts to a calcium channel activator, Bay k8644 (methyl-1,4-dihydro-2,6-dimethyl-3-nitro-4-(2-trifluomethylphenyl)-2-pyridine-5-carboxylate), the calcium ionophore (A23187), the phorbol ester (12-0-tetradecanoylphorbol-13-acetate, TPA), and to forskolin were studied. ANP in perfusate was measured by radioimmunoassay 10 min before and during the infusion (30 min) of various agents at 2 min intervals. A23187 (5.7 x 10 -7 ) induced a sharp increase, whereas TPA (0.15 - 1.6 x 10 -7 ) caused a slowly progressive increase in ANP secretion. 4a-phorbol-12,13-didecanoate, a non-active phorbol ester, had no effect on ANP secretion. Bay k8644 (4 x 10 -7 ) and forskolin (1 x 10 -6 ) alone caused small but sustained increase in ANP secretion. The combination of TPA with Bay k8644, forskolin or A23187 stimulated ANP secretion higher than the calculated additive value for each agent. Dibuturyl-cAMP (1.6 x 10 -4 ) pretreatment also enhanced TPA-induced ANP release. 8-Bromo-cGMP (1.3 x 10 -4 ) and sodium nitroprusside (9 x 10 -5 ) alone had no effect, but both attenuated the TPA-induced ANP secretion. The results suggest that atrial cardiocytes possess at least two different secretory pathways for ANP secretion, which are probably dependent on protein kinase C and cyclic AMP

  2. Transporter-mediated biofuel secretion.

    Science.gov (United States)

    Doshi, Rupak; Nguyen, Tuan; Chang, Geoffrey

    2013-05-07

    Engineering microorganisms to produce biofuels is currently among the most promising strategies in renewable energy. However, harvesting these organisms for extracting biofuels is energy- and cost-intensive, limiting the commercial feasibility of large-scale production. Here, we demonstrate the use of a class of transport proteins of pharmacological interest to circumvent the need to harvest biomass during biofuel production. We show that membrane-embedded transporters, better known to efflux lipids and drugs, can be used to mediate the secretion of intracellularly synthesized model isoprenoid biofuel compounds to the extracellular milieu. Transporter-mediated biofuel secretion sustainably maintained an approximate three- to fivefold boost in biofuel production in our Escherichia coli test system. Because the transporters used in this study belong to the ubiquitous ATP-binding cassette protein family, we propose their use as "plug-and-play" biofuel-secreting systems in a variety of bacteria, cyanobacteria, diatoms, yeast, and algae used for biofuel production. This investigation showcases the potential of expressing desired membrane transport proteins in cell factories to achieve the export or import of substances of economic, environmental, or therapeutic importance.

  3. [Effects of the verbal loading on laterality difference in visual field (author's transl)].

    Science.gov (United States)

    Kawai, M

    1980-02-01

    In connection with the Kinsbourne's attention-model, the relation between the level of hemisphere sharing of loading task and the visual-laterality difference was examined under verbal loading conditions. The subjects were 13 (8 male and 5 female) right-handed college students. The loading tasks in Exp. I were the "same-different" judgment of Japanese hiragana alphabets and of triliteral hiragana words, and "true-false" judgment of short statements. In Exp. II, a procedure to eliminate configurational matching of the letters was followed. The results of the two experiments suggest that the visual-laterality effect occurs only when the level of hemisphere sharing of the loading task exceeds a certain lower bound.

  4. Biochemical characterization and comparison of aspartylglucosaminidases secreted in venom of the parasitoid wasps Asobara tabida and Leptopilina heterotoma.

    Directory of Open Access Journals (Sweden)

    Quentin Coulette

    Full Text Available Aspartylglucosaminidase (AGA is a low-abundance intracellular enzyme that plays a key role in the last stage of glycoproteins degradation, and whose deficiency leads to human aspartylglucosaminuria, a lysosomal storage disease. Surprisingly, high amounts of AGA-like proteins are secreted in the venom of two phylogenetically distant hymenopteran parasitoid wasp species, Asobara tabida (Braconidae and Leptopilina heterotoma (Cynipidae. These venom AGAs have a similar domain organization as mammalian AGAs. They share with them key residues for autocatalysis and activity, and the mature α- and β-subunits also form an (αβ2 structure in solution. Interestingly, only one of these AGAs subunits (α for AtAGA and β for LhAGA is glycosylated instead of the two subunits for lysosomal human AGA (hAGA, and these glycosylations are partially resistant to PGNase F treatment. The two venom AGAs are secreted as fully activated enzymes, they have a similar aspartylglucosaminidase activity and are both also efficient asparaginases. Once AGAs are injected into the larvae of the Drosophila melanogaster host, the asparaginase activity may play a role in modulating their physiology. Altogether, our data provide new elements for a better understanding of the secretion and the role of venom AGAs as virulence factors in the parasitoid wasps' success.

  5. The amino acid transporters of the glutamate/GABA-glutamine cycle and their impact on insulin and glucagon secretion

    Directory of Open Access Journals (Sweden)

    Monica eJenstad

    2013-12-01

    Full Text Available Intercellular communication is pivotal in optimising and synchronising cellular responses to keep internal homeostasis and to respond adequately to external stimuli. In the central nervous system (CNS, glutamatergic and GABAergic signals are postulated to be dependent on the glutamate/GABA-glutamine (GGG cycle for vesicular loading of neurotransmitters, for inactivating the signal and for the replenishment of the neurotransmitters. Islets of Langerhans release the hormones insulin and glucagon, but share similarities with CNS cells in for example transcriptional control of development and differentiation, and chromatin methylation. Interestingly, proteins involved in the CNS in secretion of the neurotransmitters and emitting their responses as well as the regulation of these processes, are also found in islet cells. Moreover, high levels of glutamate, GABA and glutamine and their respective vesicular and plasma membrane transporters have been shown in the islet cells and there is emerging support for these amino acids and their transporters playing important roles in the maturation and secretion of insulin and glucagon. In this review, we will discuss the feasibility of recent data in the field in relation to the biophysical properties of the transporters (Slc1, Slc17, Slc32 and Slc38 and physiology of hormone secretion in islets of Langerhans.

  6. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  7. Shared vs. specific brain activation changes in dyslexia after training of phonology, attention, or reading.

    Science.gov (United States)

    Heim, Stefan; Pape-Neumann, Julia; van Ermingen-Marbach, Muna; Brinkhaus, Moti; Grande, Marion

    2015-07-01

    Whereas the neurobiological basis of developmental dyslexia has received substantial attention, only little is known about the processes in the brain during remediation. This holds in particular in light of recent findings on cognitive subtypes of dyslexia which suggest interactions between individual profiles, training methods, and also the task in the scanner. Therefore, we trained three groups of German dyslexic primary school children in the domains of phonology, attention, or visual word recognition. We compared neurofunctional changes after 4 weeks of training in these groups to those in untrained normal readers in a reading task and in a task of visual attention. The overall reading improvement in the dyslexic children was comparable over groups. It was accompanied by substantial increase of the activation level in the visual word form area (VWFA) during a reading task inside the scanner. Moreover, there were activation increases that were unique for each training group in the reading task. In contrast, when children performed the visual attention task, shared training effects were found in the left inferior frontal sulcus and gyrus, which varied in amplitude between the groups. Overall, the data reveal that different remediation programmes matched to individual profiles of dyslexia may improve reading ability and commonly affect the VWFA in dyslexia as a shared part of otherwise distinct networks.

  8. Motor-cognitive dual-task performance: effects of a concurrent motor task on distinct components of visual processing capacity

    OpenAIRE

    Künstler, E. C. S.; Finke, K.; Günther, A.; Klingner, C.; Witte, O.; Bublak, P.

    2017-01-01

    Dual tasking, or the simultaneous execution of two continuous tasks, is frequently associated with a performance decline that can be explained within a capacity sharing framework. In this study, we assessed the effects of a concurrent motor task on the efficiency of visual information uptake based on the ‘theory of visual attention’ (TVA). TVA provides parameter estimates reflecting distinct components of visual processing capacity: perceptual threshold, visual processing speed, and visual sh...

  9. Kinetics of alpha-amylase secretion in Aspergillus oryzae

    DEFF Research Database (Denmark)

    Henriksen, Anne Laurence Santerre; Carlsen, Morten; Bang de, H.

    1999-01-01

    -chase experiments were carried out to investigate the alpha-amylase secretion kinetics in A. oryzae. No unglycosylated alpha-amylase was detected neither intracellularly nor extracellularly demonstrating that glycosylation was not the rate controlling step in the secretory pathway. The pulse chase experiments...... indicated that there are two pools of intracellular alpha-amylase: a fast secreted and a slow secreted. The secretion of those two pools were described with a kinetic model, which was fitted to the pulse chase experiments. (C) 1999 John Wiley & Sons, Inc. Biotechnol Bioeng 65: 76-82, 1999....

  10. A conserved domain in type III secretion links the cytoplasmic domain of InvA to elements of the basal body

    International Nuclear Information System (INIS)

    Lilic, Mirjana; Quezada, Cindy M.; Stebbins, C. Erec

    2010-01-01

    The cytoplasmic domain of Salmonella InvA shares homology to a recurring scaffold in the membrane-spanning components of the type II and type III secretion systems. Protein type III secretion systems (T3SSs) are organic nanosyringes that achieve an energy-dependent translocation of bacterial proteins through the two membranes of Gram-negative organisms. Examples include the pathogenic systems of animals, plants and symbiotic bacteria that inject factors into eukaryotic cells, and the flagellar export system that secretes flagellin. T3SSs possess a core of several membrane-associated proteins that are conserved across all known bacterial species that use this system. The Salmonella protein InvA is one of the most highly conserved proteins of this core of critical T3SS components. The crystal structure of a C-terminal domain of InvA reveals an unexpected homology to domains that have been repeatedly found as building blocks of other elements of the T3SS apparatus. This suggests the surprising hypothesis that evolution has produced a significant component of the apparatus structure through a series of gene-duplication and gene-rearrangement events

  11. Bile Formation and Secretion

    Science.gov (United States)

    Boyer, James L.

    2014-01-01

    Bile is a unique and vital aqueous secretion of the liver that is formed by the hepatocyte and modified down stream by absorptive and secretory properties of the bile duct epithelium. Approximately 5% of bile consists of organic and inorganic solutes of considerable complexity. The bile-secretory unit consists of a canalicular network which is formed by the apical membrane of adjacent hepatocytes and sealed by tight junctions. The bile canaliculi (~1 μm in diameter) conduct the flow of bile countercurrent to the direction of portal blood flow and connect with the canal of Hering and bile ducts which progressively increase in diameter and complexity prior to the entry of bile into the gallbladder, common bile duct, and intestine. Canalicular bile secretion is determined by both bile salt-dependent and independent transport systems which are localized at the apical membrane of the hepatocyte and largely consist of a series of adenosine triphosphate-binding cassette transport proteins that function as export pumps for bile salts and other organic solutes. These transporters create osmotic gradients within the bile canalicular lumen that provide the driving force for movement of fluid into the lumen via aquaporins. Species vary with respect to the relative amounts of bile salt-dependent and independent canalicular flow and cholangiocyte secretion which is highly regulated by hormones, second messengers, and signal transduction pathways. Most determinants of bile secretion are now characterized at the molecular level in animal models and in man. Genetic mutations serve to illuminate many of their functions. PMID:23897680

  12. Parent-child bed-sharing: The good, the bad, and the burden of evidence.

    Science.gov (United States)

    Mileva-Seitz, Viara R; Bakermans-Kranenburg, Marian J; Battaini, Chiara; Luijk, Maartje P C M

    2017-04-01

    The practice of parent and child sharing a sleeping surface, or 'bed-sharing', is one of the most controversial topics in parenting research. The lay literature has popularized and polarized this debate, offering on one hand claims of dangers, and on the other, of benefits - both physical and psychological - associated with bed-sharing. To address the scientific evidence behind such claims, we systematically reviewed 659 published papers (peer-reviewed, editorial pieces, and commentaries) on the topic of parent-child bed-sharing. Our review offers a narrative walkthrough of the many subdomains of bed-sharing research, including its many correlates (e.g., socioeconomic and cultural factors) and purported risks or outcomes (e.g., sudden infant death syndrome, sleep problems). We found general design limitations and a lack of convincing evidence in the literature, which preclude making strong generalizations. A heat-map based on 98 eligible studies aids the reader to visualize world-wide prevalence in bed-sharing and highlights the need for further research in societies where bed-sharing is the norm. We urge for multiple subfields - anthropology, psychology/psychiatry, and pediatrics - to come together with the aim of understanding infant sleep and how nightly proximity to the parents influences children's social, emotional, and physical development. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Ionizing radiation in secret services' conspirative actions

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Lotz, P.; Vogel, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Introduction: The death of Litvinenko has been reported by the media. It has raised the question whether this case had been unique. The fall of the wall has allowed a glimpse in the planning and comporting of a secret service. Material and method: Documents of the secret service of the former German democratic republic (GDR), books of defectors, and media reports about secret service actions with radiating substances have been analyzed. Results: Since decades, secret services have been using radioactive nuclides and radiation for their tasks. Several killings with radiation have been reported. A complicated logistic had been developed. Conclusion: Only singular cases of the employment of radiating substances have become known. It is probable that the majority rests unknown. Government support seems necessary in secret services' conspirative actions with radiating substance.

  14. Weegee’s City Secrets

    OpenAIRE

    TRACHTENBERG, Alan

    2011-01-01

    En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles e...

  15. Identification and characterization of a type III secretion-associated chaperone in the type III secretion system 1 of Vibrio parahaemolyticus.

    Science.gov (United States)

    Akeda, Yukihiro; Okayama, Kanna; Kimura, Tomomi; Dryselius, Rikard; Kodama, Toshio; Oishi, Kazunori; Iida, Tetsuya; Honda, Takeshi

    2009-07-01

    Vibrio parahaemolyticus causes human gastroenteritis. Genomic sequencing of this organism has revealed that it has two sets of type III secretion systems, T3SS1 and T3SS2, both of which are important for its pathogenicity. However, the mechanism of protein secretion via T3SSs is unknown. A characteristic of many effectors is that they require specific chaperones for efficient delivery via T3SSs; however, no chaperone has been experimentally identified in the T3SSs of V. parahaemolyticus. In this study, we identified candidate T3SS1-associated chaperones from genomic sequence data and examined their roles in effector secretion/translocation and binding to their cognate substrates. From these experiments, we concluded that there is a T3S-associated chaperone, VecA, for a cytotoxic T3SS1-dependent effector, VepA. Further analysis using pulldown and secretion assays characterized the chaperone-binding domain encompassing the first 30-100 amino acids and an amino terminal secretion signal encompassing the first 5-20 amino acids on VepA. These findings will provide a strategy to clarify how the T3SS1 of V. parahaemolyticus secretes its specific effectors.

  16. Impaired insulin secretion in the spontaneous diabetes rats.

    Science.gov (United States)

    Kimura, K; Toyota, T; Kakizaki, M; Kudo, M; Takebe, K; Goto, Y

    1982-08-01

    Dynamics of insulin and glucagon secretion were investigated by using a new model of spontaneous diabetes rats produced by the repetition of selective breeding in our laboratories. The perfusion experiments of the pancreas showed that the early phase of insulin secretion to continuous stimulation with glucose was specifically impaired, although the response of the early phase to arginine was preserved. The glucose-induced insulin secretion in the nineth generation (F8) which had a more remarkably impaired glucose tolerance was more reduced than in the sixth generation (F5). No significant difference of glucagon secretion in response to arginine or norepinephrine was noted between the diabetes rats and control ones. The present data indicate that the defective insulin secretion is a primary derangement in a diabetic state of the spontaneous diabetes rat. This defect in the early phase of glucose-induced insulin secretion suggests the specific impairment of the recognition of glucose by the pancreatic beta-cells. The spontaneous diabetes rats are very useful as a model of disease for investigating pathophysiology of non-insulin dependent diabetes mellitus.

  17. Bucarest, Strictement Secret

    Directory of Open Access Journals (Sweden)

    Ionela Mihai

    2010-07-01

    Full Text Available L’émission Bucarest, strictement secret représente un documentaire organisésous la forme d’une série télé, qui dépeint le Bucarest à partir de deux perspectives: de l’histoire, de la conte et du lieu. La valeur d’une cité réside dans l’existence d’une mystique, d’un romantisme abscons, à part et des caractères empruntés de drames de Shakespeare, mystérieux, serrés d’angoisse et des secrets qui assombrissent leur existence. Par conséquence, le rôle du metteur en scène est de dévoiler leur vraie identité et de remettre en place, autant que possible, la vérité.

  18. Interactive Visualization of Healthcare Data Using Tableau.

    Science.gov (United States)

    Ko, Inseok; Chang, Hyejung

    2017-10-01

    Big data analysis is receiving increasing attention in many industries, including healthcare. Visualization plays an important role not only in intuitively showing the results of data analysis but also in the whole process of collecting, cleaning, analyzing, and sharing data. This paper presents a procedure for the interactive visualization and analysis of healthcare data using Tableau as a business intelligence tool. Starting with installation of the Tableau Desktop Personal version 10.3, this paper describes the process of understanding and visualizing healthcare data using an example. The example data of colon cancer patients were obtained from health insurance claims in years 2012 and 2013, provided by the Health Insurance Review and Assessment Service. To explore the visualization of healthcare data using Tableau for beginners, this paper describes the creation of a simple view for the average length of stay of colon cancer patients. Since Tableau provides various visualizations and customizations, the level of analysis can be increased with small multiples, view filtering, mark cards, and Tableau charts. Tableau is a software that can help users explore and understand their data by creating interactive visualizations. The software has the advantages that it can be used in conjunction with almost any database, and it is easy to use by dragging and dropping to create an interactive visualization expressing the desired format.

  19. EdgeMaps: visualizing explicit and implicit relations

    Science.gov (United States)

    Dörk, Marian; Carpendale, Sheelagh; Williamson, Carey

    2011-01-01

    In this work, we introduce EdgeMaps as a new method for integrating the visualization of explicit and implicit data relations. Explicit relations are specific connections between entities already present in a given dataset, while implicit relations are derived from multidimensional data based on shared properties and similarity measures. Many datasets include both types of relations, which are often difficult to represent together in information visualizations. Node-link diagrams typically focus on explicit data connections, while not incorporating implicit similarities between entities. Multi-dimensional scaling considers similarities between items, however, explicit links between nodes are not displayed. In contrast, EdgeMaps visualize both implicit and explicit relations by combining and complementing spatialization and graph drawing techniques. As a case study for this approach we chose a dataset of philosophers, their interests, influences, and birthdates. By introducing the limitation of activating only one node at a time, interesting visual patterns emerge that resemble the aesthetics of fireworks and waves. We argue that the interactive exploration of these patterns may allow the viewer to grasp the structure of a graph better than complex node-link visualizations.

  20. "The Secret Garden": A Literary Journey.

    Science.gov (United States)

    Jordan, Anne Devereaux

    1998-01-01

    Outlines the life of Frances Hodgson Burnett, author of "The Secret Garden." Argues that it not only tells an enthralling tale, but takes readers on a journey through the history of English literature. Discusses the gothic tradition and romanticism of "The Secret Garden." Lists classic elements in the book and offers five ideas…

  1. Dig It! The Secrets of Soil

    Science.gov (United States)

    It! The Secrets of Soil Come and Explore! Discover the amazing world of soils with images and information from the Dig It! The Secrets of Soil exhibit from the Smithsonian's National Museum of Natural and new web content will be added over the coming months including a new soil blog. New Interactives

  2. Visual working memory is disrupted by covert verbal retrieval

    NARCIS (Netherlands)

    Ricker, Timothy J.; Cowan, Nelson; Morey, Candice C.

    If working memory (WM) depends on a central resource as is posited in some theories, but not in others it should be possible to observe interference between tasks that share few features with each other. We investigated whether interference with WM for visual arrays would occur, even if the

  3. UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

    Directory of Open Access Journals (Sweden)

    Froelicher David

    2017-10-01

    Full Text Available Current solutions for privacy-preserving data sharing among multiple parties either depend on a centralized authority that must be trusted and provides only weakest-link security (e.g., the entity that manages private/secret cryptographic keys, or leverage on decentralized but impractical approaches (e.g., secure multi-party computation. When the data to be shared are of a sensitive nature and the number of data providers is high, these solutions are not appropriate. Therefore, we present UnLynx, a new decentralized system for efficient privacy-preserving data sharing. We consider m servers that constitute a collective authority whose goal is to verifiably compute on data sent from n data providers. UnLynx guarantees the confidentiality, unlinkability between data providers and their data, privacy of the end result and the correctness of computations by the servers. Furthermore, to support differentially private queries, UnLynx can collectively add noise under encryption. All of this is achieved through a combination of a set of new distributed and secure protocols that are based on homomorphic cryptography, verifiable shuffling and zero-knowledge proofs. UnLynx is highly parallelizable and modular by design as it enables multiple security/privacy vs. runtime tradeoffs. Our evaluation shows that UnLynx can execute a secure survey on 400,000 personal data records containing 5 encrypted attributes, distributed over 20 independent databases, for a total of 2,000,000 ciphertexts, in 24 minutes.

  4. Intracellular mediators of potassium-induced aldosterone secretion

    International Nuclear Information System (INIS)

    Ganguly, A.; Chiou, S.; Davis, J.S.

    1990-01-01

    We have investigated the intracellular messengers of potassium in eliciting aldosterone secretion in calf adrenal glomerulosa cells since there were unresolved issues relating to the role of phosphoinositides, cAMP and protein kinases. We observed no evidence of hydrolysis of phosphatidylinositol 4,5-bisphosphate (PIP 2 ) in 3 H-inositol labeled alf adrenal cells or increase of cAMP in response to potassium. Addition of calcium channel blocker, nitrendipine after stimulating adrenal glomerulosa cells with potassium, markedly inhibited aldosterone secretion. A calmodulin inhibitor (W-7) produced greater reduction of aldosterone secretion than an inhibitor of protein kinase C (H-7). These results suggest that a rise in cytosolic free calcium concentration through voltage-dependent calcium channel and calmodulin are the critical determinants of aldosterone secretion stimulated by potassium

  5. OnSight: Multi-platform Visualization of the Surface of Mars

    Science.gov (United States)

    Abercrombie, S. P.; Menzies, A.; Winter, A.; Clausen, M.; Duran, B.; Jorritsma, M.; Goddard, C.; Lidawer, A.

    2017-12-01

    A key challenge of planetary geology is to develop an understanding of an environment that humans cannot (yet) visit. Instead, scientists rely on visualizations created from images sent back by robotic explorers, such as the Curiosity Mars rover. OnSight is a multi-platform visualization tool that helps scientists and engineers to visualize the surface of Mars. Terrain visualization allows scientists to understand the scale and geometric relationships of the environment around the Curiosity rover, both for scientific understanding and for tactical consideration in safely operating the rover. OnSight includes a web-based 2D/3D visualization tool, as well as an immersive mixed reality visualization. In addition, OnSight offers a novel feature for communication among the science team. Using the multiuser feature of OnSight, scientists can meet virtually on Mars, to discuss geology in a shared spatial context. Combining web-based visualization with immersive visualization allows OnSight to leverage strengths of both platforms. This project demonstrates how 3D visualization can be adapted to either an immersive environment or a computer screen, and will discuss advantages and disadvantages of both platforms.

  6. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  7. Apparent inhibition of β-fructosidase secretion by tunicamycin may be explained by breakdown of the unglycosylated protein during secretion

    International Nuclear Information System (INIS)

    Faye, L.; Chrispeels, M.J.

    1989-01-01

    Suspension-cultured carrot (Daucus carota) cells synthesize and secrete β-fructosidase, a glycoprotein with asparagine-linked glycans. Treatment of the cells with tunicamycin completely inhibits the apparent secretion of β-fructosidase as measured by the accumulation of the 35 S-labelled protein in the cell wall or the culture medium. In the past, such a result has been interpreted as an inhibition of secretion by tunicamycin, but we suggest another explanation based on the following results. In the presence of tunicamycin, unglycosylated β-fructosidase is synthesized and is associated with an endoplasmic-reticulum-rich microsomal fraction. Pulse-chase experiments show that the unglycosylated β-fructosidase does not remain in the cells and appears to be secreted in the same way as glycosylated β-fructosidase; however, no radioactive, unglycosylated β-fructosidase accumulates extracellularly (cell wall or medium). Protoplasts obtained from carrot cells secrete β-fructosidase protein and activity, and treatment of the protoplasts with tunicamycin results in the synthesis of unglycosylated β-fructosidase. In the presence of tunicamycin, there is no accumulation of β-fructosidase activity or unglycosylated β-fructosidase polypeptide in the protoplast incubation medium. These results are consistent with the interpretation that the glycans of β-fructosidase are necessary for its stability, and that in these suspension-cultured cells, the unglycosylated enzyme is degraded during the last stage(s) of secretion, or immediately after its arrival in the wall

  8. Quantum tagging for tags containing secret classical data

    International Nuclear Information System (INIS)

    Kent, Adrian

    2011-01-01

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finite key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.

  9. A new potential secretion pathway for recombinant proteins in Bacillus subtilis.

    Science.gov (United States)

    Wang, Guangqiang; Xia, Yongjun; Gu, Zhennan; Zhang, Hao; Chen, Yong Q; Chen, Haiqin; Ai, Lianzhong; Chen, Wei

    2015-11-10

    Secretion of cytoplasmic expressed proteins into growth media has significant advantages. Due to the lack of an outer membrane, Bacillus subtilis is considered as a desirable 'cell factory' for the secretion of recombinant proteins. However, bottlenecks in the classical pathway for the secretion of recombinant proteins limit its use on a wide scale. In this study, we attempted to use four typical non-classically secreted proteins as signals to export three recombinant model proteins to the culture medium. All four non-classically secreted proteins can direct the export of the intrinsically disordered nucleoskeletal-like protein (Nsp). Two of them can guide the secretion of alkaline phosphatase (PhoA). One can lead the secretion of the thermostable β-galactosidase BgaB, which cannot be secreted with the aid of typical Sec-dependent signal peptides. Our results show that the non-classically secreted proteins lead the recombinant proteins to the culture medium, and thus non-classical protein secretion pathways can be exploited as a novel secretion pathway for recombinant proteins.

  10. A translocator-specific export signal establishes the translocator-effector secretion hierarchy that is important for type III secretion system function

    Science.gov (United States)

    Tomalka, Amanda G.; Stopford, Charles M.; Lee, Pei-Chung; Rietsch, Arne

    2012-01-01

    Summary Type III secretion systems are used by many Gram-negative pathogens to directly deliver effector proteins into the cytoplasm of host cells. To accomplish this, bacteria secrete translocator proteins that form a pore in the host-cell membrane through which the effector proteins are then introduced into the host cell. Evidence from multiple systems indicates that the pore-forming translocator proteins are exported before effectors, but how this secretion hierarchy is established is unclear. Here we used the P. aeruginosa translocator protein PopD as a model to identify its export signals. The amino-terminal secretion signal and chaperone, PcrH, are required for export under all conditions. Two novel signals in PopD, one proximal to the chaperone-binding site and one at the very C-terminus of the protein, are required for export of PopD before effector proteins. These novel export signals establish the translocator-effector secretion hierarchy, which in turn, is critical for the delivery of effectors into host cells. PMID:23121689

  11. A Visual Language for Protein Design

    KAUST Repository

    Cox, Robert Sidney

    2017-02-08

    As protein engineering becomes more sophisticated, practitioners increasingly need to share diagrams for communicating protein designs. To this end, we present a draft visual language, Protein Language, that describes the high-level architecture of an engineered protein with easy-to draw glyphs, intended to be compatible with other biological diagram languages such as SBOL Visual and SBGN. Protein Language consists of glyphs for representing important features (e.g., globular domains, recognition and localization sequences, sites of covalent modification, cleavage and catalysis), rules for composing these glyphs to represent complex architectures, and rules constraining the scaling and styling of diagrams. To support Protein Language we have implemented an extensible web-based software diagram tool, Protein Designer, that uses Protein Language in a

  12. A Visual Language for Protein Design

    KAUST Repository

    Cox, Robert Sidney; McLaughlin, James Alastair; Grunberg, Raik; Beal, Jacob; Wipat, Anil; Sauro, Herbert M.

    2017-01-01

    As protein engineering becomes more sophisticated, practitioners increasingly need to share diagrams for communicating protein designs. To this end, we present a draft visual language, Protein Language, that describes the high-level architecture of an engineered protein with easy-to draw glyphs, intended to be compatible with other biological diagram languages such as SBOL Visual and SBGN. Protein Language consists of glyphs for representing important features (e.g., globular domains, recognition and localization sequences, sites of covalent modification, cleavage and catalysis), rules for composing these glyphs to represent complex architectures, and rules constraining the scaling and styling of diagrams. To support Protein Language we have implemented an extensible web-based software diagram tool, Protein Designer, that uses Protein Language in a

  13. The Climate-G testbed: towards a large scale data sharing environment for climate change

    Science.gov (United States)

    Aloisio, G.; Fiore, S.; Denvil, S.; Petitdidier, M.; Fox, P.; Schwichtenberg, H.; Blower, J.; Barbera, R.

    2009-04-01

    The Climate-G testbed provides an experimental large scale data environment for climate change addressing challenging data and metadata management issues. The main scope of Climate-G is to allow scientists to carry out geographical and cross-institutional climate data discovery, access, visualization and sharing. Climate-G is a multidisciplinary collaboration involving both climate and computer scientists and it currently involves several partners such as: Centro Euro-Mediterraneo per i Cambiamenti Climatici (CMCC), Institut Pierre-Simon Laplace (IPSL), Fraunhofer Institut für Algorithmen und Wissenschaftliches Rechnen (SCAI), National Center for Atmospheric Research (NCAR), University of Reading, University of Catania and University of Salento. To perform distributed metadata search and discovery, we adopted a CMCC metadata solution (which provides a high level of scalability, transparency, fault tolerance and autonomy) leveraging both on P2P and grid technologies (GRelC Data Access and Integration Service). Moreover, data are available through OPeNDAP/THREDDS services, Live Access Server as well as the OGC compliant Web Map Service and they can be downloaded, visualized, accessed into the proposed environment through the Climate-G Data Distribution Centre (DDC), the web gateway to the Climate-G digital library. The DDC is a data-grid portal allowing users to easily, securely and transparently perform search/discovery, metadata management, data access, data visualization, etc. Godiva2 (integrated into the DDC) displays 2D maps (and animations) and also exports maps for display on the Google Earth virtual globe. Presently, Climate-G publishes (through the DDC) about 2TB of data related to the ENSEMBLES project (also including distributed replicas of data) as well as to the IPCC AR4. The main results of the proposed work are: wide data access/sharing environment for climate change; P2P/grid metadata approach; production-level Climate-G DDC; high quality tools for

  14. Expressed prostatic secretion biomarkers improve stratification of NCCN active surveillance candidates: performance of secretion capacity and TMPRSS2:ERG models.

    Science.gov (United States)

    Whelan, Christopher; Kawachi, Mark; Smith, David D; Linehan, Jennifer; Babilonia, Gail; Mejia, Rosa; Wilson, Timothy; Smith, Steven S

    2014-01-01

    Active surveillance is a viable patient option for prostate cancer provided that a clinical determination of low risk and presumably organ confined disease can be made. To standardize risk stratification schemes the NCCN (National Comprehensive Cancer Network®) provides guidelines for the active surveillance option. We determined the effectiveness of expressed prostatic secretion biomarkers for detecting occult risk factors in NCCN active surveillance candidates. Expressed prostatic secretion specimens were obtained before robot-assisted radical prostatectomy. Secretion capacity biomarkers, including total RNA and expressed prostatic secretion specimen volume, were measured by standard techniques. RNA expression biomarkers, including TXNRD1 mRNA, prostate specific antigen mRNA, TMPRSS2:ERG fusion mRNA and PCA3 mRNA, were measured by quantitative reverse-transcription polymerase chain reaction. Of the 528 patients from whom expressed prostatic secretions were collected 216 were eligible for active surveillance under NCCN guidelines. Variable selection on logistic regression identified 2 models, including one featuring types III and VI TMPRSS2:ERG variants, and one featuring 2 secretion capacity biomarkers. Of the 2 high performing models the secretion capacity model was most effective for detecting cases in this group that were up-staged or up-staged plus upgraded. It decreased the risk of up-staging in patients with a negative test almost eightfold and decreased the risk of up-staging plus upgrading about fivefold while doubling the prevalence of up-staging in the positive test group. Noninvasive expressed prostatic secretion testing may improve patient acceptance of active surveillance by dramatically reducing the presence of occult risk factors among those eligible for active surveillance under NCCN guidelines. Copyright © 2014 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  15. Wrox SharePoint 2010 SharePoint911 three-pack

    CERN Document Server

    Klindt, Todd; Mason, Jennifer; Rogers, Laura; Drisgill, Randy; Ross, John; Riemann, Larry; Perran, Amanda; Perran, Shane; Sanford, Jacob J; Stubbs, Paul; Caravajal, Steve

    2012-01-01

    The Wrox SharePoint 2010 SharePoint911 Three-Pack combines the contents of three full e-books written by the experts from SharePoint911.  That's over 1800 pages of hands-on advice from Todd Klindt, Shane Young, Laura Rogers, Randy Drisgill, Jennifer Mason, John Ross, and Larry Riemann, among others. In Beginning SharePoint 2010: Building Business Solutions with SharePoint (ISBN 978-0-470-61789-2) by Amanda Perran, Shane Perran, Jennifer Mason, and Laura Rogers, readers learn the core concepts, terminology, and features of SharePoint 2010. In Professiona

  16. Standpoints and protection of business secrets

    Directory of Open Access Journals (Sweden)

    Brane Bertoncelj

    2001-06-01

    Full Text Available The human impact on an information system where data bases, containing business secretes, are stored is one of the most unreliable and unforeseeable factors. For this reason, it must not be underestimated. The results of this study indicate a correlation between behavioural intention and protection of business secretes. There is a statistically significant correlation between behavioural intention and behavioural supervision. This means that an increased level of perceived supervision over one's own behaviour is related to behavioural intention. A great majority of participants would not divulge a business secret due to internal moral factors, i.e., they possess the appropriate capabilities to determine the advantages of social moral values over personal values.

  17. Cell Phones, Tablets, and Other Mobile Technology for Users with Visual Impairments

    Science.gov (United States)

    ... research. Share: Email Print Like (218 Likes) Cell Phones, Tablets, and Other Mobile Technology Touchscreen Smartphone Accessibility for People with Visual Impairments and Blindness The Benefits of Accessible Touchscreen Mobile Devices for People with ...

  18. Implementation of Unified English Braille by Teachers of Students with Visual Impairments in the United States

    Science.gov (United States)

    Hong, Sunggye; Rosenblum, L. Penny; Campbell, Amy Frank

    2017-01-01

    Introduction: This study analyzed survey responses from 141 teachers of students with visual impairments who shared their experiences about the implementation of Unified English Braille (UEB). Methods: Teachers of students with visual impairments in the United States completed an online survey during spring 2016. Results: Although most respondents…

  19. Secret Places.

    Science.gov (United States)

    Ridolfi, Kerry

    1997-01-01

    Argues that children are as deep as the ocean, with secret places inside of them waiting to be opened. Notes that it is powerful for students to learn they can make sense of the world through words, and describes inviting them into poetry as they read poetry, create poetry packets, and write and revise poems. (SR)

  20. Visual sensation during pecking in pigeons.

    Science.gov (United States)

    Ostheim, J

    1997-10-01

    During the final down-thrust of a pigeon's head, the eyes are closed gradually, a response that was thought to block visual input. This phase of pecking was therefore assumed to be under feed-forward control exclusively. Analysis of high resolution video-recordings showed that visual information collected during the down-thrust of the head could be used for 'on-line' modulations of pecks in progress. We thus concluded that the final down-thrust of the head is not exclusively controlled by feed-forward mechanisms but also by visual feedback components. We could further establish that as a rule the eyes are never closed completely but instead the eyelids form a slit which leaves a part of the pupil uncovered. The width of the slit between the pigeon' eyelids is highly sensitive to both, ambient luminance and the visual background against which seeds are offered. It was concluded that eyelid slits increase the focal depth of retinal images at extreme near-field viewing-conditions. Applying pharmacological methods we could confirm that pupil size and eyelid slit width are controlled through conjoint neuronal mechanisms. This shared neuronal network is particularly sensitive to drugs that affect dopamine receptors.

  1. Lipids in airway secretions

    International Nuclear Information System (INIS)

    Bhaskar, K.R.; DeFeudis O'Sullivan, D.; Opaskar-Hincman, H.; Reid, L.M.

    1987-01-01

    Lipids form a significant portion of airway mucus yet they have not received the same attention that epithelial glycoproteins have. We have analysed, by thin layer chromatography, lipids present in airway mucus under 'normal' and hypersecretory (pathological) conditions.The 'normals' included (1) bronchial lavage obtained from healthy human volunteers and from dogs and (2) secretions produced ''in vitro'' by human (bronchial) and canine (tracheal) explants. Hypersecretory mucus samples included (1) lavage from dogs made bronchitic by exposure to SO 2 , (2) bronchial aspirates from acute and chronic tracheostomy patients, (3) sputum from patients with cystic fibrosis and chronic bronchitis and (4) postmortem secretions from patients who died from sudden infant death syndrome (SIDS) or from status asthmaticus. Cholesterol was found to be the predominant lipid in 'normal' mucus with lesser amounts of phospholipids. No glycolipids were detected. In the hypersecretory mucus, in addition to neutral and phospholipids, glycolipids were present in appreciable amounts, often the predominant species, suggesting that these may be useful as markers of disease. Radioactive precursors 14 C acetate and 14 C palmitate were incorporated into lipids secreted ''in vitro'' by canine tracheal explants indicating that they are synthesised by the airway. (author)

  2. A thyrotropin‑secreting macroadenoma with positive growth ...

    African Journals Online (AJOL)

    A thyrotropin‑secreting macroadenoma with positive growth hormone and prolactin immunostaining: A case report and literature review. ... thyroid hormone receptor resistance syndrome. Key words: Inappropriate thyroid stimulating hormone, thyrotropin‑secreting pituitary adenoma, thyroid stimulating hormone adenoma ...

  3. A Framework for Sharing and Integrating Remote Sensing and GIS Models Based on Web Service

    Science.gov (United States)

    Chen, Zeqiang; Lin, Hui; Chen, Min; Liu, Deer; Bao, Ying; Ding, Yulin

    2014-01-01

    Sharing and integrating Remote Sensing (RS) and Geographic Information System/Science (GIS) models are critical for developing practical application systems. Facilitating model sharing and model integration is a problem for model publishers and model users, respectively. To address this problem, a framework based on a Web service for sharing and integrating RS and GIS models is proposed in this paper. The fundamental idea of the framework is to publish heterogeneous RS and GIS models into standard Web services for sharing and interoperation and then to integrate the RS and GIS models using Web services. For the former, a “black box” and a visual method are employed to facilitate the publishing of the models as Web services. For the latter, model integration based on the geospatial workflow and semantic supported marching method is introduced. Under this framework, model sharing and integration is applied for developing the Pearl River Delta water environment monitoring system. The results show that the framework can facilitate model sharing and model integration for model publishers and model users. PMID:24901016

  4. A framework for sharing and integrating remote sensing and GIS models based on Web service.

    Science.gov (United States)

    Chen, Zeqiang; Lin, Hui; Chen, Min; Liu, Deer; Bao, Ying; Ding, Yulin

    2014-01-01

    Sharing and integrating Remote Sensing (RS) and Geographic Information System/Science (GIS) models are critical for developing practical application systems. Facilitating model sharing and model integration is a problem for model publishers and model users, respectively. To address this problem, a framework based on a Web service for sharing and integrating RS and GIS models is proposed in this paper. The fundamental idea of the framework is to publish heterogeneous RS and GIS models into standard Web services for sharing and interoperation and then to integrate the RS and GIS models using Web services. For the former, a "black box" and a visual method are employed to facilitate the publishing of the models as Web services. For the latter, model integration based on the geospatial workflow and semantic supported marching method is introduced. Under this framework, model sharing and integration is applied for developing the Pearl River Delta water environment monitoring system. The results show that the framework can facilitate model sharing and model integration for model publishers and model users.

  5. Identification of genes encoding the type IX secretion system and secreted proteins in Flavobacterium columnare IA-S-4

    Science.gov (United States)

    Flavobacterium columnare, a member of the phylum Bacteroidetes, causes columnaris disease in wild and aquaculture-reared freshwater fish. The mechanisms responsible for columnaris disease are not known. Many members of the phylum Bacteroidetes use type IX secretion systems (T9SSs) to secrete enzymes...

  6. VIP secreting tumours in infancy

    International Nuclear Information System (INIS)

    Davies, R.P.; Slavotinek, J.P.; Dorney, S.F.A.

    1990-01-01

    Vasoactive intestinal polypeptide (VIP) secreting neural crest tumours are an uncommon but important treatable cause of intractable childhood diarrhoea. The radiological appearances of two cases are presented with a review of radiological findings in childhood VIP secreting neural crest tumours. Twenty eight cases of childhood VIP secreting neural crest tumours were reviewed. Nineteen (68%) were ganglioneuroblastomas and nine (32%) were ganglioneuromas. The majority of tumours (66%) were in a paravertebral location in the abdomen indicating that a search for such a tumour should be initiated at this site. Eighteen of the twenty eight cases reviewed discussed relevant radiological investigations. Calcification was detected in 50% of abdominal radiographs. Gut dilatation was often a prominent feature. A mass was detected in 5 of 5 cases where ultrasound findings were reported, and seven of seven cases with CT findings reported. Prior to the availability of CT and ultrasound the most useful investigation was IVU which demonstrated evidence of a mass in 5 of 9 cases. The presence of paravertebral calcification and gut dilatation on the plain radiograph of a child with intractable diarrhoea suggests the presence of a VIP secreting neural crest tumour. If an abdominal tumour is not found in the appropriate clinical setting and VIP levels are elevated, a widespread search of the paravertebral region is indicated. (orig.)

  7. Autophagy-dependent secretion: contribution to tumor progression

    Directory of Open Access Journals (Sweden)

    Tom Keulers

    2016-11-01

    Full Text Available Autophagy is best known as a lysosomal degradation and recycling pathway to maintain cellular homeostasis. During autophagy, cytoplasmic content is recognized and packed in autophagic vacuoles, or autophagosomes, and targeted for degradation. However, during the last years, it has become evident that the role of autophagy is not restricted to degradation alone but also mediates unconventional forms of secretion. Furthermore, cells with defects in autophagy apparently are able to reroute their cargo, like mitochondria, to the extracellular environment; effects that contribute to an array of pathologies. In this review we discuss the current knowledge of the physiological roles of autophagy-dependent secretion, i.e. the effect on inflammation and insulin/ hormone secretion. Finally, we focus on the effects of autophagy-dependent secretion on the tumour microenvironment and tumour progression. The autophagy mediated secreted factors may stimulate cellular proliferation via auto- and paracrine signaling. The autophagy mediated release of immune modulating proteins change the immunosuppresive tumor microenvironment and may promote an invasive phenotype. These effects may be either direct or indirect through facilitating formation of the mobilized vesicle, aid in anterograde trafficking or alterations in homeostasis and/or autonomous cell signaling.

  8. Enhanced secretion of natto phytase by Bacillus subtilis.

    Science.gov (United States)

    Tsuji, Shogo; Tanaka, Kosei; Takenaka, Shinji; Yoshida, Ken-ichi

    2015-01-01

    Phytases comprise a group of phosphatases that trim inorganic phosphates from phytic acid (IP6). In this study, we aimed to achieve the efficient secretion of phytase by Bacillus subtilis. B. subtilis laboratory standard strain 168 and its derivatives exhibit no phytase activity, whereas a natto starter secretes phytase actively. The natto phytase gene was cloned into strain RIK1285, a protease-defective derivative of 168, to construct a random library of its N-terminal fusions with 173 different signal peptides (SPs) identified in the 168 genome. The library was screened to assess the efficiency of phytase secretion based on clear zones around colonies on plates, which appeared when IP6 was hydrolyzed. The pbp SP enhanced the secretion of the natto phytase most efficiently, i.e. twice that of the original SP. Thus, the secreted natto phytase was purified and found to remove up to 3 phosphates from IP6.

  9. The Secret of Guided Missile Re-Entry,

    Science.gov (United States)

    1986-06-25

    I RD-PAI169 598 THE SECRET OF GUIDED MISSILE RE-ENTRY(U) FOREIGN / I TECHNOLOGY DIV NRIGHT-PATTERSON RFB OH J CHEN ET AL. I 25 JUN 96 FTD-ID(RS)T...TECHNOLOGY DIVISION THE SECRET OF GUIDED MISSILE RE-ENTRY by Chen Jingzhong, An Sehua J L 0 7 ’:;85’ ’ 0 *Approved for public release; Distribution...unlimite t d. :. 86 7 034.. FTD- ID(RS)T-0459-86 HUMAN TRANSLATION FTD-ID(RS)T-0459-86 25 June 1986 MICROFICHE NR: F - - 0Q 9? THE SECRET OF GUIDED

  10. Grouping and binding in visual short-term memory.

    Science.gov (United States)

    Quinlan, Philip T; Cohen, Dale J

    2012-09-01

    Findings of 2 experiments are reported that challenge the current understanding of visual short-term memory (VSTM). In both experiments, a single study display, containing 6 colored shapes, was presented briefly and then probed with a single colored shape. At stake is how VSTM retains a record of different objects that share common features: In the 1st experiment, 2 study items sometimes shared a common feature (either a shape or a color). The data revealed a color sharing effect, in which memory was much better for items that shared a common color than for items that did not. The 2nd experiment showed that the size of the color sharing effect depended on whether a single pair of items shared a common color or whether 2 pairs of items were so defined-memory for all items improved when 2 color groups were presented. In explaining performance, an account is advanced in which items compete for a fixed number of slots, but then memory recall for any given stored item is prone to error. A critical assumption is that items that share a common color are stored together in a slot as a chunk. The evidence provides further support for the idea that principles of perceptual organization may determine the manner in which items are stored in VSTM. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  11. Conversational Pedagogy: Exploring Interactions between a Teaching Artist and Young Learners during Visual Arts Experiences

    Science.gov (United States)

    Eckhoff, Angela

    2013-01-01

    In many early childhood classrooms, visual arts experiences occur around a communal arts table. A shared workspace allows for spontaneous conversation and exploration of the art-making process of peers and teachers. In this setting, conversation can play an important role in visual arts experiences as children explore new media, skills, and ideas.…

  12. Impaired Follistatin Secretion in Cirrhosis

    DEFF Research Database (Denmark)

    Rinnov, Anders Rasmussen; Plomgaard, Peter; Pedersen, Bente Klarlund

    2016-01-01

    compared to healthy control participants. DESIGN, SETTING, AND PARTICIPANTS: To experimentally increase the glucagon-insulin ratio (mimicking the hormonal effect of exercise), we infused glucagon/somatostatin (to inhibit insulin secretion) and compared the acute follistatin increase in eight male cirrhosis...... controls (27.6 ± 3.8 vs 34.5 ± 2.9%, respectively; P = .001). CONCLUSIONS: Patients with cirrhosis show impaired capacity to acutely secrete follistatin. The decrease in acute follistatin release may contribute to the loss of muscle mass in liver cirrhosis....

  13. Isolation and Identification of Proteins Secreted by Cells Cultured within Synthetic Hydrogel-Based Matrices.

    Science.gov (United States)

    Sawicki, Lisa A; Choe, Leila H; Wiley, Katherine L; Lee, Kelvin H; Kloxin, April M

    2018-03-12

    Cells interact with and remodel their microenvironment, degrading large extracellular matrix (ECM) proteins (e.g., fibronectin, collagens) and secreting new ECM proteins and small soluble factors (e.g., growth factors, cytokines). Synthetic mimics of the ECM have been developed as controlled cell culture platforms for use in both fundamental and applied studies. However, how cells broadly remodel these initially well-defined matrices remains poorly understood and difficult to probe. In this work, we have established methods for widely examining both large and small proteins that are secreted by cells within synthetic matrices. Specifically, human mesenchymal stem cells (hMSCs), a model primary cell type, were cultured within well-defined poly(ethylene glycol) (PEG)-peptide hydrogels, and these cell-matrix constructs were decellularized and degraded for subsequent isolation and analysis of deposited proteins. Shotgun proteomics using liquid chromatography and mass spectrometry identified a variety of proteins, including the large ECM proteins fibronectin and collagen VI. Immunostaining and confocal imaging confirmed these results and provided visualization of protein organization within the synthetic matrices. Additionally, culture medium was collected from the encapsulated hMSCs, and a Luminex assay was performed to identify secreted soluble factors, including vascular endothelial growth factor (VEGF), endothelial growth factor (EGF), basic fibroblast growth factor (FGF-2), interleukin 8 (IL-8), and tumor necrosis factor alpha (TNF-α). Together, these methods provide a unique approach for studying dynamic reciprocity between cells and synthetic microenvironments and have the potential to provide new biological insights into cell responses during three-dimensional (3D) controlled cell culture.

  14. Beginning SharePoint 2010 Administration Windows SharePoint Foundation 2010 and Microsoft SharePoint Server 2010

    CERN Document Server

    Husman, Göran

    2010-01-01

    Complete coverage on the latest advances in SharePoint 2010 administration. SharePoint 2010 comprises an abundance of new features, and this book shows you how to take advantage of all SharePoint 2010's many improvements. Written by a four-time SharePoint MVP, Beginning SharePoint 2010 Administration begins with a comparison of SharePoint 2010 compared to the previous version and then examines the differences between WSS 4.0 and MSS 2010. Packed with step-by-step instructions, tips and tricks, and real-world examples, this book dives into the basics of how to install, manage, and administrate

  15. 10 CFR 1016.34 - Accountability for Secret Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...

  16. Omeprazole promotes proximal duodenal mucosal bicarbonate secretion in humans

    DEFF Research Database (Denmark)

    Mertz-Nielsen, A; Hillingsø, Jens; Bukhave, K

    1996-01-01

    with control experiments. Also the combination of omeprazole and ranitidine increased (p = 0.05) duodenal bicarbonate secretion, while ranitidine alone caused no change in either basal or stimulated secretion. In the stomach basal as well as vagally stimulated bicarbonate secretion was independent of the means...

  17. A catalogue of human secreted proteins and its implications

    Directory of Open Access Journals (Sweden)

    Shivakumar Keerthikumar

    2016-11-01

    Full Text Available Under both normal and pathological conditions, cells secrete variety of proteins through classical and non-classical secretory pathways into the extracellular space. Majority of these proteins represent pathophysiology of the cell from which it is secreted. Recently, though more than 92% of the protein coding genes has been mapped by human proteome map project, but number of those proteins that constitutes secretome of the cell still remains elusive. Secreted proteins or the secretome can be accessible in bodily fluids and hence are considered as potential biomarkers to discriminate between healthy and diseased individuals. In order to facilitate the biomarker discovery and to further aid clinicians and scientists working in these arenas, we have compiled and catalogued secreted proteins from the human proteome using integrated bioinformatics approach. In this study, nearly 14% of the human proteome is likely to be secreted through classical and non-classical secretory pathways. Out of which, ~38% of these secreted proteins were found in extracellular vesicles including exosomes and shedding microvesicles. Among these secreted proteins, 94% were detected in human bodily fluids including blood, plasma, serum, saliva, semen, tear and urine. We anticipate that this high confidence list of secreted proteins could serve as a compendium of candidate biomarkers. In addition, the catalogue may provide functional insights in understanding the molecular mechanisms involved in various physiological and pathophysiological conditions of the cell.

  18. Affinity of antibody secreted by a single cell

    International Nuclear Information System (INIS)

    Doran, D.M.

    1978-01-01

    It was the intention of this research to measure the affinity of antibody secreted by a single cell, and to describe the spectrum of affinities displayed in response to antigenic stimulation. The single cell secreting specific antibody was isolated by means of the hemolytic plaque assay. The amount of antibody secreted by the cell was to be measured through the use of a solid phase radioimmunoassay. The affinity of the antibody would be estimated by comparing the diameter of the plaque, and the amount of antibody secreted, with a mathematical theory of the formation of a plaque in agar. As a test system, a solid phase radioimmunoassay was developed for human serum albumin using antibody coupled to Sephadex. A sensitivity of 1 nanogram was attained with this assay. A solid phase radioimmunoassay for mouse immunoglobulin M was developed, using antibody coupled to Sepharose. The sensitivity attained with this assay was only on the order of 10 micrograms. The mouse immunoglobulin M radioimmunoassay was not sensitive enough to measure the amount of antibody secreted by a single cell. From a theoretical equation, the relationship between antibody affinity, plaque diameter and antibody secretion rate was calculated for the experimental conditions used in this research. By assuming a constant antibody secretion rate, an effective binding constant for the antibody was estimated from the average plaque diameters. This effective binding constant was observed to increase during the immune response

  19. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    OpenAIRE

    Liu, Yujia; Zhang, Weiming; Yu, Nenghai

    2017-01-01

    Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN). To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic det...

  20. Humidification and secretion volume in mechanically ventilated patients.

    Science.gov (United States)

    Solomita, Mario; Palmer, Lucy B; Daroowalla, Feroza; Liu, Jeffrey; Miller, Dori; LeBlanc, Deniese S; Smaldone, Gerald C

    2009-10-01

    To determine potential effects of humidification on the volume of airway secretions in mechanically ventilated patients. Water vapor delivery from devices providing non-heated-wire humidification, heated-wire humidification, and heat and moisture exchanger (HME) were quantified on the bench. Then, patients requiring 24-hour mechanical ventilation were exposed sequentially to each of these humidification devices, and secretions were removed and measured by suctioning every hour during the last 4 hours of the 24-hour study period. In vitro water vapor delivery was greater using non-heated-wire humidification, compared to heated-wire humidification and HME. In vivo, a total of 9 patients were studied. Secretion volume following humidification by non-heated-wire humidification was significantly greater than for heated-wire humidification and HME (P=.004). The volume of secretions appeared to be linked to humidification, as greater water vapor delivery measured in vitro was associated with greater secretion volume in vivo.

  1. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  2. Share and share alike? Social information and interaction style in coordination of shared use

    NARCIS (Netherlands)

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.

    2018-01-01

    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  3. Type-IVC Secretion System: A Novel Subclass of Type IV Secretion System (T4SS) Common Existing in Gram-Positive Genus Streptococcus

    Science.gov (United States)

    Chen, Chen; Gao, George F.

    2012-01-01

    A growing number of pathogens are being found to possess specialized secretion systems which they use in various ways to subvert host defenses. Type IV secretion system (T4SS) is one of versatile secretion systems essential for the virulence and even survival of some bacteria species, and they enable the secretion of protein and DNA substrates across the cell envelope. T4SS was once believed to be present only in Gram-negative bacteria. In this study, we present evidence of a new subclass of T4SS, Type-IVC secretion system and indicate its common existence in the Gram-positive bacterial genus Streptococcus. We further identified that VirB1, VirB4, VirB6 and VirD4 are the minimal key components of this system. Using genome comparisons and evolutionary relationship analysis, we proposed that Type-IVC secretion system is movable via transposon factors and mediates the conjugative transfer of DNA, enhances bacterial pathogenicity, and could cause large-scale outbreaks of infections in humans. PMID:23056296

  4. Cell Secretion: Current Structural and Biochemical Insights

    Directory of Open Access Journals (Sweden)

    Saurabh Trikha

    2010-01-01

    Full Text Available Essential physiological functions in eukaryotic cells, such as release of hormones and digestive enzymes, neurotransmission, and intercellular signaling, are all achieved by cell secretion. In regulated (calcium-dependent secretion, membrane-bound secretory vesicles dock and transiently fuse with specialized, permanent, plasma membrane structures, called porosomes or fusion pores. Porosomes are supramolecular, cup-shaped lipoprotein structures at the cell plasma membrane that mediate and control the release of vesicle cargo to the outside of the cell. The sizes of porosomes range from 150nm in diameter in acinar cells of the exocrine pancreas to 12nm in neurons. In recent years, significant progress has been made in our understanding of the porosome and the cellular activities required for cell secretion, such as membrane fusion and swelling of secretory vesicles. The discovery of the porosome complex and the molecular mechanism of cell secretion are summarized in this article.

  5. The semantics of secrecy: young children's classification of secret content.

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J

    2010-01-01

    The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.

  6. Secreted autoantibody repertoires in Sjögren's syndrome and systemic lupus erythematosus: A proteomic approach.

    Science.gov (United States)

    Al Kindi, Mahmood A; Colella, Alex D; Chataway, Tim K; Jackson, Michael W; Wang, Jing J; Gordon, Tom P

    2016-04-01

    The structures of epitopes bound by autoantibodies against RNA-protein complexes have been well-defined over several decades, but little is known of the clonality, immunoglobulin (Ig) variable (V) gene usage and mutational status of the autoantibodies themselves at the level of the secreted (serum) proteome. A novel proteomic workflow is presented based on affinity purification of specific Igs from serum, high-resolution two-dimensional gel electrophoresis, and de novo and database-driven sequencing of V-region proteins by mass spectrometry. Analysis of anti-Ro52/Ro60/La proteomes in primary Sjögren's syndrome (SS) and anti-Sm and anti-ribosomal P proteomes in systemic lupus erythematosus (SLE) has revealed that these antibody responses are dominated by restricted sets of public (shared) clonotypes, consistent with common pathways of production across unrelated individuals. The discovery of shared sets of specific V-region peptides can be exploited for diagnostic biomarkers in targeted mass spectrometry platforms and for tracking and removal of pathogenic clones. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Engineering signal peptides for enhanced protein secretion from Lactococcus lactis.

    Science.gov (United States)

    Ng, Daphne T W; Sarkar, Casim A

    2013-01-01

    Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts.

  8. The problem of using trade secrets in economic relations

    Directory of Open Access Journals (Sweden)

    А. О. Олефір

    2015-05-01

    Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy

  9. A Public Secret

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2011-01-01

    This article is based on anthropological fieldwork undertaken at two elite universities in Beijing. It addresses the paradoxical situation of the many instances of suicide among Chinese elite university students in Beijing, which constitute a public secret. The pressure of education weighs heavily...

  10. Visual expression of the experiences of restrictive eating

    DEFF Research Database (Denmark)

    Mark, Edith; Delmar, Charlotte

    Background of the research: Visual methods are used in nursing research. These methods include media such as film, video, still images, material artifacts and drawing. The current study is a PhD project, dealing with children's experiences of eating restrictively (diabetes or obesity). Visual...... of reflection work. Children often end their drawing and throw the drawing work, because they have gained the insight that they were looking for. This insight can be shared and used in conversation with children who have difficulties in finding verbal expression. The drawing creates a passable path...... methods were used as a complement to qualitative research methods (e.g., interviews) in an effort to explore and identify children's perceptions of life situation. Purpose for the presentation: Presenting the use of visual methods as a research tool in the phenomenological nursing research...

  11. An unexpected knock on Corrigan’s secret door

    Science.gov (United States)

    Woywodt, Alexander

    2010-01-01

    Corrigan’s secret door describes a metaphorical escape route for busy physicians. The term was derived from the successful and exceptionally busy professional life of Irish physician Dominic John Corrigan (1802–80). It is claimed that Corrigan’s outpatient clinic was so busy that he required a secret door in his consulting rooms to escape from the ever-growing queue of eager patients. The origins of this charming story are unknown, and the door may have never existed. However, at present, Corrigan’s secret door is often quoted when busy physicians have their own little ways in surviving a stressful professional life. Generations of British-trained doctors have grown up with Corrigan’s secret door, as it was featured in the introduction of the Oxford Handbook of Clinical Medicine. Accordingly, trainees as well as more senior doctors are often reminded that having a ‘secret door’ is vital in surviving in the medical profession. My own escape is through classical music and the violoncello, in particular. As the name implies, my own secret door is normally invisible to colleagues and patients. This little article is about a patient who found me out, and a reflection on the role of classical music and the cello in my professional life. PMID:25984078

  12. Pathophysiology of glucagon secretion

    International Nuclear Information System (INIS)

    Boettger, J.; Pabst, H.W.

    1980-01-01

    Pathophysiology of glucagon secretion is reviewed in brief separating hyperglucagonemic from hypoclucagonemic states. Many questions concerning the role of glucagon in diabetes mellitus and in other diseases are still unresolved. The clucagon RIA is of clinical significance in a few diseases like glucagonoma, which may present without symptoms of the 'glucagonoma syndrome', the probably very rare hyperglucagonemia and some of the spontaneous hypoglycemias. Glucagon secretion may be evaluated by the determination of fasting immunoreactive glucagon (IRG) and by appropriate function tests as stimulation with i.v. arginine and suppression with oral glucose. However, the glucagon RIA at present is not a routine method, although commercial kits are available. Many pitfalls of radioimmunological glucagon determination still exist. (orig.) [de

  13. Biliary and pancreatic secretions in abdominal irradiation

    International Nuclear Information System (INIS)

    Becciolini, A.; Cionini, L.; Cappellini, M.; Atzeni, G.

    1979-01-01

    The biliary and pancreatic secretions have been determined in patients given pelvic or para-aortic irradiation, with a dose of 50 Gy in the former group and between 36 and 40 Gy in the latter. A test meal containing polyethylene glycol (PEG) as reference substance was used. Each sample of the duodenal content was assayed for volume, PEG content, amylase and trypsin activity, pH and biliary secretion. No significant modifications of biliary and pancreatic secretions were demonstrated after irradiation, suggesting that these functions are not involved in the pathogenesis of the malabsorption radiation syndrome. (Auth.)

  14. Pancreatic bicarbonate secretion involves two proton pumps.

    Science.gov (United States)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L; Haanes, Kristian A; Krabbe, Simon; Nitschke, Roland; Hede, Susanne E

    2011-01-07

    Pancreas secretes fluid rich in digestive enzymes and bicarbonate. The alkaline secretion is important in buffering of acid chyme entering duodenum and for activation of enzymes. This secretion is formed in pancreatic ducts, and studies to date show that plasma membranes of duct epithelium express H(+)/HCO(3)(-) transporters, which depend on gradients created by the Na(+)/K(+)-ATPase. However, the model cannot fully account for high-bicarbonate concentrations, and other active transporters, i.e. pumps, have not been explored. Here we show that pancreatic ducts express functional gastric and non-gastric H(+)-K(+)-ATPases. We measured intracellular pH and secretion in small ducts isolated from rat pancreas and showed their sensitivity to H(+)-K(+) pump inhibitors and ion substitutions. Gastric and non-gastric H(+)-K(+) pumps were demonstrated on RNA and protein levels, and pumps were localized to the plasma membranes of pancreatic ducts. Quantitative analysis of H(+)/HCO(3)(-) and fluid transport shows that the H(+)-K(+) pumps can contribute to pancreatic secretion in several species. Our results call for revision of the bicarbonate transport physiology in pancreas, and most likely other epithelia. Furthermore, because pancreatic ducts play a central role in several pancreatic diseases, it is of high relevance to understand the role of H(+)-K(+) pumps in pathophysiology.

  15. Visual Thinking Routines: A Mixed Methods Approach Applied to Student Teachers at the American University in Dubai

    Science.gov (United States)

    Gholam, Alain

    2017-01-01

    Visual thinking routines are principles based on several theories, approaches, and strategies. Such routines promote thinking skills, call for collaboration and sharing of ideas, and above all, make thinking and learning visible. Visual thinking routines were implemented in the teaching methodology graduate course at the American University in…

  16. A redesign of OGC Symbology Encoding standard for sharing cartography

    Directory of Open Access Journals (Sweden)

    Erwan Bocher

    2018-01-01

    Full Text Available Despite most Spatial Data Infrastructures offering service-based visualization of geospatial data, requirements are often at a very basic level leading to poor quality of maps. This is a general observation for any geospatial architecture as soon as open standards as those of the Open Geospatial Consortium (OGC are applied. To improve the situation, this paper does focus on improvements at the portrayal interoperability side by considering standardization aspects. We propose two major redesign recommendations. First to consolidate the cartographic theory at the core of the OGC Symbology Encoding standard. Secondly to build the standard in a modular way so as to be ready to be extended with upcoming future cartographic requirements. Thus, we start by defining portrayal interoperability by means of typical-use cases that frame the concept of sharing cartography. Then we bring to light the strengths and limits of the relevant open standards to consider in this context. Finally we propose a set of recommendations to overcome the limits so as to make these use cases a true reality. Even if the definition of a cartographic-oriented standard is not able to act as a complete cartographic design framework by itself, we argue that pushing forward the standardization work dedicated to cartography is a way to share and disseminate good practices and finally to improve the quality of the visualizations.

  17. Catechin secretion and phytotoxicity

    Science.gov (United States)

    Kaushik, Shail

    2010-01-01

    Research indicates that the invasiveness of Centaurea stoebe is attributed to the stronger allelopathic effects on the native North American species than on the related European species, which is one of the unquestionable aspects of the “novel weapons hypothesis (NWH).” Studies originating from controlled to field conditions have shown that C. stoebe utilizes its biochemical potential to exert its invasiveness. The roots of C. stoebe secrete a potent phytotoxin, catechin, which has a detrimental effect on the surrounding plant species. Although, studies on catechin secretion and phytotoxicity represent one of the most well studied systems describing negative plant-plant interactions, it has also sparked controversies lately due to its phytotoxicity dosages and secretion effluxes. Previous reports negate the phytotoxic and pro-oxidant nature of catechin.1–3 In our recent study we have shown that catechin is highly phytotoxic against Arabidopsis thaliana and Festuca idahoensis. We also show that (±) catechin applied to roots of A. thaliana induces reactive oxygen species (ROS) confirming the pro-oxidant nature of catechin. In addition, activation of signature cell death genes such as acd2 and cad1 post catechin treatment in A. thaliana ascertains the phytotoxic nature of catechin. PMID:21057643

  18. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Directory of Open Access Journals (Sweden)

    Young Yoon

    Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  19. Interactive Data Visualization for HIV Cohorts: Leveraging Data Exchange Standards to Share and Reuse Research Tools.

    Directory of Open Access Journals (Sweden)

    Meridith Blevins

    Full Text Available To develop and disseminate tools for interactive visualization of HIV cohort data.If a picture is worth a thousand words, then an interactive video, composed of a long string of pictures, can produce an even richer presentation of HIV population dynamics. We developed an HIV cohort data visualization tool using open-source software (R statistical language. The tool requires that the data structure conform to the HIV Cohort Data Exchange Protocol (HICDEP, and our implementation utilized Caribbean, Central and South America network (CCASAnet data.This tool currently presents patient-level data in three classes of plots: (1 Longitudinal plots showing changes in measurements viewed alongside event probability curves allowing for simultaneous inspection of outcomes by relevant patient classes. (2 Bubble plots showing changes in indicators over time allowing for observation of group level dynamics. (3 Heat maps of levels of indicators changing over time allowing for observation of spatial-temporal dynamics. Examples of each class of plot are given using CCASAnet data investigating trends in CD4 count and AIDS at antiretroviral therapy (ART initiation, CD4 trajectories after ART initiation, and mortality.We invite researchers interested in this data visualization effort to use these tools and to suggest new classes of data visualization. We aim to contribute additional shareable tools in the spirit of open scientific collaboration and hope that these tools further the participation in open data standards like HICDEP by the HIV research community.

  20. Pathogenesis of canine cortisol-secreting adrenocortical tumors

    NARCIS (Netherlands)

    Kool, Miriam

    2015-01-01

    In dogs, hypercortisolism is one of the most frequently observed endocrine disorders, with an estimated incidence of about 1-2 cases per 1000 dogs per year. Approximately 15% of these cases is due to a cortisol-secreting adrenocortical tumor (AT). Cortisol-secreting ATs are characterized by