WorldWideScience

Sample records for visual secret sharing

  1. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  2. Towards Shift Tolerant Visual Secret Sharing Schemes without Pixel Expansion

    Directory of Open Access Journals (Sweden)

    Juan Justie Su-Tzu

    2016-01-01

    Full Text Available Naor and Shamir proposed the visual cryptography in 1995, they encrypted secret image into two meaningless random images, called shares, and it can be decrypted by human vision without any calculations. However, there would be problems in alignment when these two shares are staked by hand in practical. Therefore, this paper presents the fault-tolerant schemes of stacking two shares which are acquired from secret image encryption without pixel expansion. The main idea of these schemes is combining several pixels to be a unit, then encrypting every unit into a specific combination of pixels. It makes visual secret sharing scheme more practical.

  3. Enhanced visual secret sharing for graphical password authentication

    Science.gov (United States)

    Rajendra, A. B.; Sheshadri, H. S.

    2013-03-01

    Password is a very common and widely used authentication method to provide security to valuable data. It is desirable to make password more memorable and easier for people to use. Traditionally passwords are alphanumeric, numbers & symbols. Some problems of normal password appear like stolen the password, forgetting the password, week password. Study shows that text-based passwords suffer with both security and authentication problems. To overcome these problems, Graphical passwords have been developed. Visual secret sharing (VSS) scheme is a secret sharing scheme in which an image is converted into shares. No information can be revealed by observing any share (Dotted image). The information about the original image will be revealed only after stacking sufficient number of shares (Dotted images). In this paper, we have used XNOR operation instead of OR operation and contrast of the decrypted image is clearer than existing Enhanced Visual Secret Sharing (EVSS) scheme. Also, we are presenting new approach to authenticate graphical password image using 2-out-of-2 EVSS scheme. Which can be used to protect machines with additional security.

  4. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  5. Computing on quantum shared secrets

    Science.gov (United States)

    Ouyang, Yingkai; Tan, Si-Hui; Zhao, Liming; Fitzsimons, Joseph F.

    2017-11-01

    A (k ,n )-threshold secret-sharing scheme allows for a string to be split into n shares in such a way that any subset of at least k shares suffices to recover the secret string, but such that any subset of at most k -1 shares contains no information about the secret. Quantum secret-sharing schemes extend this idea to the sharing of quantum states. Here we propose a method of performing computation securely on quantum shared secrets. We introduce a (n ,n )-quantum secret sharing scheme together with a set of algorithms that allow quantum circuits to be evaluated securely on the shared secret without the need to decode the secret. We consider a multipartite setting, with each participant holding a share of the secret. We show that if there exists at least one honest participant, no group of dishonest participants can recover any information about the shared secret, independent of their deviations from the algorithm.

  6. On Cheating Immune Secret Sharing

    Directory of Open Access Journals (Sweden)

    Josef Pieprzyk

    2004-12-01

    Full Text Available The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2 n ∑ c=1...n ∑ α∈V n ρ c,α, denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρ c,α satisfies ρ c,α = ½ for every cheating vector δ c and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.

  7. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector consis...

  8. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  9. Fast-weighted secret image sharing

    Science.gov (United States)

    Lin, Sian-Jheng; Chen, Lee Shu-Teng; Lin, Ja-Chen

    2009-07-01

    Thien and Lin [Comput. and Graphics 26(5), 765-770 (2002)] proposed a threshold scheme to share a secret image among n shadows: any t of the n shadows can recover the secret, whereas t-1 or fewer shadows cannot. However, in real life, certain managers probably play key roles to run a company and thus need special authority to recover the secret in managers' meeting. (Each manager's shadow should be more powerful than an ordinary employee's shadow.) In Thien and Lin's scheme, if a company has less than t managers, then manager's meeting cannot recover the secret, unless some managers were given multiple shadows in advance. But this compromise causes managers inconvenience because too many shadows were to be kept daily and carried to the meeting. To solve this dilemma, a weighted sharing method is proposed: each of the shadows has a weight. The secret is recovered if and only if the total weights (rather than the number) of received shadows is at least t. The properties of GF(2r) are utilized to accelerate sharing speed. Besides, the method is also a more general approach to polynomial-based sharing. Moreover, for convenience, each person keeps only one shadow and only one shadow index.

  10. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  11. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors are ...

  12. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  13. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  14. The Future Internet: A World of Secret Shares

    Directory of Open Access Journals (Sweden)

    William J. Buchanan

    2015-11-01

    Full Text Available The Public Key Infrastructure (PKI is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.

  15. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented by a prop......Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented...... by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...

  16. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Bloch Matthieu

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  17. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Tan F. Wong

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the “channel model with wiretapper” considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  18. Cryptanalysis and improvement of multiparty quantum secret sharing schemes

    Energy Technology Data Exchange (ETDEWEB)

    Wang Tianyin [State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematical Science, Luoyang Normal University, Luoyang 471022 (China)], E-mail: wangtianyin@yahoo.cn; Wen Qiaoyan; Gao Fei; Lin Song [State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, PO Box 810, Chengdu 610041 (China)

    2008-12-22

    A scheme of multiparty quantum secret sharing of classical messages (QSSCM) [Z.J. Zhang et al., Opt. Commun. 269 (2007) 418] was proposed. Lin et al. [S. Lin et al., Opt. Commun. 281 (2008) 4553] showed the last agent can obtain half of the secret in Z.J. Zhang's et al. three-party QSSCM scheme and gave an improved version. We further show the first agent and the last agent can obtain all the secret without introducing any error in Zhang's et al. multiparty QSSCM scheme by a special attack with quantum teleportation. We also present an improved version.

  19. Cryptanalysis of quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaofen; Pan Rijing, E-mail: liuxiaofen23@fjnu.edu.cn [School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007 (China)

    2011-10-15

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  20. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  1. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  2. Experimental circular quantum secret sharing over telecom fiber network.

    Science.gov (United States)

    Wei, Ke-Jin; Ma, Hai-Qiang; Yang, Jian-Hui

    2013-07-15

    We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.

  3. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    We show that if a set of players hold shares of a value $a\\in Z_p$ for some prime $p$ (where the set of shares is written $[a]_p$), it is possible to compute, in constant round and with unconditional security, sharings of the bits of $a$, i.e.~compute sharings $[a_0]_p, \\ldots, [a_{l-1}]_p......$ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  4. The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing

    NARCIS (Netherlands)

    I. Cascudo (Ignacio); R.J.F. Cramer (Ronald); C. Xing (Chaoping); P. Rogaway

    2011-01-01

    textabstractAn $(n,t,d,n-t)$-arithmetic secret sharing scheme (with uniformity) for $\\Fq^k$ over $\\Fq$ is an $\\Fq$-linear secret sharing scheme where the secret is selected from $\\Fq^k$ and each of the $n$ shares is an element of $\\Fq$. Moreover, there is $t$-privacy (in addition, any $t$

  5. A Secret Image Sharing Method Using Integer Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Li Ching-Chung

    2007-01-01

    Full Text Available A new image sharing method, based on the reversible integer-to-integer (ITI wavelet transform and Shamir's threshold scheme is presented, that provides highly compact shadows for real-time progressive transmission. This method, working in the wavelet domain, processes the transform coefficients in each subband, divides each of the resulting combination coefficients into shadows, and allows recovery of the complete secret image by using any or more shadows . We take advantages of properties of the wavelet transform multiresolution representation, such as coefficient magnitude decay and excellent energy compaction, to design combination procedures for the transform coefficients and processing sequences in wavelet subbands such that small shadows for real-time progressive transmission are obtained. Experimental results demonstrate that the proposed method yields small shadow images and has the capabilities of real-time progressive transmission and perfect reconstruction of secret images.

  6. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  7. Quantum secret sharing based on Smolin states alone

    Energy Technology Data Exchange (ETDEWEB)

    He Guangping [School of Physics and Engineering and Advanced Research Center, Sun Yat-sen University, Guangzhou 510275 (China); Wang, Z D; Bai, Yankui [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road, Hong Kong (China)], E-mail: hegp@mail.sysu.edu.cn, E-mail: zwang@hkucc.hku.hk, E-mail: ykbai@semi.ac.cn

    2008-10-17

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally.

  8. Penerapan Secret Image Sharing Menggunakan Steganografi dengan Metode Dynamic Embedding dan Authentication-Chaining

    Directory of Open Access Journals (Sweden)

    Arya Widyadhana

    2012-09-01

    Full Text Available Teknik yang banyak digunakan untuk menyebarkan suatu citra rahasia kepada n orang adalah dengan cara membagi citra rahasia ke dalam beberapa bagian yang kemudian diproses menggunakan skema (k, n-Shamir Secret Sharing yang dikemukakan oleh Adi Shamir (1979. Bagian-bagian dari citra rahasia yang sudah diproses tersebut disisipkan ke dalam n citra kamuflase dan menghasilkan n citra stego. Penyisipan dilakukan sedemikian rupa sehingga kualitas visual citra stego semirip mungkin dengan citra kamuflase. Cara untuk memproteksi citra stego dari orang yang tidak berhak adalah dengan cara menyisipkan suatu bit otentikasi yang berfungsi sebagai suatu digital signature dari citra stego. Citra rahasia dapat dirangkai kembali jika terdapat minimal k citra stego asli. Teknik ini dinamakan Secret Image Sharing.

  9. SSeCloud: Using secret sharing scheme to secure keys

    Science.gov (United States)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  10. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  11. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A.

    2016-08-01

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  12. Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States

    National Research Council Canada - National Science Library

    谢灯 叶明勇 李兴华

    2011-01-01

    Inspired by the protocol presented by Bagherinezhad and Karimipour [Phys. Rev. A 67 (2003) 044302], which will be shown to be insecure, we present a multipartite quantum secret sharing protocol using reusable Greenberger- Horne-Zeilinger...

  13. Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved

    Directory of Open Access Journals (Sweden)

    Juan Justie Su-Tzu

    2016-01-01

    Full Text Available Secret sharing schemes (SSS deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets. A multi-secret sharing scheme (MSSS is an extension of this where multiple secrets are shared simultaneously and where the performance is estimated using both the maximum improvement and average improvement ratios. In 2003, Crescenzo calculated a lower bound of maximum and average improvement ratios for a MSSS and proposed some special MSSS which achieve the lower bound of the maximum improvement ratio. Wang and Juan deployed a more flexible MSSS to achieve the optimal maxi-mum improvement ratio 2006. This paper provides evidence such that the optimal maximum improvement ratio and the optimal average improvement ratio may both be achieved through even simpler and more flexible MSSS through even simpler and more flexible multi-secret sharing schemes for any arbitrary n and m.

  14. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...... and conditions for strong multiplication using the cohomology and the intersection theory on toric surfaces....

  15. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized...... in the domain of multiparty computation. We present general methods to obtain the reconstruction and privacy thresholds as well as conditions for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing...... schemes where the number of players can be as large as $(q-1)^2-1$, we determine bounds for the reconstruction and privacy thresholds and conditions for strong multiplication using the cohomology and the intersection theory on toric surfaces....

  16. The role of shared visual information for joint action coordination

    DEFF Research Database (Denmark)

    Vesper, Cordula; Schmitz, Laura; Safra, Lou

    2016-01-01

    Previous research has identified a number of coordination processes that enable people to perform joint actions. But what determines which coordination processes joint action partners rely on in a given situation? The present study tested whether varying the shared visual information available...... they held their movement duration constant to facilitate coordination. When they received additional visual information about each other’s movements they switched to a fundamentally different coordination process, exaggerating the curvature of their movements to communicate their arrival time....... These findings indicate that the availability of shared perceptual information is a major factor in determining how individuals coordinate their actions to obtain joint outcomes....

  17. Are you The One to Share? Secret Transfer with Access Structure

    Directory of Open Access Journals (Sweden)

    Zhao Yongjun

    2017-01-01

    Full Text Available Sharing information to others is common nowadays, but the question is with whom to share. To address this problem, we propose the notion of secret transfer with access structure (STAS. STAS is a twoparty computation protocol that enables the server to transfer a secret to a client who satisfies the prescribed access structure. In this paper, we focus on threshold secret transfer (TST, which is STAS for threshold policy and can be made more expressive by using linear secret sharing. TST enables a number of applications including a simple construction of oblivious transfer (OT with threshold access control, and (a variant of threshold private set intersection (t-PSI, which are the first of their kinds in the literature to the best of our knowledge. The underlying primitive of STAS is a variant of OT, which we call OT for a sparse array. We provide two constructions which are inspired by state-of-the-art PSI techniques including oblivious polynomial evaluation (OPE and garbled Bloom filter (GBF. The OPEbased construction is secure in the malicious model, while the GBF-based one is more efficient. We implemented the latter one and showed its performance in applications such as privacy-preserving matchmaking.

  18. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    Science.gov (United States)

    Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.

    2016-07-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).

  19. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  20. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2017-10-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a (k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  1. Algebra for applications cryptography, secret sharing, error-correcting, fingerprinting, compression

    CERN Document Server

    Slinko, Arkadii

    2015-01-01

    This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

  2. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes

    Science.gov (United States)

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851

  3. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.

    Science.gov (United States)

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.

  4. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  5. Creating Shared Mental Models: The Support of Visual Language

    Science.gov (United States)

    Landman, Renske B.; van den Broek, Egon L.; Gieskes, José F. B.

    Cooperative design involves multiple stakeholders that often hold different ideas of the problem, the ways to solve it, and to its solutions (i.e., mental models; MM). These differences can result in miscommunication, misunderstanding, slower decision making processes, and less chance on cooperative decisions. In order to facilitate the creation of a shared mental model (sMM), visual languages (VL) are often used. However, little scientific foundation is behind this choice. To determine whether or not this gut feeling is justified, a research was conducted in which various stakeholders had to cooperatively redesign a process chain, with and without VL. To determine whether or not a sMM was created, scores on agreement in individual MM, communication, and cooperation were analyzed. The results confirmed the assumption that VL can indeed play an important role in the creation of sMM and, hence, can aid the processes of cooperative design and engineering.

  6. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  7. Experimentally feasible security check for n-qubit quantum secret sharing

    Science.gov (United States)

    Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.

    2010-12-01

    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Bužek, and Berthiaume (HBB) [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.59.1829 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.104.210501 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.

  8. DISTRIBUTED CERTIFICATE AUTHORITY IN CLUSTER-BASED MANET USING MULTI SECRET SHARING SCHEME

    Directory of Open Access Journals (Sweden)

    Mohammed Azza

    2015-11-01

    Full Text Available Providing secure communications in mobile ad hoc networks (MANET is an important and difficult problem, due to a lack of a key management infrastructure. The authentication is an important security service in (MANETs. To provide a node authentication service we use a fully distributed certificate authorities (FDCA based on the threshold cryptography. In this paper we propose an efficient and verifiable multi secret sharing scheme in cluster-based MANET with a low computation system. Our scheme is based on the overdetermined linear system equation in Galois fields GF(2r. We have analyzed our scheme based on security and performance criteria, and compared with existing approaches. The efficiency of our proposed schemes was verified and evaluated by simulation. Simulation results show that this approach is scalable.

  9. Shared secrets: Web 2.0 and research in Social Sciences

    Directory of Open Access Journals (Sweden)

    Sandra MARTORELL

    2013-12-01

    Full Text Available Web 2.0 represents a revolution in terms of the possibilities it offers for facilitating communication and collaboration between users – something that has become increasingly common in the world of research. A mere few years ago, the information produced by scientists and scholars remained in the hands of a very limited circle of institutions and publishers, as if it were a guarded secret. Today that secret is being shouted from the rooftops and shared with the rest of the scientific community in order to make it more accessible and to allow new advances. A clear example of this can be found in the social sciences, where there is a constant increase in the production of articles and materials that in turn serve for the pursuit of further research, thereby promoting the continuous development of scientific knowledge. This new situation is being fostered by the proliferation of tools and applications that make it possible, but also by a change in mentality towards a philosophy of exchange and open access. In this article, we will examine this phenomenon using a methodological system based on the analysis of platforms for the exchange of scientific knowledge, and especially social networks (both general and specialising in the social sciences, in order to demonstrate their potential in a society that is becoming increasingly aware of the need to overcome physical or institutional boundaries and move forward together.

  10. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  11. Recent advances in latent print visualization techniques at the U.S. Secret Service

    Science.gov (United States)

    Ramotowski, Robert S.; Cantu, Antonio A.; Leben, Deborah A.; Joullie, Madeleine M.; Saunders, George C.

    1997-02-01

    The U.S. Secret Service has been doing and supporting research in several areas of fingerprint visualization. The following is discussed: (1) developing ninhydrin analogues for visualizing latent prints on porous surfaces such as paper (with Dr. Madeleine Joullie, University of Pennsylvania); (2) exploring reflective UV imaging techniques as a no-treatment-required method for visualizing latent prints; (3) optimizing 'gun bluing' methods for developing latent prints on metal surfaces (such as spent cartridges); (4) investigating aqueous metal deposition methods for visualizing latent prints on multiple types of surfaces; and (5) studying methods of transferring latent print residues onto membranes.

  12. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  13. Accessibility of Shared Space for visually impaired persons : An inventory in the Netherlands

    NARCIS (Netherlands)

    Havik, Else M; Melis - Dankers, Bart JM; Steyvers, Frank JJM; Kooijman, Aart C

    Shared Space is a concept that comprises the design and planning process of a public space. There are concerns about the accessibility of Shared Spaces for people who are visually impaired. This study provides a systematic overview of the appearance of Shared Spaces in the Netherlands and the

  14. Improving Pre-Service Teachers’ Visual Literacy through Online Photo-Sharing Applications

    Directory of Open Access Journals (Sweden)

    Alaa Sadik

    2011-03-01

    Full Text Available This study aims to investigate how pre-service teachers' visual literacy skills are affected by their use of online photo management and sharing applications like Flickr. Two approaches are used to develop the visual literacy skills of pre-service teachers through Flickr. The first is to help them decode visuals through practicing analysis techniques, and interpreting and creating meaning from visual stimuli. The second is to help them encode visuals as a tool for communication. Visual literacy tests, participants' logs, photograph evaluation instruments, and interviews are used to assess the improvement in the participants' visual literacy skills. The results of the analysis revealed that the pre-service teachers' skills in interpreting, understanding, and appreciating the meaning of visual messages were enhanced through online exchange and interaction by means of photo management and sharing applications. They were able to communicate more effectively through applying the basic principles and concepts of visual design.

  15. Accessibility of shared space for visually impaired persons

    NARCIS (Netherlands)

    Havik, Else; Melis, Bart; Steyvers, Franciscus J.J.M.

    2011-01-01

    Shared Space is a new concept for the design of the public realm that is increasingly applied in Western countries. In Shared Space, the various functions of the public domain are combined, rather than separated. The behavior of road users is mainly determined by social relations and not exclusively

  16. Shared visual attention and memory systems in the Drosophila brain.

    Directory of Open Access Journals (Sweden)

    Bruno van Swinderen

    Full Text Available BACKGROUND: Selective attention and memory seem to be related in human experience. This appears to be the case as well in simple model organisms such as the fly Drosophila melanogaster. Mutations affecting olfactory and visual memory formation in Drosophila, such as in dunce and rutabaga, also affect short-term visual processes relevant to selective attention. In particular, increased optomotor responsiveness appears to be predictive of visual attention defects in these mutants. METHODOLOGY/PRINCIPAL FINDINGS: To further explore the possible overlap between memory and visual attention systems in the fly brain, we screened a panel of 36 olfactory long term memory (LTM mutants for visual attention-like defects using an optomotor maze paradigm. Three of these mutants yielded high dunce-like optomotor responsiveness. We characterized these three strains by examining their visual distraction in the maze, their visual learning capabilities, and their brain activity responses to visual novelty. We found that one of these mutants, D0067, was almost completely identical to dunce(1 for all measures, while another, D0264, was more like wild type. Exploiting the fact that the LTM mutants are also Gal4 enhancer traps, we explored the sufficiency for the cells subserved by these elements to rescue dunce attention defects and found overlap at the level of the mushroom bodies. Finally, we demonstrate that control of synaptic function in these Gal4 expressing cells specifically modulates a 20-30 Hz local field potential associated with attention-like effects in the fly brain. CONCLUSIONS/SIGNIFICANCE: Our study uncovers genetic and neuroanatomical systems in the fly brain affecting both visual attention and odor memory phenotypes. A common component to these systems appears to be the mushroom bodies, brain structures which have been traditionally associated with odor learning but which we propose might be also involved in generating oscillatory brain activity

  17. Showing/Sharing: Analysing Visual Communication from a Praxeological Perspective

    Directory of Open Access Journals (Sweden)

    Maria Schreiber

    2017-12-01

    Full Text Available This contribution proposes a methodological framework for empirical research into visual practices on social media. The framework identifies practices, pictures and platforms as relevant dimensions of analysis. It is mainly developed within, and is compatible with qualitative, interpretive approaches which focus on visual communication as part of everyday personal communicative practices. Two screenshots from Instagram and Facebook are introduced as empirical examples to investigate collaborative practices of meaning-making relating to pictures on social media. While social media seems to augment reflexive, processual practices of negotiating identities, visual media, in particular, amps up aesthetic, ambivalent and embodied dimensions within these practices.

  18. Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain

    Science.gov (United States)

    Li, Xianye; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Yin, Yongkai; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi

    2017-09-01

    A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.

  19. Shared Secrets: Motherhood and Male Homosexuality in Doppelgänger Narratives

    DEFF Research Database (Denmark)

    Sencindiver, Susan Yi

    2011-01-01

    narratives. Enlisting Joseph Conrad’s short story, “The Secret Sharer,” among others, as both a paradigmatic yet self-conscious example, I examine the intersecting hotbed of these two strange bedfellows, motherhood and homosexuality, as well as the significance of gender in the male doppelgänger imaginary....

  20. Does the type of anonymity matter? The impact of visualization on information sharing in online groups.

    Science.gov (United States)

    Wodzicki, Katrin; Schwämmlein, Eva; Cress, Ulrike; Kimmerle, Joachim

    2011-03-01

    Groups who share information in computer-mediated settings often have to deal with the issue of anonymity. Previous research has shown that only people with a prosocial orientation--that is, those whose main interest is to add to the benefit of the group as a whole--are willing to share information in anonymous situations. The willingness to share information by those people with a proself orientation--that is, those who put more emphasis on their personal benefit--can be increased by providing photographs of the other group members. The information-sharing behavior of prosocials, however, suffers from such a deletion of anonymity. In an online experiment, we examined how information-sharing behavior of proselfs may be increased without negatively influencing the information-sharing behavior of prosocials in an online setting. It was shown that even proselfs share information if the group members are visualized in a homogeneous way, while prosocials' information-sharing behavior is not impaired by this visualization. In addition, the results suggest that people's perceived homogeneity of the online group, as well as the importance of the collective goal, are the underlying processes of this effect. These results have important practical implications for the design of online information-sharing settings.

  1. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen

    2015-01-07

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  2. Halftone visual cryptography.

    Science.gov (United States)

    Zhou, Zhi; Arce, Gonzalo R; Di Crescenzo, Giovanni

    2006-08-01

    Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.

  3. The effect of a shared visual context during the presentation of ...

    African Journals Online (AJOL)

    This study aims to ascertain whether a shared visual context between examiners and children during narrative assessment influences the narratives produced by the children. Participants were 20 typically developing (TD) children and 10 children with language impairment (LI), aged 6 to 8 years. They were randomly ...

  4. Direct visualization of secretion from single bovine adrenal chromaffin cells by laser-induced native fluorescence imaging microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Tong, W.; Yeung, E.S. [Ames Laboratory---USDOE and Department of Chemistry, Iowa State University, Ames, Iowa 50011 (United States)

    1998-03-01

    Direct visualization of the secretion process of individual bovine adrenal chromaffin cells was achieved with laser-induced native fluorescence imaging microscopy. By monitoring the native fluorescence of catecholamines excited by the 275 nm laser line with an intensified charge-coupled-device (CCD) camera, we obtained good temporal and spatial resolution simultaneously without using additional fluorescent probes. Large variations were found among individual cells in terms of the amounts of catecholamines secreted and the rates of secretion. Different regions of a cell also behave differently during the secretion process. However, the degree of this local heterogeneity is smaller than in neurons and neuralgia. The influence of deep-ultraviolet (UV) laser excitation on cells is also discussed. This quantitative imaging technique provides a useful noninvasive approach for the study of dynamic cellular changes and the understanding of the molecular mechanisms of secretory processes. {copyright} {ital 1998} {ital Society for Applied Spectroscopy}

  5. Discovering and Sharing of Secret Architectures: the Hidden Tomb of the Pharaoh of El-Khasneh Jordan

    Science.gov (United States)

    Malinverni, E. S.; Pierdicca, R.

    2017-02-01

    The documentation of the archaeological heritage through 3D models to know ancient findings, has become a common practice within the international panorama. Using minimal hardware, as well as its ease of use in almost every environmental condition, make 3D sampling solutions based on Multiple View Stereo (MVS) matching and Structure from Motion techniques ideal for on-site documentation of excavations or emergencies. Moreover, the availability of inexpensive platforms for web-based visualization represents great benefit in the field of archaeology, where generally the low budged and the limitation of more complex instruments are a must. The case study presented in these pages, experienced in Petra, Jordan, moves towards this direction. In the close proximity of the El- Khasneh façade, is situated an excavation where two entrance, well preserved, give access to the Tomb of Pharaoh. The documentation described in these pages has the twofold objective of providing the research community with a priceless dataset, acquired for one of the most important heritage of the world that is partially still unknown and to share on line these computations. This work confirms how cultural heritage documentation and dissemination of architectural rests, that are important for tourism and their interactive visualization, can strongly benefit from the creation of 3D models and their sharing on the web. This particular archaeological setting is an interesting base for investigation, given the complexity of the structure and its precarious condition.

  6. Escher: A Web Application for Building, Sharing, and Embedding Data-Rich Visualizations of Biological Pathways.

    Directory of Open Access Journals (Sweden)

    Zachary A King

    2015-08-01

    Full Text Available Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users can draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, ChIP--in conjunction with metabolite- and reaction-oriented data types (e.g. metabolomics, fluxomics. Third, Escher harnesses the strengths of web technologies (SVG, D3, developer tools so that visualizations can be rapidly adapted, extended, shared, and embedded. This paper provides examples of each of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools.

  7. Escher: A Web Application for Building, Sharing, and Embedding Data-Rich Visualizations of Biological Pathways.

    Science.gov (United States)

    King, Zachary A; Dräger, Andreas; Ebrahim, Ali; Sonnenschein, Nikolaus; Lewis, Nathan E; Palsson, Bernhard O

    2015-08-01

    Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users can draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, ChIP)--in conjunction with metabolite- and reaction-oriented data types (e.g. metabolomics, fluxomics). Third, Escher harnesses the strengths of web technologies (SVG, D3, developer tools) so that visualizations can be rapidly adapted, extended, shared, and embedded. This paper provides examples of each of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools.

  8. An amodal shared resource model of language-mediated visual attention

    Directory of Open Access Journals (Sweden)

    Alastair Charles Smith

    2013-08-01

    Full Text Available Language-mediated visual attention describes the interaction of two fundamental components of the human cognitive system, language and vision. Within this paper we present an amodal shared resource model of language-mediated visual attention that offers a description of the information and processes involved in this complex multimodal behaviour and a potential explanation for how this ability is acquired. We demonstrate that the model is not only sufficient to account for the experimental effects of Visual World Paradigm studies but also that these effects are emergent properties of the architecture of the model itself, rather than requiring separate information processing channels or modular processing systems. The model provides an explicit description of the connection between the modality-specific input from language and vision and the distribution of eye gaze in language mediated visual attention. The paper concludes by discussing future applications for the model, specifically its potential for investigating the factors driving observed individual differences in language mediated eye gaze.

  9. Learning Program for Enhancing Visual Literacy for Non-Design Students Using a CMS to Share Outcomes

    Science.gov (United States)

    Ariga, Taeko; Watanabe, Takashi; Otani, Toshio; Masuzawa, Toshimitsu

    2016-01-01

    This study proposes a basic learning program for enhancing visual literacy using an original Web content management system (Web CMS) to share students' outcomes in class as a blog post. It seeks to reinforce students' understanding and awareness of the design of visual content. The learning program described in this research focuses on to address…

  10. Visual and Spatial Working Memory Are Not that Dissociated after All: A Time-Based Resource-Sharing Account

    Science.gov (United States)

    Vergauwe, Evie; Barrouillet, Pierre; Camos, Valerie

    2009-01-01

    Examinations of interference between visual and spatial materials in working memory have suggested domain- and process-based fractionations of visuo-spatial working memory. The present study examined the role of central time-based resource sharing in visuo-spatial working memory and assessed its role in obtained interference patterns. Visual and…

  11. Shared mushroom body circuits underlie visual and olfactory memories in Drosophila

    Science.gov (United States)

    Vogt, Katrin; Schnaitmann, Christopher; Dylla, Kristina V; Knapek, Stephan; Aso, Yoshinori; Rubin, Gerald M; Tanimoto, Hiromu

    2014-01-01

    In nature, animals form memories associating reward or punishment with stimuli from different sensory modalities, such as smells and colors. It is unclear, however, how distinct sensory memories are processed in the brain. We established appetitive and aversive visual learning assays for Drosophila that are comparable to the widely used olfactory learning assays. These assays share critical features, such as reinforcing stimuli (sugar reward and electric shock punishment), and allow direct comparison of the cellular requirements for visual and olfactory memories. We found that the same subsets of dopamine neurons drive formation of both sensory memories. Furthermore, distinct yet partially overlapping subsets of mushroom body intrinsic neurons are required for visual and olfactory memories. Thus, our results suggest that distinct sensory memories are processed in a common brain center. Such centralization of related brain functions is an economical design that avoids the repetition of similar circuit motifs. DOI: http://dx.doi.org/10.7554/eLife.02395.001 PMID:25139953

  12. A Visual Approach to Investigating Shared and Global Memory Behavior of CUDA Kernels

    KAUST Repository

    Rosen, Paul

    2013-06-01

    We present an approach to investigate the memory behavior of a parallel kernel executing on thousands of threads simultaneously within the CUDA architecture. Our top-down approach allows for quickly identifying any significant differences between the execution of the many blocks and warps. As interesting warps are identified, we allow further investigation of memory behavior by visualizing the shared memory bank conflicts and global memory coalescence, first with an overview of a single warp with many operations and, subsequently, with a detailed view of a single warp and a single operation. We demonstrate the strength of our approach in the context of a parallel matrix transpose kernel and a parallel 1D Haar Wavelet transform kernel. © 2013 The Author(s) Computer Graphics Forum © 2013 The Eurographics Association and Blackwell Publishing Ltd.

  13. A Metric to Quantify Shared Visual Attention in Two-Person Teams

    Science.gov (United States)

    Gontar, Patrick; Mulligan, Jeffrey B.

    2015-01-01

    Introduction: Critical tasks in high-risk environments are often performed by teams, the members of which must work together efficiently. In some situations, the team members may have to work together to solve a particular problem, while in others it may be better for them to divide the work into separate tasks that can be completed in parallel. We hypothesize that these two team strategies can be differentiated on the basis of shared visual attention, measured by gaze tracking. 2) Methods: Gaze recordings were obtained for two-person flight crews flying a high-fidelity simulator (Gontar, Hoermann, 2014). Gaze was categorized with respect to 12 areas of interest (AOIs). We used these data to construct time series of 12 dimensional vectors, with each vector component representing one of the AOIs. At each time step, each vector component was set to 0, except for the one corresponding to the currently fixated AOI, which was set to 1. This time series could then be averaged in time, with the averaging window time (t) as a variable parameter. For example, when we average with a t of one minute, each vector component represents the proportion of time that the corresponding AOI was fixated within the corresponding one minute interval. We then computed the Pearson product-moment correlation coefficient between the gaze proportion vectors for each of the two crew members, at each point in time, resulting in a signal representing the time-varying correlation between gaze behaviors. We determined criteria for concluding correlated gaze behavior using two methods: first, a permutation test was applied to the subjects' data. When one crew member's gaze proportion vector is correlated with a random time sample from the other crewmember's data, a distribution of correlation values is obtained that differs markedly from the distribution obtained from temporally aligned samples. In addition to validating that the gaze tracker was functioning reasonably well, this also allows us to

  14. Toward a Shared Vocabulary for Visual Analysis: An Analytic Toolkit for Deconstructing the Visual Design of Graphic Novels

    Science.gov (United States)

    Connors, Sean P.

    2012-01-01

    Literacy educators might advocate using graphic novels to develop students' visual literacy skills, but teachers who lack a vocabulary for engaging in close analysis of visual texts may be reluctant to teach them. Recognizing this, teacher educators should equip preservice teachers with a vocabulary for analyzing visual texts. This article…

  15. Retinoid Uptake, Processing, and Secretion in Human iPS-RPE Support the Visual Cycle

    Science.gov (United States)

    Muñiz, Alberto; Greene, Whitney A.; Plamper, Mark L.; Choi, Jae Hyek; Johnson, Anthony J.; Tsin, Andrew T.; Wang, Heuy-Ching

    2014-01-01

    Purpose. Retinal pigmented epithelium derived from human induced pluripotent stem (iPS) cells (iPS-RPE) may be a source of cells for transplantation. For this reason, it is essential to determine the functional competence of iPS-RPE. One key role of the RPE is uptake and processing of retinoids via the visual cycle. The purpose of this study is to investigate the expression of visual cycle proteins and the functional ability of the visual cycle in iPS-RPE. Methods. iPS-RPE was derived from human iPS cells. Immunocytochemistry, RT-PCR, and Western blot analysis were used to detect expression of RPE genes lecithin-retinol acyl transferase (LRAT), RPE65, cellular retinaldehyde-binding protein (CRALBP), and pigment epithelium–derived factor (PEDF). All-trans retinol was delivered to cultured cells or whole cell homogenate to assess the ability of the iPS-RPE to process retinoids. Results. Cultured iPS-RPE expresses visual cycle genes LRAT, CRALBP, and RPE65. After incubation with all-trans retinol, iPS-RPE synthesized up to 2942 ± 551 pmol/mg protein all-trans retinyl esters. Inhibition of LRAT with N-ethylmaleimide (NEM) prevented retinyl ester synthesis. Significantly, after incubation with all-trans retinol, iPS-RPE released 188 ± 88 pmol/mg protein 11-cis retinaldehyde into the culture media. Conclusions. iPS-RPE develops classic RPE characteristics and maintains expression of visual cycle proteins. The results of this study confirm that iPS-RPE possesses the machinery to process retinoids for support of visual pigment regeneration. Inhibition of all-trans retinyl ester accumulation by NEM confirms LRAT is active in iPS-RPE. Finally, the detection of 11-cis retinaldehyde in the culture medium demonstrates the cells' ability to process retinoids through the visual cycle. This study demonstrates expression of key visual cycle machinery and complete visual cycle activity in iPS-RPE. PMID:24255038

  16. Retinoid uptake, processing, and secretion in human iPS-RPE support the visual cycle.

    Science.gov (United States)

    Muñiz, Alberto; Greene, Whitney A; Plamper, Mark L; Choi, Jae Hyek; Johnson, Anthony J; Tsin, Andrew T; Wang, Heuy-Ching

    2014-01-09

    Retinal pigmented epithelium derived from human induced pluripotent stem (iPS) cells (iPS-RPE) may be a source of cells for transplantation. For this reason, it is essential to determine the functional competence of iPS-RPE. One key role of the RPE is uptake and processing of retinoids via the visual cycle. The purpose of this study is to investigate the expression of visual cycle proteins and the functional ability of the visual cycle in iPS-RPE. iPS-RPE was derived from human iPS cells. Immunocytochemistry, RT-PCR, and Western blot analysis were used to detect expression of RPE genes lecithin-retinol acyl transferase (LRAT), RPE65, cellular retinaldehyde-binding protein (CRALBP), and pigment epithelium-derived factor (PEDF). All-trans retinol was delivered to cultured cells or whole cell homogenate to assess the ability of the iPS-RPE to process retinoids. Cultured iPS-RPE expresses visual cycle genes LRAT, CRALBP, and RPE65. After incubation with all-trans retinol, iPS-RPE synthesized up to 2942 ± 551 pmol/mg protein all-trans retinyl esters. Inhibition of LRAT with N-ethylmaleimide (NEM) prevented retinyl ester synthesis. Significantly, after incubation with all-trans retinol, iPS-RPE released 188 ± 88 pmol/mg protein 11-cis retinaldehyde into the culture media. iPS-RPE develops classic RPE characteristics and maintains expression of visual cycle proteins. The results of this study confirm that iPS-RPE possesses the machinery to process retinoids for support of visual pigment regeneration. Inhibition of all-trans retinyl ester accumulation by NEM confirms LRAT is active in iPS-RPE. Finally, the detection of 11-cis retinaldehyde in the culture medium demonstrates the cells' ability to process retinoids through the visual cycle. This study demonstrates expression of key visual cycle machinery and complete visual cycle activity in iPS-RPE.

  17. Digital Rocks Portal: Preservation, Sharing, Remote Visualization and Automated Analysis of Imaged Datasets

    Science.gov (United States)

    Prodanovic, M.; Esteva, M.; Ketcham, R. A.; Hanlon, M.; Pettengill, M.; Ranganath, A.; Venkatesh, A.

    2016-12-01

    Due to advances in imaging modalities such as X-ray microtomography and scattered electron microscopy, 2D and 3D imaged datasets of rock microstructure on nanometer to centimeter length scale allow investigation of nonlinear flow and mechanical phenomena using numerical approaches. This in turn produces various upscaled parameters required by subsurface flow and deformation simulators. However, a single research group typically specializes in an imaging modality and/or related modeling on a single length scale, and lack of data-sharing infrastructure makes it difficult to integrate different length scales. We developed a sustainable, open and easy-to-use repository called the Digital Rocks Portal (http://www.digitalrocksportal.org), that (1) organizes images and related experimental measurements of different porous materials, (2) improves access to them for a wider community of geosciences or engineering researchers not necessarily trained in computer science or data analysis. Our objective is to enable scientific inquiry and engineering decisions founded on a data-driven basis. We show how the data loaded in the portal can be documented, referenced in publications via digital object identifiers, visualize and linked to other repositories. We then show preliminary results on integrating remote parallel visualization and flow simulation workflow with the pore structures currently stored in the repository. We finally discuss the issues of collecting correct metadata, data discoverability and repository sustainability. This is the first repository for this particular data, but is part of the wider ecosystem of geoscience data and model cyber-infrastructure called "Earthcube" (http://earthcube.org/) sponsored by National Science Foundation. For data sustainability and continuous access, the portal is implemented within the reliable, 24/7 maintained High Performance Computing Infrastructure supported by the Texas Advanced Computing Center (TACC) at the University of

  18. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly.

    Science.gov (United States)

    Gerc, Amy J; Diepold, Andreas; Trunk, Katharina; Porter, Michael; Rickman, Colin; Armitage, Judith P; Stanley-Wall, Nicola R; Coulthurst, Sarah J

    2015-09-29

    The Type VI secretion system (T6SS) is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  19. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    Directory of Open Access Journals (Sweden)

    Amy J. Gerc

    2015-09-01

    Full Text Available The Type VI secretion system (T6SS is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches.

  20. Color extended visual cryptography using error diffusion.

    Science.gov (United States)

    Kang, InKoo; Arce, Gonzalo R; Lee, Heung-Kyu

    2011-01-01

    Color visual cryptography (VC) encrypts a color secret message into n color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.

  1. Holographic data visualization: using synthetic full-parallax holography to share information

    Science.gov (United States)

    Dalenius, Tove N.; Rees, Simon; Richardson, Martin

    2017-03-01

    This investigation explores representing information through data visualization using the medium holography. It is an exploration from the perspective of a creative practitioner deploying a transdisciplinary approach. The task of visualizing and making use of data and "big data" has been the focus of a large number of research projects during the opening of this century. As the amount of data that can be gathered has increased in a short time our ability to comprehend and get meaning out of the numbers has been brought into attention. This project is looking at the possibility of employing threedimensional imaging using holography to visualize data and additional information. To explore the viability of the concept, this project has set out to transform the visualization of calculated energy and fluid flow data to a holographic medium. A Computational Fluid Dynamics (CFD) model of flow around a vehicle, and a model of Solar irradiation on a building were chosen to investigate the process. As no pre-existing software is available to directly transform the data into a compatible format the team worked collaboratively and transdisciplinary in order to achieve an accurate conversion from the format of the calculation and visualization tools to a configuration suitable for synthetic holography production. The project also investigates ideas for layout and design suitable for holographic visualization of energy data. Two completed holograms will be presented. Future possibilities for developing the concept of Holographic Data Visualization are briefly deliberated upon.

  2. The effect of a shared visual context during the presentation of ...

    African Journals Online (AJOL)

    and without language disorders. The next section will provide a brief overview of the existing literature about the impact of task and listener conditions on children's narratives. 2. Shared versus unshared information: existing evidence. For successful communication to take place, the speaker must take the knowledge state of ...

  3. Harnessing modern web application technology to create intuitive and efficient data visualization and sharing tools

    Directory of Open Access Journals (Sweden)

    Dylan eWood

    2014-08-01

    Full Text Available Neuroscientists increasingly need to work with big data in order to derive meaningful results in their field. Collecting, organizing and analyzing this data can be a major hurdle on the road to scientific discovery. This hurdle can be lowered using the same technologies that are currently revolutionizing the way that cultural and social media sites represent and share information with their users. Web application technologies and standards such as RESTful webservices, HTML5 and high-performance in-browser JavaScript engines are being utilized to vastly improve the way that the world accesses and shares information. The neuroscience community can also benefit tremendously from these technologies. We present here a web application that allows users to explore and request the complex datasets that need to be shared among the neuroimaging community. The COINS (Collaborative Informatics and Neuroimaging Suite Data Exchange uses web application technologies to facilitate data sharing in three phases: Exploration, Request/Communication, and Download. This paper will focus on the first phase, and how intuitive exploration of large and complex datasets is achieved using a framework that centers around asynchronous client-server communication (AJAX and also exposes a powerful API that can be utilized by other applications to explore available data. First opened to the neuroscience community in August 2012, the Data Exchange has already provided researchers with over 2500 GB of data.

  4. Escher: A Web Application for Building, Sharing, and Embedding Data-Rich Visualizations of Biological Pathways

    DEFF Research Database (Denmark)

    King, Zachary A.; Draeger, Andreas; Ebrahim, Ali

    2015-01-01

    draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, Ch...

  5. Perspectives on Visual Impairment: An Asian American Woman Shares Her Story.

    Science.gov (United States)

    Love, Carol

    1999-01-01

    Excerpts from an interview with an Asian-American woman about her views on aspects of her life illustrate key issues related to the cultural implications of having a visual impairment. Suggestions for professionals who work with Asian-American or Pacific-Islander clients are also presented. (Author/CR)

  6. Interactive Data Visualization for HIV Cohorts: Leveraging Data Exchange Standards to Share and Reuse Research Tools.

    Directory of Open Access Journals (Sweden)

    Meridith Blevins

    Full Text Available To develop and disseminate tools for interactive visualization of HIV cohort data.If a picture is worth a thousand words, then an interactive video, composed of a long string of pictures, can produce an even richer presentation of HIV population dynamics. We developed an HIV cohort data visualization tool using open-source software (R statistical language. The tool requires that the data structure conform to the HIV Cohort Data Exchange Protocol (HICDEP, and our implementation utilized Caribbean, Central and South America network (CCASAnet data.This tool currently presents patient-level data in three classes of plots: (1 Longitudinal plots showing changes in measurements viewed alongside event probability curves allowing for simultaneous inspection of outcomes by relevant patient classes. (2 Bubble plots showing changes in indicators over time allowing for observation of group level dynamics. (3 Heat maps of levels of indicators changing over time allowing for observation of spatial-temporal dynamics. Examples of each class of plot are given using CCASAnet data investigating trends in CD4 count and AIDS at antiretroviral therapy (ART initiation, CD4 trajectories after ART initiation, and mortality.We invite researchers interested in this data visualization effort to use these tools and to suggest new classes of data visualization. We aim to contribute additional shareable tools in the spirit of open scientific collaboration and hope that these tools further the participation in open data standards like HICDEP by the HIV research community.

  7. Braille and Tactile Graphics: Youths with Visual Impairments Share Their Experiences

    Science.gov (United States)

    Rosenblum, L. Penny; Herzberg, Tina S.

    2015-01-01

    Introduction: Data were collected from youths with visual impairment about their experiences with tactile graphics and braille materials used in mathematics and science classes. Methods: Youths answered questions and explored four tactile graphics made using different production methods. They located specific information on each graphic and shared…

  8. Sharing "Sex Secrets" on Facebook: A Content Analysis of Youth Peer Communication and Advice Exchange on Social Media about Sexual Health and Intimate Relations.

    Science.gov (United States)

    Yeo, Tien Ee Dominic; Chu, Tsz Hang

    2017-09-01

    Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.

  9. Mineotaur: a tool for high-content microscopy screen sharing and visual analytics.

    Science.gov (United States)

    Antal, Bálint; Chessel, Anatole; Carazo Salas, Rafael E

    2015-12-17

    High-throughput/high-content microscopy-based screens are powerful tools for functional genomics, yielding intracellular information down to the level of single-cells for thousands of genotypic conditions. However, accessing their data requires specialized knowledge and most often that data is no longer analyzed after initial publication. We describe Mineotaur ( http://www.mineotaur.org ), a open-source, downloadable web application that allows easy online sharing and interactive visualisation of large screen datasets, facilitating their dissemination and further analysis, and enhancing their impact.

  10. Learning representation hierarchies by sharing visual features: a computational investigation of Persian character recognition with unsupervised deep learning.

    Science.gov (United States)

    Sadeghi, Zahra; Testolin, Alberto

    2017-08-01

    In humans, efficient recognition of written symbols is thought to rely on a hierarchical processing system, where simple features are progressively combined into more abstract, high-level representations. Here, we present a computational model of Persian character recognition based on deep belief networks, where increasingly more complex visual features emerge in a completely unsupervised manner by fitting a hierarchical generative model to the sensory data. Crucially, high-level internal representations emerging from unsupervised deep learning can be easily read out by a linear classifier, achieving state-of-the-art recognition accuracy. Furthermore, we tested the hypothesis that handwritten digits and letters share many common visual features: A generative model that captures the statistical structure of the letters distribution should therefore also support the recognition of written digits. To this aim, deep networks trained on Persian letters were used to build high-level representations of Persian digits, which were indeed read out with high accuracy. Our simulations show that complex visual features, such as those mediating the identification of Persian symbols, can emerge from unsupervised learning in multilayered neural networks and can support knowledge transfer across related domains.

  11. A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems

    Directory of Open Access Journals (Sweden)

    Takis Zourntos

    2007-01-01

    Full Text Available Visual sensor networks (VSNs provide surveillance images/video which must be protected from eavesdropping and tampering en route to the base station. In the spirit of sensor networks, we propose a novel paradigm for securing privacy and confidentiality in a distributed manner. Our paradigm is based on the control of dynamical systems, which we show is well suited for VSNs due to its low complexity in terms of processing and communication, while achieving robustness to both unintentional noise and intentional attacks as long as a small subset of nodes are affected. We also present a low complexity algorithm called TANGRAM to demonstrate the feasibility of applying our novel paradigm to VSNs. We present and discuss simulation results of TANGRAM.

  12. Shared processing in multiple object tracking and visual working memory in the absence of response order and task order confounds.

    Science.gov (United States)

    Lapierre, Mark D; Cropper, Simon J; Howe, Piers D L

    2017-01-01

    To understand how the visual system represents multiple moving objects and how those representations contribute to tracking, it is essential that we understand how the processes of attention and working memory interact. In the work described here we present an investigation of that interaction via a series of tracking and working memory dual-task experiments. Previously, it has been argued that tracking is resistant to disruption by a concurrent working memory task and that any apparent disruption is in fact due to observers making a response to the working memory task, rather than due to competition for shared resources. Contrary to this, in our experiments we find that when task order and response order confounds are avoided, all participants show a similar decrease in both tracking and working memory performance. However, if task and response order confounds are not adequately controlled for we find substantial individual differences, which could explain the previous conflicting reports on this topic. Our results provide clear evidence that tracking and working memory tasks share processing resources.

  13. Intergroup visual perspective-taking: Shared group membership impairs self-perspective inhibition but may facilitate perspective calculation.

    Science.gov (United States)

    Simpson, Austin J; Todd, Andrew R

    2017-09-01

    Reasoning about what other people see, know, and want is essential for navigating social life. Yet, even neurodevelopmentally healthy adults make perspective-taking errors. Here, we examined how the group membership of perspective-taking targets (ingroup vs. outgroup) affects processes underlying visual perspective-taking. In three experiments using two bases of group identity (university affiliation and minimal groups), interference from one's own differing perspective (i.e., egocentric intrusion) was stronger when responding from an ingroup versus an outgroup member's perspective. Spontaneous perspective calculation, as indexed by interference from another's visual perspective when reporting one's own (i.e., altercentric intrusion), did not differ across target group membership in any of our experiments. Process-dissociation analyses, which aim to isolate automatic processes underlying altercentric-intrusion effects, further revealed negligible effects of target group membership on perspective calculation. Meta-analytically, however, there was suggestive evidence that shared group membership facilitates responding from others' perspectives when self and other perspectives are aligned. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Inspection of Pole-Like Structures Using a Visual-Inertial Aided VTOL Platform with Shared Autonomy

    Directory of Open Access Journals (Sweden)

    Inkyu Sa

    2015-09-01

    Full Text Available This paper presents an algorithm and a system for vertical infrastructure inspection using a vertical take-off and landing (VTOL unmanned aerial vehicle and shared autonomy. Inspecting vertical structures such as light and power distribution poles is a difficult task that is time-consuming, dangerous and expensive. Recently, micro VTOL platforms (i.e., quad-, hexa- and octa-rotors have been rapidly gaining interest in research, military and even public domains. The unmanned, low-cost and VTOL properties of these platforms make them ideal for situations where inspection would otherwise be time-consuming and/or hazardous to humans. There are, however, challenges involved with developing such an inspection system, for example flying in close proximity to a target while maintaining a fixed stand-off distance from it, being immune to wind gusts and exchanging useful information with the remote user. To overcome these challenges, we require accurate and high-update rate state estimation and high performance controllers to be implemented onboard the vehicle. Ease of control and a live video feed are required for the human operator. We demonstrate a VTOL platform that can operate at close-quarters, whilst maintaining a safe stand-off distance and rejecting environmental disturbances. Two approaches are presented: Position-Based Visual Servoing (PBVS using an Extended Kalman Filter (EKF and estimator-free Image-Based Visual Servoing (IBVS. Both use monocular visual, inertia, and sonar data, allowing the approaches to be applied for indoor or GPS-impaired environments. We extensively compare the performances of PBVS and IBVS in terms of accuracy, robustness and computational costs. Results from simulations Sensors 2015, 15 22004 and indoor/outdoor (day and night flight experiments demonstrate the system is able to successfully inspect and circumnavigate a vertical pole.

  15. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    Science.gov (United States)

    2011-01-01

    Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without

  16. LabKey Server NAb: a tool for analyzing, visualizing and sharing results from neutralizing antibody assays.

    Science.gov (United States)

    Piehler, Britt; Nelson, Elizabeth K; Eckels, Josh; Ramsay, Sarah; Lum, Karl; Wood, Blake; Greene, Kelli M; Gao, Hongmei; Seaman, Michael S; Montefiori, David C; Igra, Mark

    2011-05-27

    Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without installing the software by using the

  17. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    Directory of Open Access Journals (Sweden)

    Gao Hongmei

    2011-05-01

    Full Text Available Abstract Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the Lab

  18. B-CAN: a resource sharing platform to improve the operation, visualization and integrated analysis of TCGA breast cancer data.

    Science.gov (United States)

    Wen, Can-Hong; Ou, Shao-Min; Guo, Xiao-Bo; Liu, Chen-Feng; Shen, Yan-Bo; You, Na; Cai, Wei-Hong; Shen, Wen-Jun; Wang, Xue-Qin; Tan, Hai-Zhu

    2017-12-12

    Breast cancer is a high-risk heterogeneous disease with myriad subtypes and complicated biological features. The Cancer Genome Atlas (TCGA) breast cancer database provides researchers with the large-scale genome and clinical data via web portals and FTP services. Researchers are able to gain new insights into their related fields, and evaluate experimental discoveries with TCGA. However, it is difficult for researchers who have little experience with database and bioinformatics to access and operate on because of TCGA's complex data format and diverse files. For ease of use, we build the breast cancer (B-CAN) platform, which enables data customization, data visualization, and private data center. The B-CAN platform runs on Apache server and interacts with the backstage of MySQL database by PHP. Users can customize data based on their needs by combining tables from original TCGA database and selecting variables from each table. The private data center is applicable for private data and two types of customized data. A key feature of the B-CAN is that it provides single table display and multiple table display. Customized data with one barcode corresponding to many records and processed customized data are allowed in Multiple Tables Display. The B-CAN is an intuitive and high-efficient data-sharing platform.

  19. A New Repeating Color Watermarking Scheme Based on Human Visual Model

    Directory of Open Access Journals (Sweden)

    Chang Chin-Chen

    2004-01-01

    Full Text Available This paper proposes a human-visual-model-based scheme that effectively protects the intellectual copyright of digital images. In the proposed method, the theory of the visual secret sharing scheme is used to create a master watermark share and a secret watermark share. The watermark share is kept secret by the owner. The master watermark share is embedded into the host image to generate a watermarked image based on the human visual model. The proposed method conforms to all necessary conditions of an image watermarking technique. After the watermarked image is put under various attacks such as lossy compression, rotating, sharpening, blurring, and cropping, the experimental results show that the extracted digital watermark from the attacked watermarked images can still be robustly detected using the proposed method.

  20. Membrane fusion proteins of type I secretion system and tripartite efflux pumps share a binding motif for TolC in gram-negative bacteria.

    Directory of Open Access Journals (Sweden)

    Minho Lee

    Full Text Available The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA. In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed.

  1. The housekeeping gene xanthine oxidoreductase is necessary for milk fat droplet enveloping and secretion: gene sharing in the lactating mammary gland

    Science.gov (United States)

    Vorbach, Claudia; Scriven, Alistair; Capecchi, Mario R.

    2002-01-01

    Xanthine oxidoreductase (XOR) is the rate-limiting enzyme in purine catabolism occurring in most cell types. However, this housekeeping gene is expressed at very high levels in a number of mammalian tissues including the lactating mammary epithelium, suggesting additional roles for XOR in these tissues. Mice with targeted disruption of XOR were generated to assess these potential additional roles. XOR−/− mice are runted and do not live beyond 6 wk of age. Strikingly, however, XOR+/− females, although of healthy appearance and normal fertility, are unable to maintain lactation and their pups die of starvation 2 wk postpartum. Histological and whole-mount analyses showed that in XOR+/− females the mammary epithelium collapses, resulting in premature involution of the mammary gland. Electron microscopy showed that XOR is specifically required for enveloping milk fat droplets with the apical plasma membrane prior to secretion from the lactating mammary gland. We present evidence that XOR may have primarily a structural role, as a membrane-associated protein, in milk fat droplet secretion and thus XOR provides another example of “gene sharing”. About 5% of women experience primary lactation insufficiency. The above observations suggest that human females suffering from xanthinuria, a deficiency in XOR, are potential candidates for lactation problems. PMID:12502743

  2. An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

    Directory of Open Access Journals (Sweden)

    Linju P.S

    2015-08-01

    Full Text Available Visual cryptography is a technique of cryptography in which secret images are divided into multiple shares and are distributed to different entities. Each secret can be reconstructed by superimposing these shares using different operations. Common traditional drawbacks of all existing methods are pixel expansion and noise at output. Another major issues that can occur in existing visual cryptography systems are Cheating between share holders and Share holders cheating owner. In order to overcome these limitations sealing algorithm is used with two applications of VC such as MIVC and EVC. Here two secret images can be send at the same time by converting them to halftone representations which in turn are partitioned as three shares in total.

  3. Cheating prevention in visual cryptography.

    Science.gov (United States)

    Hu, Chih-Ming; Tzeng, Wen-Guey

    2007-01-01

    Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.

  4. ProXL (Protein Cross-Linking Database): A Platform for Analysis, Visualization, and Sharing of Protein Cross-Linking Mass Spectrometry Data.

    Science.gov (United States)

    Riffle, Michael; Jaschob, Daniel; Zelter, Alex; Davis, Trisha N

    2016-08-05

    ProXL is a Web application and accompanying database designed for sharing, visualizing, and analyzing bottom-up protein cross-linking mass spectrometry data with an emphasis on structural analysis and quality control. ProXL is designed to be independent of any particular software pipeline. The import process is simplified by the use of the ProXL XML data format, which shields developers of data importers from the relative complexity of the relational database schema. The database and Web interfaces function equally well for any software pipeline and allow data from disparate pipelines to be merged and contrasted. ProXL includes robust public and private data sharing capabilities, including a project-based interface designed to ensure security and facilitate collaboration among multiple researchers. ProXL provides multiple interactive and highly dynamic data visualizations that facilitate structural-based analysis of the observed cross-links as well as quality control. ProXL is open-source, well-documented, and freely available at https://github.com/yeastrc/proxl-web-app .

  5. Secrets Law

    Directory of Open Access Journals (Sweden)

    Luz Helena Guamanzara Torres

    2013-01-01

    Full Text Available This paper provides a review of the book The Law of Secrets, of the author Juan Carlos Martínez-Villalba Riofrío studying the secrets and how law does protect. To this end, the author has analyzed the general theory of secrecy, secrets and methodology, its overall rating, essential elements and their different legal dimensions, the secret as a subjective right. It also establishes that professional secrecy is protected by constitutional principles such as the right to privacy.

  6. Digital Video Teach Yourself VISUALLY

    CERN Document Server

    Watson, Lonzell

    2010-01-01

    Tips and techniques for shooting and sharing superb digital videos. Never before has video been more popular-or more accessible to the home photographer. Now you can create YouTube-worthy, professional-looking video, with the help of this richly illustrated guide. In a straightforward, simple, highly visual format, Teach Yourself VISUALLY Digital Video demystifies the secrets of great video. With colorful screenshots and illustrations plus step-by-step instructions, the book explains the features of your camera and their capabilities, and shows you how to go beyond "auto" to manually

  7. Identifying shared genetic structure patterns among Pacific Northwest forest taxa: insights from use of visualization tools and computer simulations.

    Directory of Open Access Journals (Sweden)

    Mark P Miller

    Full Text Available BACKGROUND: Identifying causal relationships in phylogeographic and landscape genetic investigations is notoriously difficult, but can be facilitated by use of multispecies comparisons. METHODOLOGY/PRINCIPAL FINDINGS: We used data visualizations to identify common spatial patterns within single lineages of four taxa inhabiting Pacific Northwest forests (northern spotted owl: Strix occidentalis caurina; red tree vole: Arborimus longicaudus; southern torrent salamander: Rhyacotriton variegatus; and western white pine: Pinus monticola. Visualizations suggested that, despite occupying the same geographical region and habitats, species responded differently to prevailing historical processes. S. o. caurina and P. monticola demonstrated directional patterns of spatial genetic structure where genetic distances and diversity were greater in southern versus northern locales. A. longicaudus and R. variegatus displayed opposite patterns where genetic distances were greater in northern versus southern regions. Statistical analyses of directional patterns subsequently confirmed observations from visualizations. Based upon regional climatological history, we hypothesized that observed latitudinal patterns may have been produced by range expansions. Subsequent computer simulations confirmed that directional patterns can be produced by expansion events. CONCLUSIONS/SIGNIFICANCE: We discuss phylogeographic hypotheses regarding historical processes that may have produced observed patterns. Inferential methods used here may become increasingly powerful as detailed simulations of organisms and historical scenarios become plausible. We further suggest that inter-specific comparisons of historical patterns take place prior to drawing conclusions regarding effects of current anthropogenic change within landscapes.

  8. Neurophysiological analytics for all! Free open-source software tools for documenting, analyzing, visualizing, and sharing using electronic notebooks.

    Science.gov (United States)

    Rosenberg, David M; Horn, Charles C

    2016-08-01

    Neurophysiology requires an extensive workflow of information analysis routines, which often includes incompatible proprietary software, introducing limitations based on financial costs, transfer of data between platforms, and the ability to share. An ecosystem of free open-source software exists to fill these gaps, including thousands of analysis and plotting packages written in Python and R, which can be implemented in a sharable and reproducible format, such as the Jupyter electronic notebook. This tool chain can largely replace current routines by importing data, producing analyses, and generating publication-quality graphics. An electronic notebook like Jupyter allows these analyses, along with documentation of procedures, to display locally or remotely in an internet browser, which can be saved as an HTML, PDF, or other file format for sharing with team members and the scientific community. The present report illustrates these methods using data from electrophysiological recordings of the musk shrew vagus-a model system to investigate gut-brain communication, for example, in cancer chemotherapy-induced emesis. We show methods for spike sorting (including statistical validation), spike train analysis, and analysis of compound action potentials in notebooks. Raw data and code are available from notebooks in data supplements or from an executable online version, which replicates all analyses without installing software-an implementation of reproducible research. This demonstrates the promise of combining disparate analyses into one platform, along with the ease of sharing this work. In an age of diverse, high-throughput computational workflows, this methodology can increase efficiency, transparency, and the collaborative potential of neurophysiological research. Copyright © 2016 the American Physiological Society.

  9. Comment on "Cheating prevention in visual cryptography".

    Science.gov (United States)

    Chen, Yu-Chi; Horng, Gwoboa; Tsai, Du-Shiau

    2012-07-01

    Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.

  10. The Experiment Data Depot: A Web-Based Software Tool for Biological Experimental Data Storage, Sharing, and Visualization.

    Science.gov (United States)

    Morrell, William C; Birkel, Garrett W; Forrer, Mark; Lopez, Teresa; Backman, Tyler W H; Dussault, Michael; Petzold, Christopher J; Baidoo, Edward E K; Costello, Zak; Ando, David; Alonso-Gutierrez, Jorge; George, Kevin W; Mukhopadhyay, Aindrila; Vaino, Ian; Keasling, Jay D; Adams, Paul D; Hillson, Nathan J; Garcia Martin, Hector

    2017-12-15

    Although recent advances in synthetic biology allow us to produce biological designs more efficiently than ever, our ability to predict the end result of these designs is still nascent. Predictive models require large amounts of high-quality data to be parametrized and tested, which are not generally available. Here, we present the Experiment Data Depot (EDD), an online tool designed as a repository of experimental data and metadata. EDD provides a convenient way to upload a variety of data types, visualize these data, and export them in a standardized fashion for use with predictive algorithms. In this paper, we describe EDD and showcase its utility for three different use cases: storage of characterized synthetic biology parts, leveraging proteomics data to improve biofuel yield, and the use of extracellular metabolite concentrations to predict intracellular metabolic fluxes.

  11. Visual Intimacy on Social Media: From Selfies to the Co-Construction of Intimacies Through Shared Pictures

    Directory of Open Access Journals (Sweden)

    Cristina Miguel

    2016-04-01

    Full Text Available This article is based on a study that analyzes the use of pictures to build and convey intimacy through social media interactions across two platforms of different genres: Badoo (dating/hook-up platform and Facebook. The study explores what kinds of pictures participants (aged 25–49 years consider to be intimate and whether they disclose those kinds of images through these platforms. My discussion moves from the photographs (often portraits and selfies that participants choose to disclose in order to (represent themselves on the network to the topic of negotiating the publication of pictures with other users. Participants mainly identified as intimate sexy pictures and images showing sexual orientation or relationships status. In the context of Badoo, double sexual standards were found to be a key issue in the disclosure of sexy pictures. For Facebook, associated intimacy and censoring of images, with revelation of sexual orientation, publication of relationship status, and sharing of emotions with wider or unintended audiences, were the main topics discussed. Using in-depth interviews and user profile analysis, the aim of this article is to understand the roles of images within public intimacy practices in different types of relationships across two distinct social media platforms.

  12. CellPublisher: a web platform for the intuitive visualization and sharing of metabolic, signalling and regulatory pathways.

    Science.gov (United States)

    Flórez, Lope A; Lammers, Christoph R; Michna, Raphael; Stülke, Jörg

    2010-12-01

    Systems biology relies increasingly on collaborations between several groups with different expertise. Therefore, the systems biology community is adopting standards that allow effective communication of concepts, as well as transmission and processing of pathway information. The Systems Biology Graphical Notation (SBGN) is a graphical language for biological pathways that has both a biological as well as a computational meaning. The program CellDesigner allows the codification of biological phenomena in an SBGN compliant form. CellPublisher is a web server that allows the conversion of CellDesigner files to web-based navigatable diagrams based on the user interface of Google maps. Thus, CellPublisher complements CellDesigner by facilitating the understanding of complex diagrams and by providing the possibility to share any CellDesigner diagram online with collaborators and get their feedback. Due to the intuitive interface of the online diagrams, CellPublisher serves as a basis for discovery of novel properties of the modelled networks. The freely available web server and the documentation can be accessed at: http://cellpublisher.gobics.de/. The source code and the offline version for Microsoft Windows are freely available at http://sourceforge.net/projects/cellpublisher/. jstuelk@gwdg.de Supplementary data are available at Bioinformatics online.

  13. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  14. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  15. Google Secrets

    CERN Document Server

    Davis, Yvette

    2011-01-01

    Become a Google guru with these effective tips, tricks, and techniques Sure, you use Google. But do you really use Google-and everything it has to offer-in the most effective way possible? Wish you could just sit down with a Google expert who would show you how to take your Google savviness to the next level? With Google Secrets, you can! Tech expert Jerri Ledford reveals the ins, outs, and little-known facts about Google to show you how to sharpen your skills so you can get more done, more efficiently. You may already be familiar with Google's most popular applications, but this indispensable

  16. Biomechanics and visual-motor control: how it has, is, and will be used to reveal the secrets of hitting a cricket ball.

    Science.gov (United States)

    Sarpeshkar, Vishnu; Mann, David L

    2011-11-01

    Cricket batting is an incredibly complex task which requires the coordination of full-body movements to successfully hit a fast moving ball. Biomechanical studies on batting have helped to shed light on how this intricate skill may be performed, yet the many different techniques exhibited by batters make the systematic examination of batting difficult. This review seeks to critically evaluate the existing literature examining cricket batting, but doing so by exploring the strong but often neglected relationship between biomechanics and visual-motor control. In three separate sections, the paper seeks to address (i) the different theories of motor control which may help to explain how skilled batters can hit a ball, (ii) strategies used by batters to overcome the (at times excessive) temporal constraints, and (iii) an interpretation from a visual-motor perspective of the prevailing biomechanical data on batting.

  17. compMS2Miner: An Automatable Metabolite Identification, Visualization, and Data-Sharing R Package for High-Resolution LC-MS Data Sets.

    Science.gov (United States)

    Edmands, William M B; Petrick, Lauren; Barupal, Dinesh K; Scalbert, Augustin; Wilson, Mark J; Wickliffe, Jeffrey K; Rappaport, Stephen M

    2017-04-04

    A long-standing challenge of untargeted metabolomic profiling by ultrahigh-performance liquid chromatography-high-resolution mass spectrometry (UHPLC-HRMS) is efficient transition from unknown mass spectral features to confident metabolite annotations. The compMS 2 Miner (Comprehensive MS 2 Miner) package was developed in the R language to facilitate rapid, comprehensive feature annotation using a peak-picker-output and MS 2 data files as inputs. The number of MS 2 spectra that can be collected during a metabolomic profiling experiment far outweigh the amount of time required for pain-staking manual interpretation; therefore, a degree of software workflow autonomy is required for broad-scale metabolite annotation. CompMS 2 Miner integrates many useful tools in a single workflow for metabolite annotation and also provides a means to overview the MS 2 data with a Web application GUI compMS 2 Explorer (Comprehensive MS 2 Explorer) that also facilitates data-sharing and transparency. The automatable compMS 2 Miner workflow consists of the following steps: (i) matching unknown MS 1 features to precursor MS 2 scans, (ii) filtration of spectral noise (dynamic noise filter), (iii) generation of composite mass spectra by multiple similar spectrum signal summation and redundant/contaminant spectra removal, (iv) interpretation of possible fragment ion substructure using an internal database, (v) annotation of unknowns with chemical and spectral databases with prediction of mammalian biotransformation metabolites, wrapper functions for in silico fragmentation software, nearest neighbor chemical similarity scoring, random forest based retention time prediction, text-mining based false positive removal/true positive ranking, chemical taxonomic prediction and differential evolution based global annotation score optimization, and (vi) network graph visualizations, data curation, and sharing are made possible via the compMS 2 Explorer application. Metabolite identities and comments

  18. Sharing Economy

    DEFF Research Database (Denmark)

    Marton, Attila; Constantiou, Ioanna; Thoma, Antonela

    De spite the hype the notion of the sharing economy is surrounded by, our understanding of sharing is surprisingly undertheorized. In this paper, we make a first step towards rem edying this state of affairs by analy sing sharing as a s ocial practice. Based on a multi ple - case study, we analyse...

  19. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Solutions of sharing that seeks to improve our cities and local communities in both urban and rural environments. 24 sharing economy organisations and businesses addressing urban and rural issues are being portrayed and seven Danish municipalities that have explored the potentials of sharing economy....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  20. Accurate prediction of secreted substrates and identification of a conserved putative secretion signal for type III secretion systems.

    Directory of Open Access Journals (Sweden)

    Ram Samudrala

    2009-04-01

    Full Text Available The type III secretion system is an essential component for virulence in many Gram-negative bacteria. Though components of the secretion system apparatus are conserved, its substrates--effector proteins--are not. We have used a novel computational approach to confidently identify new secreted effectors by integrating protein sequence-based features, including evolutionary measures such as the pattern of homologs in a range of other organisms, G+C content, amino acid composition, and the N-terminal 30 residues of the protein sequence. The method was trained on known effectors from the plant pathogen Pseudomonas syringae and validated on a set of effectors from the animal pathogen Salmonella enterica serovar Typhimurium (S. Typhimurium after eliminating effectors with detectable sequence similarity. We show that this approach can predict known secreted effectors with high specificity and sensitivity. Furthermore, by considering a large set of effectors from multiple organisms, we computationally identify a common putative secretion signal in the N-terminal 20 residues of secreted effectors. This signal can be used to discriminate 46 out of 68 total known effectors from both organisms, suggesting that it is a real, shared signal applicable to many type III secreted effectors. We use the method to make novel predictions of secreted effectors in S. Typhimurium, some of which have been experimentally validated. We also apply the method to predict secreted effectors in the genetically intractable human pathogen Chlamydia trachomatis, identifying the majority of known secreted proteins in addition to providing a number of novel predictions. This approach provides a new way to identify secreted effectors in a broad range of pathogenic bacteria for further experimental characterization and provides insight into the nature of the type III secretion signal.

  1. Privacy-preserving photo sharing based on a public key infrastructure

    Science.gov (United States)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  2. Visual acuity test

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003396.htm Visual acuity test To use the sharing features on this page, please enable JavaScript. The visual acuity test is used to determine the smallest ...

  3. Sharing code.

    Science.gov (United States)

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  4. Long-term outcomes of surgery and radiotherapy for secreting and non-secreting pituitary adenoma

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Mi Young; Kim, Jin Hee; Oh, Young Kee; Kim, El [Dongsan Medical Center, Keimyung University School of Medicine, Daegu (Korea, Republic of)

    2016-06-15

    To investigate treatment outcome and long term complication after surgery and radiotherapy (RT) for pituitary adenoma. From 1990 to 2009, 73 patients with surgery and RT for pituitary adenoma were analyzed in this study. Median age was 51 years (range, 25 to 71 years). Median tumor size was 3 cm (range, 1 to 5 cm) with suprasellar (n = 21), cavernous sinus extension (n = 14) or both (n = 5). Hormone secreting tumor was diagnosed in 29 patients; 16 patients with prolactin, 12 patients with growth hormone, and 1 patient with adrenocorticotrophic hormone. Impairment of visual acuity or visual field was presented in 33 patients at first diagnosis. Most patients (n = 64) received RT as postoperative adjuvant setting. Median RT dose was 45 Gy (range, 45 to 59.4 Gy). Median follow-up duration was 8 years (range, 3 to 22 years). In secreting tumors, hormone normalization rate was 55% (16 of 29 patients). For 25 patients with evaluable visual field and visual acuity test, 21 patients (84%) showed improvement of visual disturbance after treatment. The 10-year tumor control rate for non-secreting and secreting adenoma was 100% and 58%, respectively (p < 0.001). Progression free survival rate at 10 years was 98%. Only 1 patient experienced endocrinological recurrence. Following surgery, 60% (n = 44) suffered from pituitary function deficit. Late complication associated with RT was only 1 patient, who developed cataract. Surgery and RT are very effective and safe in hormonal and tumor growth control for secreting and non-secreting pituitary adenoma.

  5. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  6. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  7. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  8. Image size invariant visual cryptography for general access structures subject to display quality constraints.

    Science.gov (United States)

    Lee, Kai-Hui; Chiu, Pei-Ling

    2013-10-01

    Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.

  9. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  10. Model Sharing and Collaboration using HydroShare

    Science.gov (United States)

    Goodall, J. L.; Morsy, M. M.; Castronova, A. M.; Miles, B.; Merwade, V.; Tarboton, D. G.

    2015-12-01

    HydroShare is a web-based system funded by the National Science Foundation (NSF) for sharing hydrologic data and models as resources. Resources in HydroShare can either be assigned a generic type, meaning the resource only has Dublin Core metadata properties, or one of a growing number of specific resource types with enhanced metadata profiles defined by the HydroShare development team. Examples of specific resource types in the current release of HydroShare (http://www.hydroshare.org) include time series, geographic raster, Multidimensional (NetCDF), model program, and model instance. Here we describe research and development efforts in HydroShare project for model-related resources types. This work has included efforts to define metadata profiles for common modeling resources, execute models directly through the HydroShare user interface using Docker containers, and interoperate with the 3rd party application SWATShare for model execution and visualization. These examples demonstrate the benefit of HydroShare to support model sharing and address collaborative problems involving modeling. The presentation will conclude with plans for future modeling-related development in HydroShare including supporting the publication of workflow resources, enhanced metadata for additional hydrologic models, and linking model resources with other resources in HydroShare to capture model provenance.

  11. Sharing Death

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Refslund Christensen, Dorthe

    (s) displaying photographs, poetry, stories and expressions of grief and longing. They take part in expressions of empathy for others by lighting candles for other people's loved ones, they share their personal experiences in different chatrooms and the site offers services as a calendar displaying anniversaries...... allowing creating unique and editable profiles, adding personal content and sharing it with other people in your network(s) AND systems for publishing your own life: becoming visible to others, being connected and being observed. More and more sites turn up on the Internet that facilitates the process...

  12. Feature-based memory-driven attentional capture: Visual working memory content affects visual attention.

    NARCIS (Netherlands)

    Olivers, C.N.L.; Meijer, F.; Theeuwes, J.

    2006-01-01

    In 7 experiments, the authors explored whether visual attention (the ability to select relevant visual information) and visual working memory (the ability to retain relevant visual information) share the same content representations. The presence of singleton distractors interfered more strongly

  13. Shared Language

    Science.gov (United States)

    Bochicchio, Daniel; Cole, Shelbi; Ostien, Deborah; Rodriguez, Vanessa; Staples, Megan; Susla, Patricia; Truxaw, Mary

    2009-01-01

    This article describes a process by which seven educators collaboratively engaged in developing a shared language to describe the mathematics pedagogy used to guide whole-class discussions as well as the products of their work. Suggestions are made for how others might engage in similarly productive professional development activities. (Contains 3…

  14. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  15. Visualizing Progress

    Science.gov (United States)

    2000-01-01

    Reality Capture Technologies, Inc. is a spinoff company from Ames Research Center. Offering e-business solutions for optimizing management, design and production processes, RCT uses visual collaboration environments (VCEs) such as those used to prepare the Mars Pathfinder mission.The product, 4-D Reality Framework, allows multiple users from different locations to manage and share data. The insurance industry is one targeted commercial application for this technology.

  16. REM sleep: tear secretion and dreams.

    Science.gov (United States)

    Murube, Juan

    2008-01-01

    Although a number of hypotheses exist to explain the reasons for the rapid eye movement (REM) phase of sleep, the physical movements themselves have not been explained or interpreted in the literature. The author theorizes that REM during sleep serves not only to increase the lacrimal secretion and to humidify and lubricate the ocular surface, but also to redistribute the secretion on the ocular surface and to inform the conjunctiva-associated lymphoid tissue (CALT) system. He hypothesizes that when eyes move in REM periods to humidify the ocular surface, they indirectly release phenomena of the visual activity, producing dreams.

  17. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct......The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...

  18. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... interaction with the environment. Extensive species variability exists in how and when maternal immunoglobulins are transferred to the neonate. In addition, there is a range of mechanisms by which the transferred immunoglobulins may play a protective role in the neonate. This chapter reviews...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  19. ACTH-Secreting Pheochromocytoma. Case report

    Directory of Open Access Journals (Sweden)

    N S Kuznetsov

    2012-12-01

    Full Text Available Ectopic hormone-secreting pheochromocytomas are rare. Only case reports exist in the literature. Despite the large number of guides on diagnosis and treatment of pheochromocytoma, and Cushing syndrome, the extreme rarity of ectopic ACTH-syndrome caused by pheochromocytoma, and complexity of clinical cause numerous diagnostic errors leading to treatment failure. Therefore, we belive it appropriate to share our experience of this group of patients.

  20. Sharing models as social objects through HydroShare

    Science.gov (United States)

    Goodall, J. L.; Morsy, M. M.; Castronova, A. M.; Dash, P. K.; Merwade, V.; Sadler, J.; Horsburgh, J. S.; Tarboton, D. G.

    2016-12-01

    Many hydrologists devote a significant amount of time to applying computational models. Sharing the results of these efforts broadly would benefit the community because scientists could, when appropriate, verify, extend, and refine existing models created by others rather than creating new models from scratch. While recent attention has been devoted to sharing hydrologic data including model outputs, approaches for sharing model instances, that is the input data required to execute a model, have received less attention. To address this need, we present functionality within HydroShare that allows scientists to share both model instances and the model programs used to execute the instances. HydroShare is an NSF-funded online system with the goal of making it simple to share data and models. The approach we designed is general and applicable to any hydrology model. It includes an extensible metadata framework capable of capturing detailed metadata for specific hydrology models, while also providing general metadata applicable to any hydrology model. Another advantage of this work is that defining a structured resource type with formal metadata fosters interoperability between cyberinfrastructure systems. This is illustrated through software providing interoperability between HydroShare and a third-party application called SWATShare that is focused on providing online visualization, execution, and management of SWAT models.

  1. Using secret sharing for searching in encrypted data

    NARCIS (Netherlands)

    Brinkman, Richard; Doumen, J.M.; Jonker, Willem

    When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. In this paper we present a method, inspired by secure multi-party computation, to search efficiently in

  2. Using secret sharing for searching in encrypted data

    NARCIS (Netherlands)

    Brinkman, Richard; Doumen, J.M.; Jonker, Willem; Jonker, W.; Petkovic, M.

    2004-01-01

    When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. We present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML

  3. Secreted proteases from dermatophytes.

    Science.gov (United States)

    Monod, Michel

    2008-01-01

    Dermatophytes are highly specialized pathogenic fungi that exclusively infect the stratum corneum, nails or hair, and it is evident that secreted proteolytic activity is important for their virulence. Endo- and exoproteases-secreted by dermatophytes are similar to those of species of the genus Aspergillus. However, in contrast to Aspergillus spp., dermatophyte-secreted endoproteases are multiple and are members of two large protein families, the subtilisins (serine proteases) and the fungalysins (metalloproteases). In addition, dermatophytes excrete sulphite as a reducing agent. In the presence of sulphite, disulphide bounds of the keratin substrate are directly cleaved to cysteine and S-sulphocysteine, and reduced proteins become accessible for further digestion by various endo- and exoproteases secreted by the fungi. Sulphitolysis is likely to be an essential step in the digestion of compact keratinized tissues which precedes the action of all proteases.

  4. Exocytosis and protein secretion in Trypanosoma

    Directory of Open Access Journals (Sweden)

    Rossignol Michel

    2010-01-01

    Full Text Available Abstract Background Human African trypanosomiasis is a lethal disease caused by the extracellular parasite Trypanosoma brucei. The proteins secreted by T. brucei inhibit the maturation of dendritic cells and their ability to induce lymphocytic allogenic responses. To better understand the pathogenic process, we combined different approaches to characterize these secreted proteins. Results Overall, 444 proteins were identified using mass spectrometry, the largest parasite secretome described to date. Functional analysis of these proteins revealed a strong bias toward folding and degradation processes and to a lesser extent toward nucleotide metabolism. These features were shared by different strains of T. brucei, but distinguished the secretome from published T. brucei whole proteome or glycosome. In addition, several proteins had not been previously described in Trypanosoma and some constitute novel potential therapeutic targets or diagnostic markers. Interestingly, a high proportion of these secreted proteins are known to have alternative roles once secreted. Furthermore, bioinformatic analysis showed that a significant proportion of proteins in the secretome lack transit peptide and are probably not secreted through the classical sorting pathway. Membrane vesicles from secretion buffer and infested rat serum were purified on sucrose gradient and electron microscopy pictures have shown 50- to 100-nm vesicles budding from the coated plasma membrane. Mass spectrometry confirmed the presence of Trypanosoma proteins in these microvesicles, showing that an active exocytosis might occur beyond the flagellar pocket. Conclusions This study brings out several unexpected features of the secreted proteins and opens novel perspectives concerning the survival strategy of Trypanosoma as well as possible ways to control the disease. In addition, concordant lines of evidence support the original hypothesis of the involvement of microvesicle-like bodies in the

  5. Sharing values, sharing a vision

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-31

    Teamwork, partnership and shared values emerged as recurring themes at the Third Technology Transfer/Communications Conference. The program drew about 100 participants who sat through a packed two days to find ways for their laboratories and facilities to better help American business and the economy. Co-hosts were the Lawrence Livermore National Laboratory and the Lawrence Berkeley Laboratory, where most meetings took place. The conference followed traditions established at the First Technology Transfer/Communications Conference, conceived of and hosted by the Pacific Northwest Laboratory in May 1992 in Richmond, Washington, and the second conference, hosted by the National Renewable Energy Laboratory in January 1993 in Golden, Colorado. As at the other conferences, participants at the third session represented the fields of technology transfer, public affairs and communications. They came from Department of Energy headquarters and DOE offices, laboratories and production facilities. Continued in this report are keynote address; panel discussion; workshops; and presentations in technology transfer.

  6. Visualizing Qualitative Information

    Science.gov (United States)

    Slone, Debra J.

    2009-01-01

    The abundance of qualitative data in today's society and the need to easily scrutinize, digest, and share this information calls for effective visualization and analysis tools. Yet, no existing qualitative tools have the analytic power, visual effectiveness, and universality of familiar quantitative instruments like bar charts, scatter-plots, and…

  7. Concentrative biliary secretion of ceftriaxone. Inhibition of lipid secretion and precipitation of calcium ceftriaxone in bile.

    Science.gov (United States)

    Xia, Y; Lambert, K J; Schteingart, C D; GU, J J; Hofmann, A F

    1990-08-01

    The hepatic transport of ceftriaxone, a third-generation cephalosporin, was characterized in the rat and hamster; its effect on bile flow and bile acid-induced biliary lipid secretion was also measured. In anesthetized rats with biliary fistulae, the Tmax was about 5 mumol.min-1.kg-1, and in the hamster the Tmax was about 1 mumol.min-1.kg-1. The compound was not biotransformed. At high secretion rates, the concentration of cephalosporin in bile increased to 27 mmol/L, a concentration far exceeding the solubility product of its calcium salt [2 x 10(-6) (mol/L)2], which precipitated from bile. In the rat, ceftriaxone induced choleresis (22 microL/mumol ceftriaxone, the expected value for a dianionic compound). In the isolated perfused rat liver, ceftriaxone had a fractional hepatic extraction rate averaging 3%; the compound was concentratively secreted into bile, the bile-perfusate ratio ranging from 35-250. Ceftriaxone inhibited phospholipid and cholesterol secretion induced by endogenous or exogenous bile acids; the rate of inhibition was linearly proportional to the canalicular secretion rate of ceftriaxone. Hepatic transport of ceftriaxone had no influence on hepatic secretion of ursodeoxycholyltaurine. In contrast, the net hepatic transport of ursodeoxycholic acid, ursodeoxycholyltaurine, or cholyltaurine inhibited ceftriaxone transport in a dose-dependent manner. It is concluded that ceftriaxone and bile acids share a common mechanism for hepatic transport in the rat and also interact in the processes involved in biliary lipid secretion. Biliary secretion of unbiotransformed ceftriaxone occurs at high concentrations; secondary Ca2+ entry results in the formation of supersaturated canalicular bile and subsequent precipitation as a calcium salt in the biliary tract. These data explain the formation of biliary sludge that occurs in patients undergoing high-dose ceftriaxone therapy.

  8. Performance Analysis of Chaotic Encryption Using a Shared Image ...

    African Journals Online (AJOL)

    Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full ...

  9. Salivary Gland Secretion.

    Science.gov (United States)

    Dorman, H. L.; And Others

    1981-01-01

    Describes materials and procedures for an experiment utilizing a live dog to demonstrate: (1) physiology of the salivary gland; (2) parasympathetic control of the salivary gland; (3) influence of varying salivary flow rates on sodium and potassium ions, osmolarity and pH; and (4) salivary secretion as an active process. (DS)

  10. A Public Secret

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2011-01-01

    This article is based on anthropological fieldwork undertaken at two elite universities in Beijing. It addresses the paradoxical situation of the many instances of suicide among Chinese elite university students in Beijing, which constitute a public secret. The pressure of education weighs heavily...

  11. Secrets of Successful Homeschooling

    Science.gov (United States)

    Rivero, Lisa

    2011-01-01

    Parents who homeschool gifted children often find the daily practice of home education very different from what they had imagined. Gifted children are complex in both personality and learning styles. Parents who say that homeschooling works well for their gifted children have learned from others or discovered on their own several secrets that make…

  12. Secrets and Misperceptions: The Creation of Self-Fulfilling Illusions

    Science.gov (United States)

    Cowan, Sarah K.

    2015-01-01

    This study examines who hears what secrets, comparing two similar secrets-one that is highly stigmatized and one that is less so. Using a unique survey representative of American adults and intake forms from a medical clinic, I document marked differences in who hears these secrets. People who are sympathetic to the stigmatizing secret are more likely to hear of it than those who may react negatively. This is a consequence of people not just selectively disclosing their own secrets but selectively sharing others’ as well. As a result, people in the same social network will be exposed to and influenced by different information about those they know and hence experience that network differently. When people effectively exist in networks tailored by others not to offend, then the information they hear tends to be that of which they already approve. Were they to hear secrets they disapproved of, then their attitudes might change, but they are less likely to hear those secrets. As such, the patterns of secret hearing contribute to a stasis in public opinion. PMID:26082932

  13. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  14. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  15. Visual imagery without visual perception: lessons from blind subjects

    Science.gov (United States)

    Bértolo, Helder

    2014-08-01

    The question regarding visual imagery and visual perception remain an open issue. Many studies have tried to understand if the two processes share the same mechanisms or if they are independent, using different neural substrates. Most research has been directed towards the need of activation of primary visual areas during imagery. Here we review some of the works providing evidence for both claims. It seems that studying visual imagery in blind subjects can be used as a way of answering some of those questions, namely if it is possible to have visual imagery without visual perception. We present results from the work of our group using visual activation in dreams and its relation with EEG's spectral components, showing that congenitally blind have visual contents in their dreams and are able to draw them; furthermore their Visual Activation Index is negatively correlated with EEG alpha power. This study supports the hypothesis that it is possible to have visual imagery without visual experience.

  16. ChaMAILeon: Simplified email sharing like never before!

    OpenAIRE

    Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam

    2013-01-01

    While passwords, by definition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As sharing passwords increases the chances of your passwords being compromised, leading websites like Google strongly advise their users not to share their passwords with anyone. To cater to this conflict of usability versus security and privacy, we introduce ChaMAILeon, an experimen...

  17. Beginning SharePoint Designer 2010

    CERN Document Server

    Windischman, Woodrow W; Rehmani, Asif

    2010-01-01

    Teaching Web designers, developers, and IT professionals how to use the new version of SharePoint Designer. Covering both the design and business applications of SharePoint Designer, this complete Wrox guide brings readers thoroughly up to speed on how to use SharePoint Designer in an enterprise. You'll learn to create and modify web pages, use CSS editing tools to modify themes, use Data View to create interactivity with SharePoint and other data, and much more. Coverage includes integration points with Visual Studio, Visio, and InfoPath.: Shows web designers, developers, and IT professionals

  18. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  19. Bucarest, Strictement Secret

    Directory of Open Access Journals (Sweden)

    Ionela Mihai

    2010-07-01

    Full Text Available L’émission Bucarest, strictement secret représente un documentaire organisésous la forme d’une série télé, qui dépeint le Bucarest à partir de deux perspectives: de l’histoire, de la conte et du lieu. La valeur d’une cité réside dans l’existence d’une mystique, d’un romantisme abscons, à part et des caractères empruntés de drames de Shakespeare, mystérieux, serrés d’angoisse et des secrets qui assombrissent leur existence. Par conséquence, le rôle du metteur en scène est de dévoiler leur vraie identité et de remettre en place, autant que possible, la vérité.

  20. Bile Formation and Secretion

    Science.gov (United States)

    Boyer, James L.

    2014-01-01

    Bile is a unique and vital aqueous secretion of the liver that is formed by the hepatocyte and modified down stream by absorptive and secretory properties of the bile duct epithelium. Approximately 5% of bile consists of organic and inorganic solutes of considerable complexity. The bile-secretory unit consists of a canalicular network which is formed by the apical membrane of adjacent hepatocytes and sealed by tight junctions. The bile canaliculi (~1 μm in diameter) conduct the flow of bile countercurrent to the direction of portal blood flow and connect with the canal of Hering and bile ducts which progressively increase in diameter and complexity prior to the entry of bile into the gallbladder, common bile duct, and intestine. Canalicular bile secretion is determined by both bile salt-dependent and independent transport systems which are localized at the apical membrane of the hepatocyte and largely consist of a series of adenosine triphosphate-binding cassette transport proteins that function as export pumps for bile salts and other organic solutes. These transporters create osmotic gradients within the bile canalicular lumen that provide the driving force for movement of fluid into the lumen via aquaporins. Species vary with respect to the relative amounts of bile salt-dependent and independent canalicular flow and cholangiocyte secretion which is highly regulated by hormones, second messengers, and signal transduction pathways. Most determinants of bile secretion are now characterized at the molecular level in animal models and in man. Genetic mutations serve to illuminate many of their functions. PMID:23897680

  1. The Secret Suburb

    DEFF Research Database (Denmark)

    Bech-Danielsen, Claus

    2015-01-01

    The ability to be ‘invisible’ seems to be an important quality in relation to a summerhouse. In fact, summerhouses can be said to be ‘invisible’ in a double sense. As I will explore in this chapter, summerhouses are neglected in planning and partly forgotten in Danish building regulations, at the......, at the same time as their owners like to see summerhouses as hidden places where they can live secret lives, hidden away from the modern world....

  2. Feature-Based Memory-Driven Attentional Capture: Visual Working Memory Content Affects Visual Attention

    Science.gov (United States)

    Olivers, Christian N. L.; Meijer, Frank; Theeuwes, Jan

    2006-01-01

    In 7 experiments, the authors explored whether visual attention (the ability to select relevant visual information) and visual working memory (the ability to retain relevant visual information) share the same content representations. The presence of singleton distractors interfered more strongly with a visual search task when it was accompanied by…

  3. Computational Biology and the Limits of Shared Vision

    DEFF Research Database (Denmark)

    Carusi, Annamaria

    2011-01-01

    Several studies have focused on the social sharing of visual practices as constitutive of evidence within a domain, while there has been relatively less attention paid to points where the social sharing of practices breaks down, or is resisted. This article argues that a study of both types...... of cases is necessary in order to gain a better perspective on social sharing of practices, and on what other factors this sharing is dependent upon. The article presents the case of currently emerging inter-disciplinary visual practices in the domain of computational biology, where the sharing of visual...... practices would be beneficial to the collaborations necessary for the research. Computational biology includes sub-domains where visual practices are coming to be shared across disciplines, and those where this is not occurring, and where the practices of others are resisted. A significant point...

  4. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  5. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  6. The secretory synapse: the secrets of a serial killer.

    Science.gov (United States)

    Bossi, Giovanna; Trambas, Christina; Booth, Sarah; Clark, Richard; Stinchcombe, Jane; Griffiths, Gillian M

    2002-11-01

    Cytotoxic T lymphocytes (CTLs) destroy their targets by a process involving secretion of specialized granules. The interactions between CTLs and target can be very brief; nevertheless, adhesion and signaling proteins segregate into an immunological synapse. Secretion occurs in a specialized secretory domain. Use of live and fixed cell microscopy allows this secretory synapse to be visualized both temporally and spatially. The combined use of confocal and electron microscopy has produced some surprising findings, which suggest that the secretory synapse may be important both in delivering the lethal hit and in facilitating membrane transfer from target to CTL. Studies on the secretory synapse in wild-type and mutant CTLs have been used to identify proteins involved in secretion. Further clues as to the signals required for secretion are emerging from comparisons of inhibitory and activating synapses formed by natural killer cells.

  7. Share your Sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    All over the world, humans (Homo sapiens) display resource-sharing behavior, and common patterns of sharing seem to exist across cultures. Humans are not the only primates to share, and observations from the wild have long documented food sharing behavior in our closest phylogenetic relatives...

  8. Protecting Trade Secrets in Canada.

    Science.gov (United States)

    Courage, Noel; Calzavara, Janice

    2015-05-18

    Patents in the life sciences industries are a key form of intellectual property (IP), particularly for products such as brand-name drugs and medical devices. However, trade secrets can also be a useful tool for many types of innovations. In appropriate cases, trade secrets can offer long-term protection of IP for a lower financial cost than patenting. This type of protection must be approached with caution as there is little room for error when protecting a trade secret. Strong agreements and scrupulous security can help to protect the secret. Once a trade secret is disclosed to the public, it cannot be restored as the owner's property; however, if the information is kept from the public domain, the owner can have a property right of unlimited duration in the information. In some situations patents and trade secrets may be used cooperatively to protect innovation, particularly for manufacturing processes. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  9. Visual Impairment

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Visual Impairment KidsHealth / For Teens / Visual Impairment What's in ... with the brain, making vision impossible. What Is Visual Impairment? Many people have some type of visual ...

  10. Visual field

    Science.gov (United States)

    Perimetry; Tangent screen exam; Automated perimetry exam; Goldmann visual field exam; Humphrey visual field exam ... Confrontation visual field exam. This is a quick and basic check of the visual field. The health care provider ...

  11. Catecholamine Secretion from Individual Cells

    National Research Council Canada - National Science Library

    Wightman, R

    1998-01-01

    .... Many cells, including neurons, communicate by secretion of chemical substances by exocytosis where substances are extruded into the extracellular space following fusion of the vesicle and plasma membranes...

  12. Creativity, visualization abilities, and visual cognitive style.

    Science.gov (United States)

    Kozhevnikov, Maria; Kozhevnikov, Michael; Yu, Chen Jiao; Blazhenkova, Olesya

    2013-06-01

    Despite the recent evidence for a multi-component nature of both visual imagery and creativity, there have been no systematic studies on how the different dimensions of creativity and imagery might interrelate. The main goal of this study was to investigate the relationship between different dimensions of creativity (artistic and scientific) and dimensions of visualization abilities and styles (object and spatial). In addition, we compared the contributions of object and spatial visualization abilities versus corresponding styles to scientific and artistic dimensions of creativity. Twenty-four undergraduate students (12 females) were recruited for the first study, and 75 additional participants (36 females) were recruited for an additional experiment. Participants were administered a number of object and spatial visualization abilities and style assessments as well as a number of artistic and scientific creativity tests. The results show that object visualization relates to artistic creativity and spatial visualization relates to scientific creativity, while both are distinct from verbal creativity. Furthermore, our findings demonstrate that style predicts corresponding dimension of creativity even after removing shared variance between style and visualization ability. The results suggest that styles might be a more ecologically valid construct in predicting real-life creative behaviour, such as performance in different professional domains. © 2013 The British Psychological Society.

  13. Share Your Values

    Science.gov (United States)

    ... Español Text Size Email Print Share Share Your Values Page Content Article Body Today, teenagers are bombarded ... mid-twenties. The Most Effective Way to Instill Values? By Example Your words will carry more weight ...

  14. Construction of Blaze at the University of Illinois at Chicago: A Shared, High-Performance, Visual Computer for Next-Generation Cyberinfrastructure-Accelerated Scientific, Engineering, Medical and Public Policy Research

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Maxine D. [Acting Director, EVL; Leigh, Jason [PI

    2014-02-17

    The Blaze high-performance visual computing system serves the high-performance computing research and education needs of University of Illinois at Chicago (UIC). Blaze consists of a state-of-the-art, networked, computer cluster and ultra-high-resolution visualization system called CAVE2(TM) that is currently not available anywhere in Illinois. This system is connected via a high-speed 100-Gigabit network to the State of Illinois' I-WIRE optical network, as well as to national and international high speed networks, such as the Internet2, and the Global Lambda Integrated Facility. This enables Blaze to serve as an on-ramp to national cyberinfrastructure, such as the National Science Foundation’s Blue Waters petascale computer at the National Center for Supercomputing Applications at the University of Illinois at Chicago and the Department of Energy’s Argonne Leadership Computing Facility (ALCF) at Argonne National Laboratory. DOE award # DE-SC005067, leveraged with NSF award #CNS-0959053 for “Development of the Next-Generation CAVE Virtual Environment (NG-CAVE),” enabled us to create a first-of-its-kind high-performance visual computing system. The UIC Electronic Visualization Laboratory (EVL) worked with two U.S. companies to advance their commercial products and maintain U.S. leadership in the global information technology economy. New applications are being enabled with the CAVE2/Blaze visual computing system that is advancing scientific research and education in the U.S. and globally, and help train the next-generation workforce.

  15. Secret-key certificates (continued)

    NARCIS (Netherlands)

    S.A. Brands (Stefan)

    1995-01-01

    textabstractA new construction is described for designing secret-key certificate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certificate issuing protocols that enable the Certification Authority to certify public keys, without being

  16. Sharing is sparing

    NARCIS (Netherlands)

    P.Y. Kocher; U. Gaudenz; P. Troxler; Dr. P. Troxler; P. Wolf

    2014-01-01

    The commitment of the Fab Lab community to participate in processes of commons-based knowledge production thus also includes global knowledge sharing. For sharing back into the global commons, new knowledge needs however to be documented in a way that allows to share it by the means of information

  17. Open Development: create, share, engage | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-10-29

    Oct 29, 2015 ... ... training, and visualizations encourage sharing and support people to use and build upon open content. These are critically important to making open practices work. But who will take responsibility to ensure that open practice works and how can policy environments encourage such engagement?

  18. Pheochromocytomas and secreting paragangliomas

    Directory of Open Access Journals (Sweden)

    Gimenez-Roqueplo Anne-Paule

    2006-12-01

    Full Text Available Abstract Catecholamine-producing tumors may arise in the adrenal medulla (pheochromocytomas or in extraadrenal chromaffin cells (secreting paragangliomas. Their prevalence is about 0.1% in patients with hypertension and 4% in patients with a fortuitously discovered adrenal mass. An increase in the production of catecholamines causes symptoms (mainly headaches, palpitations and excess sweating and signs (mainly hypertension, weight loss and diabetes reflecting the effects of epinephrine and norepinephrine on α- and β-adrenergic receptors. Catecholamine-producing tumors mimic paroxysmal conditions with hypertension and/or cardiac rhythm disorders, including panic attacks, in which sympathetic activation linked to anxiety reproduces the same signs and symptoms. These tumors may be sporadic or part of any of several genetic diseases: familial pheochromocytoma-paraganglioma syndromes, multiple endocrine neoplasia type 2, neurofibromatosis 1 and von Hippel-Lindau disease. Familial cases are diagnosed earlier and are more frequently bilateral and recurring than sporadic cases. The most specific and sensitive diagnostic test for the tumor is the determination of plasma or urinary metanephrines. The tumor can be located by computed tomography, magnetic resonance imaging and metaiodobenzylguanidine scintigraphy. Treatment requires resection of the tumor, generally by laparoscopic surgery. About 10% of tumors are malignant either at first operation or during follow-up, malignancy being diagnosed by the presence of lymph node, visceral or bone metastases. Recurrences and malignancy are more frequent in cases with large or extraadrenal tumors. Patients, especially those with familial or extraadrenal tumors, should be followed-up indefinitely.

  19. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...... and trust. (Thomsen 2013; Bauman 2000; Beck 1992; Giddens 1991). The sharing economy is currently hyper trendy but before claiming capitalism as dead we need to understand the basics of the sharing economies and cultures asking who can share and what will we share. Furthermore it is crucial to study what...

  20. Multiple Ca2+ sensors in secretion

    DEFF Research Database (Denmark)

    Walter, Alexander M; Groffen, Alexander J; Sørensen, Jakob Balslev

    2011-01-01

    Regulated neurotransmitter secretion depends on Ca(2+) sensors, C2 domain proteins that associate with phospholipids and soluble N-ethylmaleimide-sensitive fusion attachment protein receptor (SNARE) complexes to trigger release upon Ca(2+) binding. Ca(2+) sensors are thought to prevent spontaneous...... fusion at rest (clamping) and to promote fusion upon Ca(2+) activation. At least eight, often coexpressed, Ca(2+) sensors have been identified in mammals. Accumulating evidence suggests that multiple Ca(2+) sensors interact, rather than work autonomously, to produce the complex secretory response...... observed in neurons and secretory cells. In this review, we present several working models to describe how different sensors might be arranged to mediate synchronous, asynchronous and spontaneous neurotransmitter release. We discuss the scenario that different Ca(2+) sensors typically act on one shared...

  1. Secrets of mlearning failures: confronting reality

    Directory of Open Access Journals (Sweden)

    Thomas Cochrane

    2012-08-01

    Full Text Available Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as “failures” and compares them to successful projects to draw out critical implications for mlearning project design and implementation to avoid common pitfalls leading to potential project failure. This article uses the researcher's six critical success factors identified across the 35 mlearning projects to evaluate these three projects, and concludes that projects resulting in “no significant difference” in pedagogical outcomes are the result of attempts to shoehorn old pedagogies into new technologies. Lecturer professional development and sustained collaborative support are critical to fostering new pedagogies utilising the unique affordances of mobile devices.

  2. Development of a semantic-enabled cybersecurity threat intelligence sharing model

    CSIR Research Space (South Africa)

    Mtsweni, Jabu

    2016-03-01

    Full Text Available intelligence solutions lack the semantic knowledge essential for automated sharing of timely and context-aware information within a specific operating domain. Moreover, existing cybersecurity information sharing solutions lack the visualization and intelligence...

  3. The influence of visual feedback from the recent past on the programming of grip aperture is grasp-specific, shared between hands, and mediated by sensorimotor memory not task set.

    Science.gov (United States)

    Tang, Rixin; Whitwell, Robert L; Goodale, Melvyn A

    2015-05-01

    Goal-directed movements, such as reaching out to grasp an object, are necessarily constrained by the spatial properties of the target such as its size, shape, and position. For example, during a reach-to-grasp movement, the peak width of the aperture formed by the thumb and fingers in flight (peak grip aperture, PGA) is linearly related to the target's size. Suppressing vision throughout the movement (visual open loop) has a small though significant effect on this relationship. Visual open loop conditions also produce a large increase in the PGA compared to when vision is available throughout the movement (visual closed loop). Curiously, this differential effect of the availability of visual feedback is influenced by the presentation order: the difference in PGA between closed- and open-loop trials is smaller when these trials are intermixed (an effect we have called 'homogenization'). Thus, grasping movements are affected not only by the availability of visual feedback (closed loop or open loop) but also by what happened on the previous trial. It is not clear, however, whether this carry-over effect is mediated through motor (or sensorimotor) memory or through the interference of different task sets for closed-loop and open-loop feedback that determine when the movements are fully specified. We reasoned that sensorimotor memory, but not a task set for closed and open loop feedback, would be specific to the type of response. We tested this prediction in a condition in which pointing to targets was alternated with grasping those same targets. Critically, in this condition, when pointing was performed in open loop, grasping was always performed in closed loop (and vice versa). Despite the fact that closed- and open-loop trials were alternating in this condition, we found no evidence for homogenization of the PGA. Homogenization did occur, however, in a follow-up experiment in which grasping movements and visual feedback were alternated between the left and the right

  4. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well......The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...

  5. Adrenal gland hormone secretion (image)

    Science.gov (United States)

    The adrenal gland secretes steroid hormones such as cortisol and aldosterone. It also makes precursors that can be converted ... steroids (androgen, estrogen). A different part of the adrenal gland makes adrenaline (epinephrine). When the glands produce ...

  6. VICTORIA'S SECRET Prepares for Growth

    National Research Council Canada - National Science Library

    Jordan K Speer

    2007-01-01

      After the upcoming holiday season, Victoria's Secret will take the first steps toward launching its e-commerce business on a cross-channel on-demand platform from partner n2N Commerce, a company...

  7. Shared governance. Sharing power and opportunity.

    Science.gov (United States)

    Prince, S B

    1997-03-01

    Responding to an enlarged span of control and an ever changing health care environment, the author describes the implementation of a unit-based shared governance model. Through study,literature review, and team consensus, a new management style emerged. Using Rosabeth Kanter's framework for work effectiveness, the unit governance structure was transformed. The process, progress, and outcomes are described, analyzed, and celebrated.

  8. Secure association rule sharing

    OpenAIRE

    Oliveira,Stanley R. de M.; Zaïane, Osmar R.; Saygın, Yücel; Saygin, Yucel

    2004-01-01

    The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propose a unified framework for protecting sensitive knowledge before sharing. This framework encompasses:...

  9. Efficiency in Shared Services

    OpenAIRE

    Prachýl, Lukáš

    2010-01-01

    The thesis describes and analyzes shared services organizations as a management tool to achieve efficiency in the organizations' processes. Paper builds on established theoretical principles, enhance them with up-to-date insights on the current situation and development and create a valuable knowledge base on shared services organizations. Strong emphasis is put on concrete means on how exactly efficiency could be achieved. Major relevant topics such as reasons for shared services, people man...

  10. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  11. Secretion of a pneumococcal type II secretion system pilus correlates with DNA uptake during transformation.

    Science.gov (United States)

    Balaban, Murat; Bättig, Patrick; Muschiol, Sandra; Tirier, Stephan M; Wartha, Florian; Normark, Staffan; Henriques-Normark, Birgitta

    2014-02-18

    Streptococcus pneumoniae is a major human pathogen that successfully adapts to the host environment via an efficient uptake system for free DNA liberated from other organisms in the upper respiratory tract, facilitating immune evasion and drug resistance. Although the initial signaling events leading to pneumococcal competence for DNA transformation and the fate of DNA when it has been taken up have been extensively studied, the actual mechanism by which DNA in the environment may traverse the thick capsular and cell wall layers remains unknown. Here we visualize that induction of competence results in the formation of a native morphologically distinct pilus structure on the bacterial surface. This plaited pilus is encoded by the competence (com)G locus, and, after assembly, it is rapidly released into the surrounding medium. Heterologous pneumococcal pilus expression in Escherichia coli was obtained by replacing the pulE-K putative pilin genes of the Klebsiella oxytoca type II secretion system with the complete comG locus. In the pneumococcus, the coordinated secretion of pili from the cells correlates to DNA transformation. A model for DNA transformation is proposed whereby pilus assembly "drills" a channel across the thick cell wall that becomes transiently open by secretion of the pilus, providing the entry port for exogenous DNA to gain access to DNA receptors associated with the cytoplasmic membrane.

  12. Androecia in two Clusia species: development, structure and resin secretion.

    Science.gov (United States)

    Sá-Haiad, B; Silva, C P; Paula, R C V; Rocha, J F; Machado, S R

    2015-07-01

    Clusia fluminensis and C. lanceolata are dioecious shrubs having resiniferous flowers with strongly distinct androecia. The aim of this study was to investigate the development and anatomy of their androecia and the ultrastructure, histochemistry and secretory process of their androecium resin glands, examining whether the cellular aspects of resin secretion differed between these two morphologically distinct androecia. Stamens differ, being free in C. fluminensis and clustered in a synandrium in C. lanceolata. Staminode sterility is due to the undifferentiated nature of the anthers in C. lanceolata and degeneration of meiocytes and anther indehiscence in C. fluminensis. Resin is produced in subepidermal cavities and canals with wide lumens. In the secretory stage, epithelial cells present sinuous walls, voluminous nuclei, polymorphic plastids associated with periplastidial reticulum, mitochondria, oil bodies, multivesicular bodies, endoplasmic reticulum and dictyosomes. The resin is released through rupture points on the distal surface of stamens and staminodes, associated with disrupted cavities and canals. Our results show morphological diversity associated with functional similarity. Also, a secretion pattern shared by the two species includes initiation of the secretory process in young floral buds, compartmentalisation of the secretion in pre-anthesis buds and release of secretions at anthesis. Cellular aspects of resin secretion in these species are quite similar, as are the chemical identities of the main components of the floral resins of the genus. © 2015 German Botanical Society and The Royal Botanical Society of the Netherlands.

  13. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  14. A Novel Mechanism for Protein Delivery by the Type 3 Secretion System for Extracellularly Secreted Proteins.

    Science.gov (United States)

    Tejeda-Dominguez, Farid; Huerta-Cantillo, Jazmin; Chavez-Dueñas, Lucia; Navarro-Garcia, Fernando

    2017-03-28

    The type 3 secretion system (T3SS) is essential for bacterial virulence through delivering effector proteins directly into the host cytosol. Here, we identified an alternative delivery mechanism of virulence factors mediated by the T3SS, which consists of the association of extracellularly secreted proteins from bacteria with the T3SS to gain access to the host cytosol. Both EspC, a protein secreted as an enteropathogenic Escherichia coli (EPEC) autotransporter, and YopH, a protein detected on the surface of Yersinia, require a functional T3SS for host cell internalization; here we provide biophysical and molecular evidence to support the concept of the EspC translocation mechanism, which requires (i) an interaction between EspA and an EspC middle segment, (ii) an EspC translocation motif (21 residues that are shared with the YopH translocation motif), (iii) increases in the association and dissociation rates of EspC mediated by EspA interacting with EspD, and (iv) an interaction of EspC with the EspD/EspB translocon pore. Interestingly, this novel mechanism does not exclude the injection model (i.e., EspF) operating through the T3SS conduit; therefore, T3SS can be functioning as an internal conduit or as an external railway, which can be used to reach the translocator pore, and this mechanism appears to be conserved among different T3SS-dependent pathogens.IMPORTANCE The type 3 secretion system is essential for injection of virulence factors, which are delivered directly into the cytosol of the host cells for usurping and subverting host processes. Recent studies have shown that these effectors proteins indeed travel inside an "injectisome" conduit through a single step of translocation by connecting the bacterium and host cell cytoplasms. However, all findings are not compatible with this model. For example, both YopH, a protein detected on the surface of Yersinia, and EspC, an autotransporter protein secreted by enteropathogenic E. coli, require a functional T3

  15. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  16. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  17. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl...

  18. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    Despite the high degree of flexibility and generosity in Sweden’s parental leave program, one fifth of parents are not satisfied with the sharing of parental leave. This paper investigates whether ‘comparison sharing’, the sharing of parental leave by other comparable couples, influences the prob...

  19. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  20. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    Abstract This paper argues that knowledge sharing can be conceptualized as different situations of exchange in which individuals relate to each other in different ways, involving different rules, norms and traditions of reciprocity regulating the exchange. The main challenge for facilitating...... knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  1. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  2. Pro SharePoint 2010 Solution Development

    CERN Document Server

    Hild, E

    2010-01-01

    This book takes a practical problem-solution approach to common business challenges. You'll not only encounter interesting code samples, but also see how to combine these examples with the Microsoft collaboration platform's services. The book's solutions focus on using Visual Studio 2008 and its built-in Office development tools to construct the user interface layer. And solutions can interact with SharePoint as a service provider, taking advantage of SharePoint's many collaboration features like document repositories, collaboration sites, and search functions. This book is unique because it s

  3. Visual art and visual perception

    NARCIS (Netherlands)

    Koenderink, Jan J.

    2015-01-01

    Visual art and visual perception ‘Visual art’ has become a minor cul-de-sac orthogonal to THE ART of the museum directors and billionaire collectors. THE ART is conceptual, instead of visual. Among its cherished items are the tins of artist’s shit (Piero Manzoni, 1961, Merda d’Artista) “worth their

  4. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  5. Flow visualization

    CERN Document Server

    Merzkirch, Wolfgang

    1974-01-01

    Flow Visualization describes the most widely used methods for visualizing flows. Flow visualization evaluates certain properties of a flow field directly accessible to visual perception. Organized into five chapters, this book first presents the methods that create a visible flow pattern that could be investigated by visual inspection, such as simple dye and density-sensitive visualization methods. It then deals with the application of electron beams and streaming birefringence. Optical methods for compressible flows, hydraulic analogy, and high-speed photography are discussed in other cha

  6. Of Plants, and Other Secrets

    Directory of Open Access Journals (Sweden)

    Michael Marder

    2012-12-01

    Full Text Available In this article, I inquire into the reasons for the all-too-frequent association of plants and secrets. Among various hypotheses explaining this connection from the standpoint of plant morphology and physiology, the one that stands out is the idea that plants are not only objects in the natural environment, but also subjects with a peculiar mode of accessing the world. The core of the “plant enigma” is, therefore, onto-phenomenological. Positively understood, the secret of their subjectivity leaves just enough space for the self-expression and the self-interpretation of vegetal life.

  7. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  8. The Spanish Sharing Rule

    OpenAIRE

    Bernarda Zamora

    2003-01-01

    In this paper we estimate the intrahousehold distribution of household's private expenditures between men and women (the sharing rule) in two types of Spanish households: those in which the woman works and those in which the woman does not work. The results for working women are parallel to those obtained for other countries which indicate a proportionally higher transfer from the woman to the man than from the man to the woman, such that the proportion of the woman's share decreases both wit...

  9. Bonobos Share with Strangers

    OpenAIRE

    Jingzhi Tan; Brian Hare

    2013-01-01

    Humans are thought to possess a unique proclivity to share with others ? including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food ...

  10. [The shared nursing function].

    Science.gov (United States)

    Fleury, Cynthia

    The Chair of Philosophy at Hôtel-Dieu hospital in Paris, is a place for the sharing of knowledge and recognition. It provides a place where the subjective, institutional and political dimension of care can be considered, by all stakeholders: patients, nurses, families and citizens. The aim is to invent a shared nursing function. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  11. Sharing big biomedical data

    OpenAIRE

    Toga, Arthur W.; Ivo D Dinov

    2015-01-01

    Background The promise of Big Biomedical Data may be offset by the enormous challenges in handling, analyzing, and sharing it. In this paper, we provide a framework for developing practical and reasonable data sharing policies that incorporate the sociological, financial, technical and scientific requirements of a sustainable Big Data dependent scientific community. Findings Many biomedical and healthcare studies may be significantly impacted by using large, heterogeneous and incongruent data...

  12. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  13. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  14. Phase-sharing using a Mach-Zehnder interferometer.

    Science.gov (United States)

    Thomas, Lijo; Ivan, J Solomon; Ameen Yasir, P A; Sharma, Richa; Singh, Rakesh Kumar; Narayanamurthy, C S; Dasgupta, K S

    2015-02-01

    A phase-sharing scheme using the Mach-Zehnder interferometric setup is demonstrated. Two coherent light fields of the same wavelength which have orthogonal polarizations are used as sources at the two ends of a Mach-Zehnder interferometer. They are made to interfere independently at the opposing ends of the interferometer so that the phase estimated by two observers at the two opposing ends of the interferometer is nearly identical. The scheme could in principle be used by two observers to simultaneously monitor and study a phase object inserted in one of the arms of the interferometer. A pseudorandom phase plate which mimics atmospheric turbulence is inserted in one of the arms of the interferometer to demonstrate that such a phase-sharing scheme could be converted to a secret-key sharing scheme. Shared secret-key generation is demonstrated through evaluation of the phase correlates of the shared phase samples available at their respective ends. The shared random phases could also be used in a more direct manner by the respective observers for random phase encryption of images.

  15. Cartographic visualization

    NARCIS (Netherlands)

    Kraak, M.J.; Wright, James D.

    2015-01-01

    The cartographic visualization process, based on the statement “How do I say what to whom, and is it effective?” is explained for both presenting and exploring spatiotemporal data. The visualization environment and required functionality are described

  16. Visual handicap in children.

    Science.gov (United States)

    Bull, M; Evans, P J; Maclean, H

    1982-05-01

    Vision is the primary mode of learning and if it is absent or impaired, other pathways must be stimulated. The range of appropriate services available to visually handicapped children is explained in relation to the school run by the Royal Victorian Institution for the Blind in Melbourne. A period of residential education may be needed for children with multiple impairment. Those whose handicap is primarily visual can usually live at home and have their education integrated with that of their normal peers. Home-based services and parent support systems for preschool and kindergarten age children are outlined. To be successful, they require sharing confidential medical and education information. The school provides a major input to a discussion group of all professionals dealing with such children. Information from the group includes the causes, and educational implications of visual handicap in Victorian children. The commonest pathologies are macular problems and congenital cataract.

  17. Personal Visualization and Personal Visual Analytics.

    Science.gov (United States)

    Huang, Dandan; Tory, Melanie; Aseniero, Bon Adriel; Bartram, Lyn; Bateman, Scott; Carpendale, Sheelagh; Tang, Anthony; Woodbury, Robert

    2015-03-01

    Data surrounds each and every one of us in our daily lives, ranging from exercise logs, to archives of our interactions with others on social media, to online resources pertaining to our hobbies. There is enormous potential for us to use these data to understand ourselves better and make positive changes in our lives. Visualization (Vis) and visual analytics (VA) offer substantial opportunities to help individuals gain insights about themselves, their communities and their interests; however, designing tools to support data analysis in non-professional life brings a unique set of research and design challenges. We investigate the requirements and research directions required to take full advantage of Vis and VA in a personal context. We develop a taxonomy of design dimensions to provide a coherent vocabulary for discussing personal visualization and personal visual analytics. By identifying and exploring clusters in the design space, we discuss challenges and share perspectives on future research. This work brings together research that was previously scattered across disciplines. Our goal is to call research attention to this space and engage researchers to explore the enabling techniques and technology that will support people to better understand data relevant to their personal lives, interests, and needs.

  18. Sharing Epigraphic Information as Linked Data

    Science.gov (United States)

    Álvarez, Fernando-Luis; García-Barriocanal, Elena; Gómez-Pantoja, Joaquín-L.

    The diffusion of epigraphic data has evolved in the last years from printed catalogues to indexed digital databases shared through the Web. Recently, the open EpiDoc specifications have resulted in an XML-based schema for the interchange of ancient texts that uses XSLT to render typographic representations. However, these schemas and representation systems are still not providing a way to encode computational semantics and semantic relations between pieces of epigraphic data. This paper sketches an approach to bring these semantics into an EpiDoc based schema using the Ontology Web Language (OWL) and following the principles and methods of information sharing known as "linked data". The paper describes the general principles of the OWL mapping of the EpiDoc schema and how epigraphic data can be shared in RDF format via dereferenceable URIs that can be used to build advanced search, visualization and analysis systems.

  19. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  20. Histaminergic regulation of prolactin secretion

    DEFF Research Database (Denmark)

    Knigge, U P

    1990-01-01

    Histamine (HA), which acts as a neurotransmitter in the central nervous system, participates in the neuroendocrine regulation of prolactin (PRL) secretion. HA has a predominant stimulatory effect which is mediated via H2-receptors following central administration and via H1-receptors following...

  1. Raspberry Pi for secret agents

    CERN Document Server

    Sjogelid, Stefan

    2015-01-01

    This book is an easy-to-follow guide with practical examples in each chapter. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications and also guides you through setting up the Raspberry Pi as a secret agent toolbox.

  2. Visual Scripting.

    Science.gov (United States)

    Halas, John

    Visual scripting is the coordination of words with pictures in sequence. This book presents the methods and viewpoints on visual scripting of fourteen film makers, from nine countries, who are involved in animated cinema; it contains concise examples of how a storybook and preproduction script can be prepared in visual terms; and it includes a…

  3. TrialShare

    Data.gov (United States)

    U.S. Department of Health & Human Services — The immune tolerance data management and visualization portal for studies sponsored by the Immune Tolerance Network (ITN) and collaborating investigators. Data from...

  4. Coordinating Shared Activities

    Science.gov (United States)

    Clement, Bradley

    2004-01-01

    Shared Activity Coordination (ShAC) is a computer program for planning and scheduling the activities of an autonomous team of interacting spacecraft and exploratory robots. ShAC could also be adapted to such terrestrial uses as helping multiple factory managers work toward competing goals while sharing such common resources as floor space, raw materials, and transports. ShAC iteratively invokes the Continuous Activity Scheduling Planning Execution and Replanning (CASPER) program to replan and propagate changes to other planning programs in an effort to resolve conflicts. A domain-expert specifies which activities and parameters thereof are shared and reports the expected conditions and effects of these activities on the environment. By specifying these conditions and effects differently for each planning program, the domain-expert subprogram defines roles that each spacecraft plays in a coordinated activity. The domain-expert subprogram also specifies which planning program has scheduling control over each shared activity. ShAC enables sharing of information, consensus over the scheduling of collaborative activities, and distributed conflict resolution. As the other planning programs incorporate new goals and alter their schedules in the changing environment, ShAC continually coordinates to respond to unexpected events.

  5. Data visualization

    CERN Document Server

    Azzam, Tarek

    2013-01-01

    Do you communicate data and information to stakeholders? In Part 1, we introduce recent developments in the quantitative and qualitative data visualization field and provide a historical perspective on data visualization, its potential role in evaluation practice, and future directions. Part 2 delivers concrete suggestions for optimally using data visualization in evaluation, as well as suggestions for best practices in data visualization design. It focuses on specific quantitative and qualitative data visualization approaches that include data dashboards, graphic recording, and geographic information systems (GIS). Readers will get a step-by-step process for designing an effective data dashboard system for programs and organizations, and various suggestions to improve their utility.

  6. Visual agnosia.

    Science.gov (United States)

    Álvarez, R; Masjuan, J

    2016-03-01

    Visual agnosia is defined as an impairment of object recognition, in the absence of visual acuity or cognitive dysfunction that would explain this impairment. This condition is caused by lesions in the visual association cortex, sparing primary visual cortex. There are 2 main pathways that process visual information: the ventral stream, tasked with object recognition, and the dorsal stream, in charge of locating objects in space. Visual agnosia can therefore be divided into 2 major groups depending on which of the two streams is damaged. The aim of this article is to conduct a narrative review of the various visual agnosia syndromes, including recent developments in a number of these syndromes. Copyright © 2015 Elsevier España, S.L.U. y Sociedad Española de Medicina Interna (SEMI). All rights reserved.

  7. Advancing Collaboration through Hydrologic Data and Model Sharing

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.

    2015-12-01

    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  8. Sharing big biomedical data.

    Science.gov (United States)

    Toga, Arthur W; Dinov, Ivo D

    The promise of Big Biomedical Data may be offset by the enormous challenges in handling, analyzing, and sharing it. In this paper, we provide a framework for developing practical and reasonable data sharing policies that incorporate the sociological, financial, technical and scientific requirements of a sustainable Big Data dependent scientific community. Many biomedical and healthcare studies may be significantly impacted by using large, heterogeneous and incongruent datasets; however there are significant technical, social, regulatory, and institutional barriers that need to be overcome to ensure the power of Big Data overcomes these detrimental factors. Pragmatic policies that demand extensive sharing of data, promotion of data fusion, provenance, interoperability and balance security and protection of personal information are critical for the long term impact of translational Big Data analytics.

  9. Shared care (comanagement).

    Science.gov (United States)

    Montero Ruiz, E

    2016-01-01

    Surgical departments have increasing difficulties in caring for their hospitalised patients due to the patients' advanced age and comorbidity, the growing specialisation in medical training and the strong political-healthcare pressure that a healthcare organisation places on them, where surgical acts take precedence over other activities. The pressure exerted by these departments on the medical area and the deficient response by the interconsultation system have led to the development of a different healthcare organisation model: Shared care, which includes perioperative medicine. In this model, 2 different specialists share the responsibility and authority in caring for hospitalised surgical patients. Internal Medicine is the most appropriate specialty for shared care. Internists who exercise this responsibility should have certain characteristics and must overcome a number of concerns from the surgeon and anaesthesiologist. Copyright © 2015 Elsevier España, S.L.U. y Sociedad Española de Medicina Interna (SEMI). All rights reserved.

  10. Sharing medicine: the candidacy of medicines and other household items for sharing, Dominican Republic.

    Directory of Open Access Journals (Sweden)

    Michael N Dohn

    Full Text Available People share medicines and problems can result from this behavior. Successful interventions to change sharing behavior will require understanding people's motives and purposes for sharing medicines. Better information about how medicines fit into the gifting and reciprocity system could be useful in designing interventions to modify medicine sharing behavior. However, it is uncertain how people situate medicines among other items that might be shared. This investigation is a descriptive study of how people sort medicines and other shareable items.This study in the Dominican Republic examined how a convenience sample (31 people sorted medicines and rated their shareability in relation to other common household items. We used non-metric multidimensional scaling to produce association maps in which the distances between items offer a visual representation of the collective opinion of the participants regarding the relationships among the items. In addition, from a pile sort constrained by four categories of whether sharing or loaning the item was acceptable (on a scale from not shareable to very shareable, we assessed the degree to which the participants rated the medicines as shareable compared to other items. Participants consistently grouped medicines together in all pile sort activities; yet, medicines were mixed with other items when rated by their candidacy to be shared. Compared to the other items, participants had more variability of opinion as to whether medicines should be shared.People think of medicines as a distinct group, suggesting that interventions might be designed to apply to medicines as a group. People's differing opinions as to whether it was appropriate to share medicines imply a degree of uncertainty or ambiguity that health promotion interventions might exploit to alter attitudes and behaviors. These findings have implications for the design of health promotion interventions to impact medicine sharing behavior.

  11. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2017-01-01

    to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together....... In this sense, moving together, in sports dance, is a practical way of understanding each other. In agreement with Zahavi, our analysis emphasizes the bi-directed nature of sharing. However, at the same time, we contribute to Zahavi’s ongoing endeavour as the special case of sports dance reveals how reciprocity...

  12. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    -governmental organization Train of Hope – labeled as a ‘citizen start-up’ by City of Vienna officials – played an outstanding role in mastering the crisis. In a blog post during his visit in Vienna at the time, and experiencing the refugee crisis first-hand, it was actually Henry Mintzberg who suggested reading...... arguments. Second, we hold that a particular form of organizing facilitates the sharing economy: the sharing economy organization. This particular organizational form is distinctive – at the same time selectively borrowing and skillfully combining features from platform organizations (e.g., use...

  13. Optical properties of the uropygial gland secretion: no evidence for UV cosmetics in birds

    Science.gov (United States)

    Delhey, Kaspar; Peters, Anne; Biedermann, Peter H. W.; Kempenaers, Bart

    2008-10-01

    Ultraviolet (UV) reflectance of the plumage is common in birds and plays an important role in sexual signalling. Recently, it has been proposed that birds are able to modify plumage UV reflectance by the application of uropygial gland secretion. Based on a survey of the optical properties of this secretion from 51 species belonging to 12 avian orders, we show that two main types of uropygial secretions exist, one predominantly found in passerines and one in non-passerines, both reducing relative UV reflectance of a white background (Teflon™ tape). We quantified how each type of secretion (exemplified by blue tit and mallard) affected feather UV reflectance. Both secretions reduced overall brightness and relative UV reflectance of white mallard feathers but hardly affected the reflectance of UV/blue blue tit crown feathers. According to models of avian colour vision, changes in reflectance due to application of the secretion were at or below the discrimination threshold of most birds. We conclude that the uropygial secretion is unlikely to play a major role in modifying plumage UV reflectance. However, the optical properties of the uropygial secretion may have been selected to interfere as little as possible with visual signaling through plumage reflectance.

  14. Fourier-based automatic alignment for improved Visual Cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Chavel, Pierre; Fournel, Thierry

    2011-11-07

    In Visual Cryptography, several images, called "shadow images", that separately contain no information, are overlapped to reveal a shared secret message. We develop a method to digitally register one printed shadow image acquired by a camera with a purely digital shadow image, stored in memory. Using Fourier techniques derived from Fourier Optics concepts, the idea is to enhance and exploit the quasi periodicity of the shadow images, composed by a random distribution of black and white patterns on a periodic sampling grid. The advantage is to speed up the security control or the access time to the message, in particular in the cases of a small pixel size or of large numbers of pixels. Furthermore, the interest of visual cryptography can be increased by embedding the initial message in two shadow images that do not have identical mathematical supports, making manual registration impractical. Experimental results demonstrate the successful operation of the method, including the possibility to directly project the result onto the printed shadow image.

  15. VISUALIZATION OF REGISTERED SUBSURFACE ANATOMY

    DEFF Research Database (Denmark)

    2010-01-01

    A system and method for visualization of subsurface anatomy includes obtaining a first image from a first camera and a second image from a second camera or a second channel of the first camera, where the first and second images contain shared anatomical structures. The second camera and the second...... channel of the first camera are capable of imaging anatomy beneath the surface in ultra-violet, visual, or infra-red spectrum. A data processor is configured for computing registration of the first image to the second image to provide visualization of subsurface anatomy during surgical procedures...

  16. Stimulation of incretin secreting cells.

    Science.gov (United States)

    Pais, Ramona; Gribble, Fiona M; Reimann, Frank

    2016-02-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon like peptide-1 (GLP-1) are secreted from enteroendocrine cells in the gut and regulate physiological and homeostatic functions related to glucose control, metabolism and food intake. This review provides a systematic summary of the molecular mechanisms underlying secretion from incretin cells, and an understanding of how they sense and interact with lumen and vascular factors and the enteric nervous system through transporters and G-protein coupled receptors (GPCRs) present on their surface to ultimately culminate in hormone release. Some of the molecules described below such as sodium coupled glucose transporter 1 (SGLT1), G-protein coupled receptor (GPR) 119 and GPR40 are targets of novel therapeutics designed to enhance endogenous gut hormone release. Synthetic ligands at these receptors aimed at treating obesity and type 2 diabetes are currently under investigation.

  17. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  18. [Insulin secretion: mechanisms of regulation].

    Science.gov (United States)

    Radosavljević, Tatjana; Todorović, Vera; Sikić, Branka

    2004-01-01

    REGULATION OF INSULIN SECRETION: Beta cells are unique endocrine cells. They respond positively, in terms of insulin secretion, not only to changes in the extracellular glucose concentration, but also to activators of the phospholipase C (cholecystokinin or acetylcholine), and to activators of adenylate cyclase (glucagon, glucagon-like peptide-1, or gastric inhibitory polypeptide). Major messengers which mediate glucose action for insulin release are Ca2+, adenosine triphosphate (ATP) and diacylglycerol (DAG). MAJOR PATHWAYS OF INSULIN RELEASE STIMULATION: There are four major pathways involved in stimulation of insulin release. The first pathway is KATP channel-dependent pathway in which increased blood glucose concentrations and increased b-cell metabolism result in a change in intracellular ATP/ADP ratio. This is a contributory factor in closure of ATP-dependent K+ channels, depolarization of b-cell membrane, in increased voltage-dependent L-type Ca2+ channel activity. Increased Ca2+ influx results in increased intracellular Ca2+ and stimulated insulin release. KATP channel-independent pathway augments Ca(2+) -stimulated insulin secretion of KATP channel-dependent pathway. Major potentiation of release results from hormonal and peptidergic activation of receptors linked to adenylyl cyclase. Adenylyl cyclase activity is stimulated by hormones such as vasoactive intestinal peptide (VIP), glucagon-like peptide-1 (GLP-1), and so on. These hormones, acting via G protein, stimulate adenylyl cyclase, thus causing a rise in cyclic adenosine monophosphate (cAMP) and activation of protein kinase A (PKA). Increased activity of PKA results in potentiation of insulin secretion.

  19. Partager ses secrets en public

    OpenAIRE

    Merzeau, Louise

    2013-01-01

    National audience; We can be tempted to interpret the evolution of the Web and especially of social networks as a victory of an ideology of visibility, denying the right to withhold, withdraw and disconnect. Does this dictatorship of transparency, which is threatening even State secrets, means the end opacities, gray areas and moving frontiers between what is shown et whant is hidden ? We want to show that the digital environment is characterized instead by a regime of ambivalent visibility, ...

  20. Shared Care in Diabetes?

    DEFF Research Database (Denmark)

    Bødker, Keld

    2006-01-01

    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  1. A shared vision.

    Science.gov (United States)

    Hogan, Brigid

    2007-12-01

    One of today's most powerful technologies in biomedical research--the creation of mutant mice by gene targeting in embryonic stem (ES) cells--was finally celebrated in this year's Nobel Prize in Medicine. The history of how ES cells were first discovered and genetically manipulated highlights the importance of collaboration among scientists from different backgrounds with a shared vision.

  2. Beyond processor sharing

    NARCIS (Netherlands)

    S. Aalto; U. Ayesta (Urtzi); S.C. Borst (Sem); V. Misra; R. Núñez Queija (Rudesindo (Sindo))

    2007-01-01

    textabstractWhile the (Egalitarian) Processor-Sharing (PS) discipline offers crucial insights in the performance of fair resource allocation mechanisms, it is inherently limited in analyzing and designing differentiated scheduling algorithms such as Weighted Fair Queueing and Weighted Round-Robin.

  3. Too Much Information Sharing?

    DEFF Research Database (Denmark)

    Ganuza, Juan José; Jansen, Jos

    2013-01-01

    parameters gives the following trade-off in Cournot oligopoly. On the one hand, it decreases the expected consumer surplus for a given information precision, as the literature shows. On the other hand, information sharing increases the firms’ incentives to acquire information, and the consumer surplus...

  4. Promoting teachers’ knowledge sharing

    NARCIS (Netherlands)

    Runhaar, P.R.; Sanders, K.

    2016-01-01

    Teachers’ professional development is nowadays seen as key in efforts to improve education. Knowledge sharing is a learning activity with which teachers not only professionalize themselves, but contribute to the professional development of their colleagues as well. This paper presents two studies,

  5. The Sharing Economy

    DEFF Research Database (Denmark)

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti

    2016-01-01

    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected to a...

  6. Decreasing Serial Cost Sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter

    The increasing serial cost sharing rule of Moulin and Shenker [Econometrica 60 (1992) 1009] and the decreasing serial rule of de Frutos [Journal of Economic Theory 79 (1998) 245] have attracted attention due to their intuitive appeal and striking incentive properties. An axiomatic characterization...

  7. Decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter Raahave

    2009-01-01

    The increasing serial cost sharing rule of Moulin and Shenker (Econometrica 60:1009-1037, 1992) and the decreasing serial rule of de Frutos (J Econ Theory 79:245-275, 1998) are known by their intuitive appeal and striking incentive properties. An axiomatic characterization of the increasing serial...

  8. SharedSpaces mingle

    NARCIS (Netherlands)

    Handberg, L.; Gullström, C.; Kort, J.; Nyström, J.

    2016-01-01

    SharedSpaces is a WebRTC design prototype that creates a virtual media space where people can mingle and interact. Although you are in different locations, you appear side by side in front of a chosen backdrop. This interactive installation addresses spatial and social connectedness, stressing the

  9. Sec-mediated secretion by Coxiella burnetii

    Science.gov (United States)

    2013-01-01

    Background Coxiella burnetii is a Gram-negative intracellular bacterial pathogen that replicates within a phagolysosome-like parasitophorous vacuole (PV) of macrophages. PV formation requires delivery of effector proteins directly into the host cell cytoplasm by a type IVB secretion system. However, additional secretion systems are likely responsible for modification of the PV lumen microenvironment that promote pathogen replication. Results To assess the potential of C. burnetii to secrete proteins into the PV, we analyzed the protein content of modified acidified citrate cysteine medium for the presence of C. burnetii proteins following axenic (host cell-free) growth. Mass spectrometry generated a list of 105 C. burnetii proteins that could be secreted. Based on bioinformatic analysis, 55 proteins were selected for further study by expressing them in C. burnetii with a C-terminal 3xFLAG-tag. Secretion of 27 proteins by C. burnetii transformants was confirmed by immunoblotting culture supernatants. Tagged proteins expressed by C. burnetii transformants were also found in the soluble fraction of infected Vero cells, indicating secretion occurs ex vivo. All secreted proteins contained a signal sequence, and deletion of this sequence from selected proteins abolished secretion. These data indicate protein secretion initially requires translocation across the inner-membrane into the periplasm via the activity of the Sec translocase. Conclusions C. burnetii secretes multiple proteins, in vitro and ex vivo, in a Sec-dependent manner. Possible roles for secreted proteins and secretion mechanisms are discussed. PMID:24093460

  10. Transporter-mediated biofuel secretion.

    Science.gov (United States)

    Doshi, Rupak; Nguyen, Tuan; Chang, Geoffrey

    2013-05-07

    Engineering microorganisms to produce biofuels is currently among the most promising strategies in renewable energy. However, harvesting these organisms for extracting biofuels is energy- and cost-intensive, limiting the commercial feasibility of large-scale production. Here, we demonstrate the use of a class of transport proteins of pharmacological interest to circumvent the need to harvest biomass during biofuel production. We show that membrane-embedded transporters, better known to efflux lipids and drugs, can be used to mediate the secretion of intracellularly synthesized model isoprenoid biofuel compounds to the extracellular milieu. Transporter-mediated biofuel secretion sustainably maintained an approximate three- to fivefold boost in biofuel production in our Escherichia coli test system. Because the transporters used in this study belong to the ubiquitous ATP-binding cassette protein family, we propose their use as "plug-and-play" biofuel-secreting systems in a variety of bacteria, cyanobacteria, diatoms, yeast, and algae used for biofuel production. This investigation showcases the potential of expressing desired membrane transport proteins in cell factories to achieve the export or import of substances of economic, environmental, or therapeutic importance.

  11. Visual Sedimentation

    OpenAIRE

    Huron, Samuel; Vuillemot, Romain; Fekete, Jean-Daniel

    2013-01-01

    International audience; We introduce Visual Sedimentation, a novel design metaphor for visualizing data streams directly inspired by the physical process of sedimentation. Visualizing data streams (e. g., Tweets, RSS, Emails) is challenging as incoming data arrive at unpredictable rates and have to remain readable. For data streams, clearly expressing chronological order while avoiding clutter, and keeping aging data visible, are important. The metaphor is drawn from the real-world sedimentat...

  12. Methods of Shared Key Agreement in Coherent Multiplexing

    Science.gov (United States)

    Kim, Ajung

    A method of shared secret key distribution applicable to optical coherent multiplexing systems is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested, and performance evaluation is performed in terms of mutual information between legitimate users and an eavesdropper. This scheme devises a new way of attaining secure optical communications without entirely relying on computational complexity.

  13. Visualization Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Evaluates and improves the operational effectiveness of existing and emerging electronic warfare systems. By analyzing and visualizing simulation results...

  14. QUANTITATIVE STUDIES OF PROSTATIC SECRETION

    Science.gov (United States)

    Huggins, Charles; Clark, Philip Johnson

    1940-01-01

    Cystic hyperplasia of the prostate occurs spontaneously in senile dogs only when they possess physiologically effective amounts of androgenic hormone. The cysts are closely grouped and radially arranged in a conical manner with the base of the cone at the periphery of the gland. Flattened and columnar epithelium, varying from about 5 to 25µ are seen in each cyst. The cysts communicate with the urethra by way of ducts. Both normal and cystic prostates undergo marked atrophy when the testes are removed, the chief difference 3 months after orchiectomy being the persistence of slightly dilated clefts and spaces at the site of the former cysts in the senile state. In the castrate dog whose prostate gland is being reconstructed as result of the influence of daily injections of androgen, certain doses of estrogen prevent increase of secretion and still larger doses greatly depress the output of the gland. In dogs so treated by daily injections of testosterone propionate, 10 mg., the amount of secretion is maintained from day to day at a level by daily injections of stilbestrol, 0.4 to 0.6 mg. and greatly depressed by doses of 1 to 1.5 mg. When the larger amounts of estrogen are used, together with androgen, squamous metaplasia occurs in the posterior lobe of the prostate while the epithelium of the acini decreases in height to cuboidal or low columnar form; these histological signs of activity of both androgen and estrogen on the prostate show that inhibition of the male hormone by stilbestrol is incomplete at these ratios. In dogs with either normal or cystic prostate glands, the prostate decreases in size when estrogen is injected in amounts to depress prostatic secretion profoundly. The gland is maintained in an atrophic state and overdosage avoided by controlled periodic injections of stilbestrol until secretion is reduced to the minimum, followed by free intervals, the estrogen being again administered when secretion measurably increases. The shrinkage is related to

  15. Distributed Programming with Shared Data

    NARCIS (Netherlands)

    Bal, H.E.; Tanenbaum, A.S.

    1988-01-01

    Operating system primitives (e.g., problem-oriented shared memory, shared virtual memory, the Agora shared memory) and languages (e.g., Concurrent Prolog, Linda, Emerald) for programming distributed systems have been proposed that support the shared-variable paradigm without the presence of physical

  16. Shared age-related influences on cognitive and noncognitive variables.

    Science.gov (United States)

    Salthouse, T A; Hambrick, D Z; McGuthry, K E

    1998-09-01

    Analyses of new data and of previously published data were conducted to examine the degree to which age-related variance was shared across cognitive and noncognitive variables and to investigate possible alterations in the composition of a factor common to all variables as a function of age. The results indicated that measures of visual acuity, grip strength, and blood pressure shared age-related variance with measures of perceptual speed, episodic memory, spatial visualization, and inductive reasoning. However, although the cognitive variables shared similar amounts of variance in age-restricted and age-partialed analyses, the variance shared between cognitive and noncognitive variables was substantially reduced after controlling the influence of age.

  17. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  18. Risk Sharing under Incentive Constraints.

    OpenAIRE

    Wagner, W.B.

    2002-01-01

    In addressing the matter, this thesis covers issues such as the welfare gains from international risk sharing, the impact of international risk sharing on national economic policies and production efficiency, the welfare effects of international risk sharing in the presence of tax competition, and risk sharing among entrepreneurs that face financing constraints. The thesis outlines the implications of incentive constraints for the efficiency of the actual extent and pattern of risk sharing am...

  19. Incretin hormone secretion over the day

    DEFF Research Database (Denmark)

    Ahren, B; Carr, RD; Deacon, Carolyn F.

    2010-01-01

    . Regulation of incretin hormone secretion is less well characterized. The main stimulus for incretin hormone secretion is presence of nutrients in the intestinal lumen, and carbohydrate, fat as well as protein all have the capacity to stimulate GIP and GLP-1 secretion. More recently, it has been established...... that a diurnal regulation exists with incretin hormone secretion to an identical meal being greater when the meal is served in the morning compared to in the afternoon. Finally, whether incretin hormone secretion is altered in disease states is an area with, so far, controversial results in different studies......, although some studies have demonstrated reduced incretin hormone secretion in type 2 diabetes. This review summarizes our knowledge on regulation of incretin hormone secretion and its potential changes in disease states....

  20. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together....... In this sense, moving together, in sports dance, is a practical way of understanding each other. In agreement with Zahavi, our analysis emphasizes the bi-directed nature of sharing. However, at the same time, we contribute to Zahavi’s ongoing endeavour as the special case of sports dance reveals how reciprocity...... can be deliberately shaped through the mutual coordination and affective bound dynamics of movement. Our article thus both pursues the methodological point that qualitative research of expert competences can constructively enrich phenomenological analysis and indicates how movement can be fundamental...

  1. Towards A Shared Mission

    DEFF Research Database (Denmark)

    Staunstrup, Jørgen; Orth Gaarn-Larsen, Carsten

    in the context of universities. Although the economic aspects of value are important and cannot be ignored, we argue for a much richer interpretation of value that captures the many and varied results from universities. A shared mission is a prerequisite for university management and leadership. It makes......A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome...... of the universities. The sad result is that the dialog about university development, resources, leadership, governance etc. too often ends up in rather fruitless discussions and sometimes even mutual suspicion. This paper argues for having a dialog involving both internal and external stakeholders agreeing...

  2. "In search of a tale they can live with": about loss, family secrets, and selective disclosure.

    Science.gov (United States)

    Rober, Peter; Walravens, Geertje; Versteynen, Leen

    2012-07-01

    Several authors have written about family secrets in the family therapy literature in interesting ways. According to these authors, the questions "who knows the secret?" and "who does not know the secret?" are central. In the present study, we have qualitatively analyzed the documentary film Familiegeheim (Family Secret) by the Dutch director Jaap van Hoewijk. The film shows van Hoewijk's investigation into the death of his father in 1974 and tells the story of a family in which the suicide of the father is kept secret from the three children. Our analysis of the film highlights the complex ways in which families deal with sensitive issues like loss, grief, and suicide. The concept of family secrets seems to poorly capture this complexity, focusing one-sidedly on the destructive effects of withholding delicate information. The concept of selective disclosure is proposed as an alternative. Selective disclosure refers to the complex processes involved in dealing with the dialectic tension between sharing information and keeping it secret. The concept is not only focused on the destructiveness of secrecy but, in addition, also makes room for an appreciation of the caution with which family members deal with sensitive family issues. © 2011 American Association for Marriage and Family Therapy.

  3. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.

    2018-01-12

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  4. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    In 'Joint Action and Development', Stephen Butterfill argues that if several agents' actions are driven by what he calls a "shared goal" -- a certain pattern of goal-relations and expectations -- then these actions constitute a joint action. This kind of joint action is sufficiently cognitively...... a counterexample, I show that the pattern of goal-relations and expectations specified by Butterfill cannot play this role. I then provide an appropriately conceptually and cognitively undemanding amendment with which the account can be saved....

  5. Sharing data increases citations

    DEFF Research Database (Denmark)

    Drachen, Thea Marie; Ellegaard, Ole; Larsen, Asger Væring

    2016-01-01

    This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...... by bibliographical links, and consists of papers receiving on average significantly more citations per paper per year, than do papers not associated with links to data....

  6. Shared Health Governance

    Science.gov (United States)

    Ruger, Jennifer Prah

    2014-01-01

    Health and Social Justice (Ruger 2009a) developed the “health capability paradigm,” a conception of justice and health in domestic societies. This idea undergirds an alternative framework of social cooperation called “shared health governance” (SHG). SHG puts forth a set of moral responsibilities, motivational aspirations, and institutional arrangements, and apportions roles for implementation in striving for health justice. This article develops further the SHG framework and explains its importance and implications for governing health domestically. PMID:21745082

  7. Visual search

    NARCIS (Netherlands)

    Toet, A.; Bijl, P.

    2003-01-01

    Visual search, with or without the aid of optical or electro-optical instruments, plays a significant role in various types of military and civilian operations (e.g., reconnaissance, surveillance, and search and rescue). Advance knowledge of human visual search and target acquisition performance is

  8. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  9. Bonobos share with strangers.

    Science.gov (United States)

    Tan, Jingzhi; Hare, Brian

    2013-01-01

    Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  10. Sharing resources@CERN

    CERN Multimedia

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Until now many people were unaware that copies of the same book (or standard, or journal) are often held not only by the library but by different divisions. (Here Eduardo Aldaz, from the PS division, and Isabel Bejar, from the ST division, read their divisional copies of the same book.) The idea behind the library's new sharing resources@CERN' initiative is not at all to collect the books in individual collections at the CERN library, but simply to register them in the Library database. Those not belonging to the library will in principle be unavailable for loan, but should be able to be consulted by anybody at CERN who is interested. "When you need a book urgently and it is not available in the library,' said PS Division engineer Eduardo Aldaz Carroll, it is a sham...

  11. Bonobos share with strangers.

    Directory of Open Access Journals (Sweden)

    Jingzhi Tan

    Full Text Available Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  12. Visual Education

    DEFF Research Database (Denmark)

    Buhl, Mie; Flensborg, Ingelise

    2010-01-01

    The intrinsic breadth of various types of images creates new possibilities and challenges for visual education. The digital media have moved the boundaries between images and other kinds of modalities (e.g. writing, speech and sound) and have augmented the possibilities for integrating the functi......The intrinsic breadth of various types of images creates new possibilities and challenges for visual education. The digital media have moved the boundaries between images and other kinds of modalities (e.g. writing, speech and sound) and have augmented the possibilities for integrating...... to emerge in the interlocutory space of a global visual repertoire and diverse local interpretations. The two perspectives represent challenges for future visual education which require visual competences, not only within the arts but also within the subjects of natural sciences, social sciences, languages...

  13. Distributed terascale volume visualization using distributed shared virtual memory

    KAUST Repository

    Beyer, Johanna

    2011-10-01

    Table 1 illustrates the impact of different distribution unit sizes, different screen resolutions, and numbers of GPU nodes. We use two and four GPUs (NVIDIA Quadro 5000 with 2.5 GB memory) and a mouse cortex EM dataset (see Figure 2) of resolution 21,494 x 25,790 x 1,850 = 955GB. The size of the virtual distribution units significantly influences the data distribution between nodes. Small distribution units result in a high depth complexity for compositing. Large distribution units lead to a low utilization of GPUs, because in the worst case only a single distribution unit will be in view, which is rendered by only a single node. The choice of an optimal distribution unit size depends on three major factors: the output screen resolution, the block cache size on each node, and the number of nodes. Currently, we are working on optimizing the compositing step and network communication between nodes. © 2011 IEEE.

  14. Creating shared mental models: The support of visual language

    NARCIS (Netherlands)

    Landman, Renske B.; van den Broek, Egon; Gieskes, J.F.B.; Luo, Yuhua

    Cooperative design involves multiple stakeholders that often hold different ideas of the problem, the ways to solve it, and to its solutions (i.e., mental models; MM). These differences can result in miscommunication, misunderstanding, slower decision making processes, and less chance on cooperative

  15. The Dynamics of Reference and Shared Visual Attention

    Directory of Open Access Journals (Sweden)

    Rick eDale

    2011-11-01

    Full Text Available In the tangram task, two participants are presented with the same set of abstract shapes portrayed in different orders. One participant must instruct the other to arrange their shapes so that the orders match. To do this, they must find a way to refer to the abstract shapes. In the current experiment, the eye movements of pairs of participants were tracked while they were engaged in a computerized version of the task. Results revealed the canonical tangram effect: participants became faster at completing the task from round 1 to round 3. Also, their eye-movements synchronized over time. Cross-recurrence analysis was used to quantify this coordination, and showed that as participants’ words coalesced, their actions approximated a single coordinated system.

  16. Weegee’s City Secrets

    Directory of Open Access Journals (Sweden)

    Alan TRACHTENBERG

    2010-03-01

    Full Text Available En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles et convaincantes révélant la relation entre la lumière et l’obscurité, et plus particulièrement la manière dont la lumière du flash permet de rendre visible l’obscurité. Dans le récit de Weegee, le flash confère à la photographie le pouvoir d’écrire — d’écrire avec la lumière, un mode de représentation singulièrement approprié pour enregistrer des instants de vie dans les rues nocturnes de la ville.As a freelance photographer of crime, accidents, fires, and also of the recreational life of the city—scenes of violence and of pleasure—Weegee worked mainly at night and employed a powerful photoflash attachment to his press camera. His "secrets of shooting with photoflash" consist of practical technical advice for beginners. But within the rhetoric of his "secrets" there lie cogent and subtle reflections on the relation of light to darkness, especially on the way the flash of light makes darkness visible. In Weegee’s account, the photoflash gives photography the power of writing—writing with light, a mode of picturing uniquely suited to recording instants of life on city streets at night.

  17. Britain's nuclear secrets: inside Sellafield

    Science.gov (United States)

    Marino, Antigone

    2017-11-01

    Lying on the remote north west coast of England, Sellafield is one of the most secret places in UK, and even one of the most controversial nuclear fuel reprocessing and nuclear decommissioning sites in Britain. The film director Tim Usborne let us enter into the world's first nuclear power station, revealing Britain's attempts to harness the almost limitless power of the atom. It is precisely the simplicity and the scientific rigor used in the film to speak of nuclear, which led this documentary to win the Physics Prize supported by the European Physical Society at the European Science TV and New Media Festival and Awards 2016.

  18. The Cracked Share

    Directory of Open Access Journals (Sweden)

    2012-04-01

    Full Text Available Celebrated turntablist/noise/improvisationalist Chulki Hong (홍철기 and experimental filmmaker Hangjun Lee (李幸俊 are frequent collaborators. As they explain in their essay accompanying the following recordings, their practices are intimately concerned with the materiality of their media. In this materialist turn their interventions seek to emancipate the spectator from their subordination to the audio-visual experience as representation.

  19. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece......Report from the EU H2020 Research Project Ps2Share:Participation, Privacy, and Power in the Sharing Economy. This paper gives an in-depth overview of the topic of power in the sharing economy. It forms one part of a European Union Horizon 2020 Research Project on the sharing economy: "Ps2Share...... Participation, Privacy, and Power in the Sharing Economy". We aim to foster better awareness of the consequences which the sharing economy has on the way people behave, think, interact, and socialize across Europe. Our overarching objective is to identify key challenges of the sharing economy and improve Europe...

  20. Central Interleukin-1β Suppresses the Nocturnal Secretion of Melatonin

    Directory of Open Access Journals (Sweden)

    A. P. Herman

    2016-01-01

    Full Text Available In vertebrates, numerous processes occur in a rhythmic manner. The hormonal signal reliably reflecting the environmental light conditions is melatonin. Nocturnal melatonin secretion patterns could be disturbed in pathophysiological states, including inflammation, Alzheimer’s disease, and depression. All of these states share common elements in their aetiology, including the overexpression of interleukin- (IL- 1β in the central nervous system. Therefore, the present study was designed to determine the effect of the central injection of exogenous IL-1β on melatonin release and on the expression of the enzymes of the melatonin biosynthetic pathway in the pineal gland of ewe. It was found that intracerebroventricular injections of IL-1β (50 µg/animal suppressed (P<0.05 nocturnal melatonin secretion in sheep regardless of the photoperiod. This may have resulted from decreased (P<0.05 synthesis of the melatonin intermediate serotonin, which may have resulted, at least partially, from a reduced expression of tryptophan hydroxylase. IL-1β also inhibited (P<0.05 the expression of the melatonin rhythm enzyme arylalkylamine-N-acetyltransferase and hydroxyindole-O-methyltransferase. However, the ability of IL-1β to affect the expression of these enzymes was dependent upon the photoperiod. Our study may shed new light on the role of central IL-1β in the aetiology of disruptions in melatonin secretion.

  1. Central Interleukin-1β Suppresses the Nocturnal Secretion of Melatonin

    Science.gov (United States)

    Herman, A. P.; Bochenek, J.; Król, K.; Krawczyńska, A.; Antushevich, H.; Pawlina, B.; Herman, A.; Romanowicz, K.; Tomaszewska-Zaremba, D.

    2016-01-01

    In vertebrates, numerous processes occur in a rhythmic manner. The hormonal signal reliably reflecting the environmental light conditions is melatonin. Nocturnal melatonin secretion patterns could be disturbed in pathophysiological states, including inflammation, Alzheimer's disease, and depression. All of these states share common elements in their aetiology, including the overexpression of interleukin- (IL-) 1β in the central nervous system. Therefore, the present study was designed to determine the effect of the central injection of exogenous IL-1β on melatonin release and on the expression of the enzymes of the melatonin biosynthetic pathway in the pineal gland of ewe. It was found that intracerebroventricular injections of IL-1β (50 µg/animal) suppressed (P < 0.05) nocturnal melatonin secretion in sheep regardless of the photoperiod. This may have resulted from decreased (P < 0.05) synthesis of the melatonin intermediate serotonin, which may have resulted, at least partially, from a reduced expression of tryptophan hydroxylase. IL-1β also inhibited (P < 0.05) the expression of the melatonin rhythm enzyme arylalkylamine-N-acetyltransferase and hydroxyindole-O-methyltransferase. However, the ability of IL-1β to affect the expression of these enzymes was dependent upon the photoperiod. Our study may shed new light on the role of central IL-1β in the aetiology of disruptions in melatonin secretion. PMID:27212805

  2. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  3. Visual cognition.

    Science.gov (United States)

    Cavanagh, Patrick

    2011-07-01

    Visual cognition, high-level vision, mid-level vision and top-down processing all refer to decision-based scene analyses that combine prior knowledge with retinal input to generate representations. The label "visual cognition" is little used at present, but research and experiments on mid- and high-level, inference-based vision have flourished, becoming in the 21st century a significant, if often understated part, of current vision research. How does visual cognition work? What are its moving parts? This paper reviews the origins and architecture of visual cognition and briefly describes some work in the areas of routines, attention, surfaces, objects, and events (motion, causality, and agency). Most vision scientists avoid being too explicit when presenting concepts about visual cognition, having learned that explicit models invite easy criticism. What we see in the literature is ample evidence for visual cognition, but few or only cautious attempts to detail how it might work. This is the great unfinished business of vision research: at some point we will be done with characterizing how the visual system measures the world and we will have to return to the question of how vision constructs models of objects, surfaces, scenes, and events. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Shared control in bilateral telerobotic systems

    Science.gov (United States)

    Bicker, Robert; Ow, Sing M.

    1995-12-01

    The paper describes the implementation of shared control in a force reflecting telerobotic system which has been carried out during the EC TELEMAN project INGRID. The experimental facility which has been developed at Newcastle comprises a Puma 762 robot which can be manually teleoperated by a Puma 260 robot, functioning as a generalized bilateral (or force reflecting) controller. The slave robot has been configured to support several autonomous force controlled tasks, which have been developed specifically for repair and maintenance operations in nuclear and/or other hazardous environments. The control architecture is based on a network of parallel processors, and the man-machine interface provides `soft-switching' of any axis to facilitate mixed mode and shared control which can be configured in both teleoperator and task based modes. A graphic display is also included to provide a visual indication of the magnitude of forces/torques exerted at the tool/environment interface.

  5. Classification of cognitive systems dedicated to data sharing

    Science.gov (United States)

    Ogiela, Lidia; Ogiela, Marek R.

    2017-08-01

    In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and cryptographic threshold schemes will be used to improve processes of secure and efficient information management with application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information management and encryption will be also described.

  6. Visual cognition

    OpenAIRE

    Cavanagh, Patrick

    2011-01-01

    Visual cognition, high-level vision, mid-level vision and top-down processing all refer to decision-based scene analyses that combine prior knowledge with retinal input to generate representations. The label “visual cognition” is little used at present, but research and experiments on mid- and high-level, inference-based vision have flourished, becoming in the 21st century a significant, if often understated part, of current vision research. How does visual cognition work? What are its moving...

  7. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  8. Risk Sharing and Layoff Risk in Profit Sharing

    OpenAIRE

    Fabella, Raul V.

    1995-01-01

    We show that if the employer is risk averse, however slightly, there is always a profit sharing contract that will Pareto-dominate the spot wage contract in the sense of pure risk sharing. The smaller is the employer risk aversion, the narrower is the room for profit sharing. The higher the workers value employment stability (less layoff risk), the more Pareto attractive is profit sharing regardless of employer risk aversion.

  9. Shared care and boundaries:

    DEFF Research Database (Denmark)

    Winthereik, Brit Ross

    2008-01-01

    between home and clinic, which the project identifies as problematic and seeks to transgress. Research limitations/implications – The pilot project, which is used as a case, is terminated prematurely. However, this does not affect the fact that more attention should be paid to the specific redistribution......Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science...

  10. Can power be shared?

    Science.gov (United States)

    Ten Pas, William S

    2013-01-01

    Dental insurance began with a partnership between dental service organizations and state dental associations with a view toward expanding the number of Americans receiving oral health care and as a means for permitting firms and other organizations to offer employee benefits. The goals have been achieved, but the alliance between dentistry and insurance has become strained. A lack of dialogue has fostered mutual misconceptions, some of which are reviewed in this paper. It is possible that the public, the profession, and the dental insurance industry can all be strengthened, but only through power-sharing around the original common objective.

  11. Shared Oral Care

    DEFF Research Database (Denmark)

    Hede, Børge; Elmelund Poulsen,, Johan; Christophersen, Rasmus

    2014-01-01

    Shared Oral Care - Forebyggelse af orale sygdomme på plejecentre Introduktion og formål: Mangelfuld mundhygiejne hos plejekrævende ældre er et alment og veldokumenteret sundhedsproblem, der kan føre til massiv udvikling af tandsygdomme, og som yderligere kan være medvirkende årsag til alvorlige...... ressourceanvendelse er muligt at skabe en betydeligt forbedret mundhygiejne hos plejekrævende ældre Key words: Geriatric dentistry, nursing home, community health services, prevention, situated learning...

  12. Microsociology of Secrecy in The Secret Life of Words, or Isabel Coixet reads José Luis Pardo

    Directory of Open Access Journals (Sweden)

    Francisco Javier Gallego Dueñas

    2013-07-01

    Full Text Available Sociology of Secrecy points out the ability of secrets to join people regardless the word originally means “separation”. Mostly, secrets are shown as destructive faults we should confess. “The Secret Life of Words” (2005 by Isabel Coixet is a movie which depicts how secrets are shared as intimacy, building a bubble made of words. In fact this is the specific sense of intimacy according to José Luis Pardo. It is not loneliness or isolation, is not the duty of expliciting inner information about us. Intimacy is not the denotative meaning of the words, but their connotation, what words “smuggle” between two people: the secret life of words. Finally, keeping in mind the strong implication of secrecy in Social Space-Time, we will try to outline several useful analysis elements through this film.

  13. Visual Confidence.

    Science.gov (United States)

    Mamassian, Pascal

    2016-10-14

    Visual confidence refers to an observer's ability to judge the accuracy of her perceptual decisions. Even though confidence judgments have been recorded since the early days of psychophysics, only recently have they been recognized as essential for a deeper understanding of visual perception. The reluctance to study visual confidence may have come in part from obtaining convincing experimental evidence in favor of metacognitive abilities rather than just perceptual sensitivity. Some effort has thus been dedicated to offer different experimental paradigms to study visual confidence in humans and nonhuman animals. To understand the origins of confidence judgments, investigators have developed two competing frameworks. The approach based on signal decision theory is popular but fails to account for response times. In contrast, the approach based on accumulation of evidence models naturally includes the dynamics of perceptual decisions. These models can explain a range of results, including the apparently paradoxical dissociation between performance and confidence that is sometimes observed.

  14. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This book consists of essays covering issues in visual cognition presenting experimental techniques from cognitive psychology, methods of modeling cognitive processes on computers from artificial intelligence, and methods of studying brain organization from neuropsychology. Topics considered include: parts of recognition; visual routines; upward direction; mental rotation, and discrimination of left and right turns in maps; individual differences in mental imagery, computational analysis and the neurological basis of mental imagery: componental analysis.

  15. Shared consultant physician posts.

    LENUS (Irish Health Repository)

    Cooke, J

    2012-01-31

    Our aim was to assess the acceptability and cost-efficiency of shared consultancy posts. Two consultant physicians worked alternate fortnights for a period of twelve months. Questionnaires were distributed to general practitioners, nurses, consultants and junior doctors affected by the arrangement. Patients or their next of kin were contacted by telephone. 1\\/17 of consultants described the experience as negative. 14\\/19 junior doctors reported a positive experience. 11 felt that training had been improved while 2 felt that it had been adversely affected. 17\\/17 GPs were satisfied with the arrangement. 1\\/86 nurses surveyed reported a negative experience. 1\\/48 patients were unhappy with the arrangement. An extra 2.2 (p<0.001) patients were seen per clinic. Length of stay was shortened by 2.49 days (p<0.001). A saving of 69,212 was made due to decreased locum requirements. We present data suggesting structured shared consultancy posts can be broadly acceptable and cost efficient in Ireland.

  16. Reconceptualising Shared Services

    Directory of Open Access Journals (Sweden)

    Peter McKinlay

    2011-12-01

    Full Text Available Endeavours to improve the efficiency and effectiveness of local government have been a persistent theme both of politicians in higher tiers of government and of interest groups, especially business. The two contenders for improvement which receive most coverage both in the research literature and in popular discussion are amalgamation and shared services. Arguments from the literature have generally favoured shared services over amalgamation. Bish (2001 in a comprehensive review of North American research dismisses the argument for amalgamation as a product of flawed nineteenth-century thinking and a bureaucratic urge for centralized control. He does so making the very reasonable point that the presumed economies of scale which will result from amalgamation are a function not of the size and scale of individual local authorities, but of the services for which those local authorities are responsible, and the point at which economies of scale will be optimised will be very different for different services. The case against amalgamation is also reinforced by the absence of any significant post-facto evidence that amalgamation achieves either the promised savings or the anticipated efficiency gains (McKinlay 2006.

  17. Vaccines, our shared responsibility.

    Science.gov (United States)

    Pagliusi, Sonia; Jain, Rishabh; Suri, Rajinder Kumar

    2015-05-05

    The Developing Countries Vaccine Manufacturers' Network (DCVMN) held its fifteenth annual meeting from October 27-29, 2014, New Delhi, India. The DCVMN, together with the co-organizing institution Panacea Biotec, welcomed over 240 delegates representing high-profile governmental and nongovernmental global health organizations from 36 countries. Over the three-day meeting, attendees exchanged information about their efforts to achieve their shared goal of preventing death and disability from known and emerging infectious diseases. Special praise was extended to all stakeholders involved in the success of polio eradication in South East Asia and highlighted challenges in vaccine supply for measles-rubella immunization over the coming decades. Innovative vaccines and vaccine delivery technologies indicated creative solutions for achieving global immunization goals. Discussions were focused on three major themes including regulatory challenges for developing countries that may be overcome with better communication; global collaborations and partnerships for leveraging investments and enable uninterrupted supply of affordable and suitable vaccines; and leading innovation in vaccines difficult to develop, such as dengue, Chikungunya, typhoid-conjugated and EV71, and needle-free technologies that may speed up vaccine delivery. Moving further into the Decade of Vaccines, participants renewed their commitment to shared responsibility toward a world free of vaccine-preventable diseases. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. Knowledge sharing in horizontal networks

    National Research Council Canada - National Science Library

    Juliano Nunes Alves; Breno Augusto Diniz Pereira; Augusto Diniz

    2012-01-01

      The present study aimed to identify the process of sharing knowledge between the partners involved in the network, as well as the dimensions on sharing of knowledge between enterprises belonging...

  19. Secreted Reporters for Monitoring Multiple Promoter Function.

    Science.gov (United States)

    Lashgari, Ghazal; Kantar, Rami S; Tannous, Bakhos A

    2017-01-01

    Secreted reporter proteins are reliable modalities for monitoring of different biological processes, which can be measured longitudinally in conditioned medium of cultured cells or body fluids such as blood and urine, ex vivo. In this chapter, we will explore established secreted reporters and their applications and limitations for monitoring of promoter function. We will also describe both cell-based and blood-based assays for detecting three commonly used reporters: secreted alkaline phosphatase (SEAP ), Gaussia luciferase (Gluc), and Vargula luciferase (Vluc).

  20. Secreted HSP Vaccine for Malaria Prophylaxis

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-13-2-0098 TITLE: Secreted HSP Vaccine for Malaria Prophylaxis PRINCIPAL INVESTIGATOR: Natasa Strbo CONTRACTING...1. REPORT DATE October 2017 2. REPORT TYPE Annual 3. DATES COVERED 09/30/16-09/29/17 4. TITLE AND SUBTITLE Secreted HSP Vaccine for Malaria ...thereby stimulating an avid, antigen specific, cytotoxic CD8 T cell response. Here we developed malaria vaccine that relies on secreted gp96-Ig

  1. Shared Services Management: Critical Factors

    OpenAIRE

    Shouhong Wang; Hai Wang

    2015-01-01

    The cloud computing technology has accelerated shared services in the government and private sectors. This paper proposes a research framework of critical success factors of shared services in the aspects of strategy identification, collaborative partnership networking, optimal shared services process re-designing, and new policies and regulations. A survey has been employed to test the hypotheses. The test results indicate that clear vision of strategies of shared services, long term busines...

  2. Risk Management Collaboration through Sharing Interactive Graphics

    Science.gov (United States)

    Slingsby, Aidan; Dykes, Jason; Wood, Jo; Foote, Matthew

    2010-05-01

    Risk management involves the cooperation of scientists, underwriters and actuaries all of whom analyse data to support decision-making. Results are often disseminated through static documents with graphics that convey the message the analyst wishes to communicate. Interactive graphics are increasingly popular means of communicating the results of data analyses because they enable other parties to explore and visually analyse some of the data themselves prior to and during discussion. Discussion around interactive graphics can occur synchronously in face-to-face meetings or with video-conferencing and screen sharing or they can occur asynchronously through web-sites such as ManyEyes, web-based fora, blogs, wikis and email. A limitation of approaches that do not involve screen sharing is the difficulty in sharing the results of insights from interacting with the graphic. Static images accompanied can be shared but these themselves cannot be interacted, producing a discussion bottleneck (Baker, 2008). We address this limitation by allowing the state and configuration of graphics to be shared (rather than static images) so that a user can reproduce someone else's graphic, interact with it and then share the results of this accompanied with some commentary. HiVE (Slingsby et al, 2009) is a compact and intuitive text-based language that has been designed for this purpose. We will describe the vizTweets project (a 9-month project funded by JISC) in which we are applying these principles to insurance risk management in the context of the Willis Research Network, the world's largest collaboration between the insurance industry and the academia). The project aims to extend HiVE to meet the needs of the sector, design, implement free-available web services and tools and to provide case studies. We will present a case study that demonstrate the potential of this approach for collaboration within the Willis Research Network. Baker, D. Towards Transparency in Visualisation Based

  3. Fractions: How to Fair Share

    Science.gov (United States)

    Wilson, P. Holt; Edgington, Cynthia P.; Nguyen, Kenny H.; Pescosolido, Ryan S.; Confrey, Jere

    2011-01-01

    Children learn from a very early age what it means to get their "fair share." Whether it is candy or birthday cake, many children successfully create equal-size groups or parts of a collection or whole but later struggle to create fair shares of multiple wholes, such as fairly sharing four pies among a family of seven. Recent research suggests…

  4. Risk sharing and public transfers

    OpenAIRE

    Dercon, Stefan; Krishnan, Pramila

    2002-01-01

    We use public transfers in the form of food aid to test for the presence of risk sharing arrangements at the village level in rural Ethiopia. We reject perfect risk-sharing, but find evidence of partial risk-sharing via transfers. There is also evidence consistent with crowding out of informal insurance linked to food aid programmes. – risk ; public transfers ; informal insurance

  5. Let's share a story : socially enhanced multimedia storytelling

    NARCIS (Netherlands)

    Mu, M.; Simpson, S.; Race, N.; Niamut, O.A.; Koot, G.; Kaptein, A.M.; Taal, J.; Mori, L.

    2015-01-01

    An online multimedia storytelling ecosystem comprised of user applications, a collaborative storyauthoring engine, social context integration, and socially aware media services offers a mdium for inormation sharing and social storytelling about live events. User-generated audio-visual content is

  6. Visualizing water

    Science.gov (United States)

    Baart, F.; van Gils, A.; Hagenaars, G.; Donchyts, G.; Eisemann, E.; van Velzen, J. W.

    2016-12-01

    A compelling visualization is captivating, beautiful and narrative. Here we show how melding the skills of computer graphics, art, statistics, and environmental modeling can be used to generate innovative, attractive and very informative visualizations. We focus on the topic of visualizing forecasts and measurements of water (water level, waves, currents, density, and salinity). For the field of computer graphics and arts, water is an important topic because it occurs in many natural scenes. For environmental modeling and statistics, water is an important topic because the water is essential for transport, a healthy environment, fruitful agriculture, and a safe environment.The different disciplines take different approaches to visualizing water. In computer graphics, one focusses on creating water as realistic looking as possible. The focus on realistic perception (versus the focus on the physical balance pursued by environmental scientists) resulted in fascinating renderings, as seen in recent games and movies. Visualization techniques for statistical results have benefited from the advancement in design and journalism, resulting in enthralling infographics. The field of environmental modeling has absorbed advances in contemporary cartography as seen in the latest interactive data-driven maps. We systematically review the design emerging types of water visualizations. The examples that we analyze range from dynamically animated forecasts, interactive paintings, infographics, modern cartography to web-based photorealistic rendering. By characterizing the intended audience, the design choices, the scales (e.g. time, space), and the explorability we provide a set of guidelines and genres. The unique contributions of the different fields show how the innovations in the current state of the art of water visualization have benefited from inter-disciplinary collaborations.

  7. Shared consultant physician posts.

    Science.gov (United States)

    Cooke, J; Molefe, C; Carew, S; Finucane, P; Clinch, D

    2009-01-01

    Our aim was to assess the acceptability and cost-efficiency of shared consultancy posts. Two consultant physicians worked alternate fortnights for a period of twelve months. Questionnaires were distributed to general practitioners, nurses, consultants and junior doctors affected by the arrangement. Patients or their next of kin were contacted by telephone. 1/17 of consultants described the experience as negative. 14/19 junior doctors reported a positive experience. 11 felt that training had been improved while 2 felt that it had been adversely affected. 17/17 GPs were satisfied with the arrangement. 1/86 nurses surveyed reported a negative experience. 1/48 patients were unhappy with the arrangement. An extra 2.2 (pposts can be broadly acceptable and cost efficient in Ireland.

  8. SHARED TECHNOLOGY TRANSFER PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, JOHN M. HAUT, RICHARD C.

    2008-03-07

    The program established a collaborative process with domestic industries for the purpose of sharing Navy-developed technology. Private sector businesses were educated so as to increase their awareness of the vast amount of technologies that are available, with an initial focus on technology applications that are related to the Hydrogen, Fuel Cells and Infrastructure Technologies (Hydrogen) Program of the U.S. Department of Energy. Specifically, the project worked to increase industry awareness of the vast technology resources available to them that have been developed with taxpayer funding. NAVSEA-Carderock and the Houston Advanced Research Center teamed with Nicholls State University to catalog NAVSEA-Carderock unclassified technologies, rated the level of readiness of the technologies and established a web based catalog of the technologies. In particular, the catalog contains technology descriptions, including testing summaries and overviews of related presentations.

  9. Borrowing brainpower - sharing insecurities

    DEFF Research Database (Denmark)

    Wegener, Charlotte; Meier, Ninna; Ingerslev, Karen

    2016-01-01

    Academic writing is a vital, yet complex skill that must be developed within a doctoral training process. In addition, becoming an academic researcher is a journey of changing sense of self and identity. Through analysis of a group session, we show how the feedback of peers addresses questions...... of structure and writing style along with wider issues of researcher identity. Thus, peer learning is demonstrated as a process of simultaneously building a text and an identity as scholarly researcher. The paper advocates ‘borrowing brainpower’ from peers in order to write better texts and, at the same time......, ‘share insecurities’ during the development of the researcher identity. Based on a distributed notion of peer learning and identity, we point to the need for further research into the everyday activities of doctoral writing groups in order to understand the dynamic relationship between production of text...

  10. Visual comparison for information visualization

    KAUST Repository

    Gleicher, M.

    2011-09-07

    Data analysis often involves the comparison of complex objects. With the ever increasing amounts and complexity of data, the demand for systems to help with these comparisons is also growing. Increasingly, information visualization tools support such comparisons explicitly, beyond simply allowing a viewer to examine each object individually. In this paper, we argue that the design of information visualizations of complex objects can, and should, be studied in general, that is independently of what those objects are. As a first step in developing this general understanding of comparison, we propose a general taxonomy of visual designs for comparison that groups designs into three basic categories, which can be combined. To clarify the taxonomy and validate its completeness, we provide a survey of work in information visualization related to comparison. Although we find a great diversity of systems and approaches, we see that all designs are assembled from the building blocks of juxtaposition, superposition and explicit encodings. This initial exploration shows the power of our model, and suggests future challenges in developing a general understanding of comparative visualization and facilitating the development of more comparative visualization tools. © The Author(s) 2011.

  11. Visual stability.

    Science.gov (United States)

    Melcher, David

    2011-02-27

    Our vision remains stable even though the movements of our eyes, head and bodies create a motion pattern on the retina. One of the most important, yet basic, feats of the visual system is to correctly determine whether this retinal motion is owing to real movement in the world or rather our own self-movement. This problem has occupied many great thinkers, such as Descartes and Helmholtz, at least since the time of Alhazen. This theme issue brings together leading researchers from animal neurophysiology, clinical neurology, psychophysics and cognitive neuroscience to summarize the state of the art in the study of visual stability. Recently, there has been significant progress in understanding the limits of visual stability in humans and in identifying many of the brain circuits involved in maintaining a stable percept of the world. Clinical studies and new experimental methods, such as transcranial magnetic stimulation, now make it possible to test the causal role of different brain regions in creating visual stability and also allow us to measure the consequences when the mechanisms of visual stability break down.

  12. Secure data sharing in public cloud

    Science.gov (United States)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  13. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  14. Social identities and shared realities.

    Science.gov (United States)

    Hogg, Michael A; Rinella, Mark J

    2017-11-04

    People are fundamentally motivated to establish a shared reality with others to validate their identity and experiences. Guided by social identity theory, we examine how social identity processes, such as self-categorization and depersonalization, create a shared identity and a sense of shared reality. Research demonstrates that internal states such as attitudes, feelings, and emotions are often shared among members of a group. Furthermore, research has shown that self-uncertainty motivates people to establish shared realities through group identification, often with highly entitative groups that are associated with a self-saturating reality that is shared absolutely. Finally, we review research on how group-defining norms that serve as the bases of these identity-related shared realities are constructed and communicated through group-membership based influence. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This collection of research papers on visual cognition first appeared as a special issue of Cognition: International Journal of Cognitive Science. The study of visual cognition has seen enormous progress in the past decade, bringing important advances in our understanding of shape perception, visual imagery, and mental maps. Many of these discoveries are the result of converging investigations in different areas, such as cognitive and perceptual psychology, artificial intelligence, and neuropsychology. This volume is intended to highlight a sample of work at the cutting edge of this research area for the benefit of students and researchers in a variety of disciplines. The tutorial introduction that begins the volume is designed to help the nonspecialist reader bridge the gap between the contemporary research reported here and earlier textbook introductions or literature reviews.

  16. Primary endocrine-secreting pancreatic tumors.

    Science.gov (United States)

    Macaron, C

    1980-04-01

    Insulinoma, glucagonoma, gastrinoma (Zollinger-Ellison syndrome), vipoma, somatostatinoma and a tumor that secretes human pancreatic polypeptide are the primary endocrine-secreting tumors of the pancreas. hormones are produced by specific tumor cell types and cause a variety of dramatic clinical pictures. Diagnosis often requires hormone assays. Computerized tomography may be helpful. Definitive surgical treatment is possible, but metastases may be present.

  17. Family Secrets: The Bioethics of Genetic Testing

    Science.gov (United States)

    Markowitz, Dina G.; DuPre, Michael J.; Holt, Susan; Chen, Shaw-Ree; Wischnowski, Michael

    2006-01-01

    This article discusses "Family Secrets," a problem-based learning (PBL) curriculum module that focuses on the bioethical implications of genetic testing. In high school biology classrooms throughout New York State, students are using "Family Secrets" to learn about DNA testing; Huntington's disease (HD); and the ethical, legal,…

  18. The Secret in the Information Society

    NARCIS (Netherlands)

    D.W.J. Broeders (Dennis)

    2016-01-01

    textabstractWho can still keep a secret in a world in which everyone and everything are connected by technology aimed at charting and cross-referencing people, objects, movements, behaviour, relationships, tastes and preferences? The possibilities to keep a secret have come under severe pressure in

  19. Analysis of Secreted Proteins Using SILAC

    DEFF Research Database (Denmark)

    Henningsen, Jeanette; Blagoev, Blagoy; Kratchmarova, Irina

    2014-01-01

    Secreted proteins serve a crucial role in the communication between cells, tissues, and organs. Proteins released to the extracellular environment exert their function either locally or at distant points of the organism. Proteins are secreted in a highly dynamic fashion by cells and tissues...

  20. Personalized visual aesthetics

    Science.gov (United States)

    Vessel, Edward A.; Stahl, Jonathan; Maurer, Natalia; Denker, Alexander; Starr, G. G.

    2014-02-01

    How is visual information linked to aesthetic experience, and what factors determine whether an individual finds a particular visual experience pleasing? We have previously shown that individuals' aesthetic responses are not determined by objective image features but are instead a function of internal, subjective factors that are shaped by a viewers' personal experience. Yet for many classes of stimuli, culturally shared semantic associations give rise to similar aesthetic taste across people. In this paper, we investigated factors that govern whether a set of observers will agree in which images are preferred, or will instead exhibit more "personalized" aesthetic preferences. In a series of experiments, observers were asked to make aesthetic judgments for different categories of visual stimuli that are commonly evaluated in an aesthetic manner (faces, natural landscapes, architecture or artwork). By measuring agreement across observers, this method was able to reveal instances of highly individualistic preferences. We found that observers showed high agreement on their preferences for images of faces and landscapes, but much lower agreement for images of artwork and architecture. In addition, we found higher agreement for heterosexual males making judgments of beautiful female faces than of beautiful male faces. These results suggest that preferences for stimulus categories that carry evolutionary significance (landscapes and faces) come to rely on similar information across individuals, whereas preferences for artifacts of human culture such as architecture and artwork, which have fewer basic-level category distinctions and reduced behavioral relevance, rely on a more personalized set of attributes.

  1. The science of sharing and the sharing of science.

    Science.gov (United States)

    Milkman, Katherine L; Berger, Jonah

    2014-09-16

    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii) who generates discoveries that are likely to be shared, and (iii) which types of people are most likely to share scientific discoveries. The results described here, combined with a review of recent research on interpersonal communication, suggest how scientists can frame their work to increase its dissemination. They also provide insights about which audiences may be the best targets for the diffusion of scientific content.

  2. Characterization of a secreted Chlamydia protease

    DEFF Research Database (Denmark)

    Shaw, Allan C; Vandahl, Brian; Larsen, Martin Røssel

    2002-01-01

    Chlamydiae are obligate intracellular bacteria that are important human pathogens. The Chlamydia genomes contain orthologues to secretion apparatus proteins from other intracellular bacteria, but only a few secreted proteins have been identified. Most likely, effector proteins are secreted in order...... to promote infection. Effector proteins cannot be identified by motif or similarity searches. As a new strategy for identification of secreted proteins we have compared 2D-PAGE profiles of [35S]-labelled Chlamydia proteins from whole lysates of infected cells to 2D-PAGE profiles of proteins from purified...... Chlamydia. Several secretion candidates from Chlamydia trachomatis D and Chlamydia pneumoniae were detected by this method. Two protein spots were identified among the candidates. These represent fragments of the 'chlamydial protease- or proteasome-like activity factor' (CPAF) and were clearly present in 2D...

  3. Current Therapies That Modify Glucagon Secretion

    DEFF Research Database (Denmark)

    Grøndahl, Magnus F; Keating, Damien J; Vilsbøll, Tina

    2017-01-01

    and provide insights into how antidiabetic drugs influence glucagon secretion as well as a perspective on the future of glucagon-targeting drugs. RECENT FINDINGS: Several older as well as recent investigations have evaluated the effect of antidiabetic agents on glucagon secretion to understand how glucagon...... may be involved in the drugs' efficacy and safety profiles. Based on these findings, modulation of glucagon secretion seems to play a hitherto underestimated role in the efficacy and safety of several glucose-lowering drugs. Numerous drugs currently available to diabetologists are capable of altering...... glucagon secretion: metformin, sulfonylurea compounds, insulin, glucagon-like peptide-1 receptor agonists, dipeptidyl peptidase-4 inhibitors, sodium-glucose cotransporter 2 inhibitors and amylin mimetics. Their diverse effects on glucagon secretion are of importance for their individual efficacy and safety...

  4. Toxins and Secretion Systems of Photorhabdus luminescens

    Directory of Open Access Journals (Sweden)

    Athina Rodou

    2010-06-01

    Full Text Available Photorhabdus luminescens is a nematode-symbiotic, gram negative, bioluminescent bacterium, belonging to the family of Enterobacteriaceae.Recent studies show the importance of this bacterium as an alternative source of insecticides, as well as an emerging human pathogen. Various toxins have been identified and characterized in this bacterium. These toxins are classified into four major groups: the toxin complexes (Tcs, the Photorhabdus insect related (Pir proteins, the “makes caterpillars floppy” (Mcf toxins and the Photorhabdus virulence cassettes (PVC; the mechanisms however of toxin secretion are not fully elucidated. Using bioinformatics analysis and comparison against the components of known secretion systems, multiple copies of components of all known secretion systems, except the ones composing a type IV secretion system, were identified throughout the entire genome of the bacterium. This indicates that Photorhabdus luminescens has all the necessary means for the secretion of virulence factors, thus it is capable of establishing a microbial infection.

  5. Toxins and secretion systems of Photorhabdus luminescens.

    Science.gov (United States)

    Rodou, Athina; Ankrah, Dennis O; Stathopoulos, Christos

    2010-06-01

    Photorhabdus luminescens is a nematode-symbiotic, gram negative, bioluminescent bacterium, belonging to the family of Enterobacteriaceae. Recent studies show the importance of this bacterium as an alternative source of insecticides, as well as an emerging human pathogen. Various toxins have been identified and characterized in this bacterium. These toxins are classified into four major groups: the toxin complexes (Tcs), the Photorhabdus insect related (Pir) proteins, the "makes caterpillars floppy" (Mcf) toxins and the Photorhabdus virulence cassettes (PVC); the mechanisms however of toxin secretion are not fully elucidated. Using bioinformatics analysis and comparison against the components of known secretion systems, multiple copies of components of all known secretion systems, except the ones composing a type IV secretion system, were identified throughout the entire genome of the bacterium. This indicates that Photorhabdus luminescens has all the necessary means for the secretion of virulence factors, thus it is capable of establishing a microbial infection.

  6. Hydrocortisone Counteracts Adverse Stress Effects on Dual-Task Performance by Improving Visual Sensory Processes.

    Science.gov (United States)

    Weckesser, Lisa J; Alexander, Nina C; Kirschbaum, Clemens; Mennigen, Eva; Miller, Robert

    2016-11-01

    The impact of acute stress on executive processes is commonly attributed to glucocorticoid-induced disruptions of the pFC. However, the occipital cortex seems to express a higher density of glucocorticoid receptors. Consequently, acute stress effects on executive processes could as well be mediated by glucocorticoid (e.g., cortisol)-induced alterations of visual sensory processes. To investigate this alternative route of stress action by demarcating the effects of acute stress and cortisol on executive from those on visual sensory processes, 40 healthy young men completed a standardized stress induction (i.e., the Trier Social Stress Test) and control protocol in two consecutive sessions. In addition, they received either a placebo or hydrocortisone (0.12-mg/kg bodyweight) pill and processed a dual and a partial report task to assess their executive and visual sensory processing abilities, respectively. Hydrocortisone administration improved both partial report and dual-task performance as indicated by increased response accuracies and/or decreased RTs. Intriguingly, the hydrocortisone-induced increase in dual-task performance was completely mediated by its impact on partial report performance (i.e., visual sensory processes). Moreover, RT measures in both tasks shared approximately 26% of variance, which was only in part attributable to hydrocortisone administration (ΔR(2) = 8%). By contrast, acute stress selectively impaired dual-task performance (i.e., executive processes), presumably through an alternative route of action. In summary, the present results suggest that cortisol secretion (as mimicked by hydrocortisone administration) may counteract adverse residual stress effects on executive processes by improving visual sensory processes (e.g., the maintenance and amplification of task-relevant sensory information).

  7. Non-classical protein secretion in bacteria

    Directory of Open Access Journals (Sweden)

    Fausbøll Anders

    2005-10-01

    Full Text Available Abstract Background We present an overview of bacterial non-classical secretion and a prediction method for identification of proteins following signal peptide independent secretion pathways. We have compiled a list of proteins found extracellularly despite the absence of a signal peptide. Some of these proteins also have known roles in the cytoplasm, which means they could be so-called "moon-lightning" proteins having more than one function. Results A thorough literature search was conducted to compile a list of currently known bacterial non-classically secreted proteins. Pattern finding methods were applied to the sequences in order to identify putative signal sequences or motifs responsible for their secretion. We have found no signal or motif characteristic to any majority of the proteins in the compiled list of non-classically secreted proteins, and conclude that these proteins, indeed, seem to be secreted in a novel fashion. However, we also show that the apparently non-classically secreted proteins are still distinguished from cellular proteins by properties such as amino acid composition, secondary structure and disordered regions. Specifically, prediction of disorder reveals that bacterial secretory proteins are more structurally disordered than their cytoplasmic counterparts. Finally, artificial neural networks were used to construct protein feature based methods for identification of non-classically secreted proteins in both Gram-positive and Gram-negative bacteria. Conclusion We present a publicly available prediction method capable of discriminating between this group of proteins and other proteins, thus allowing for the identification of novel non-classically secreted proteins. We suggest candidates for non-classically secreted proteins in Escherichia coli and Bacillus subtilis. The prediction method is available online.

  8. Data sharing in neuroimaging research

    Directory of Open Access Journals (Sweden)

    Jean-Baptiste ePoline

    2012-04-01

    Full Text Available Significant resources around the world have been invested in neuroimaging studies of brain function and disease. Easier access to this large body of work should have profound impact on research in cognitive neuroscience and psychiatry, leading to advances in the diagnosis and treatment of psychiatric and neurological disease. A trend toward increased sharing of neuroimaging data has emerged in recent years. Nevertheless, a number of barriers continue to impede momentum. Many researchers and institutions remain uncertain about how to share data or lack the tools and expertise to participate in data sharing. The use of electronic data capture methods for neuroimaging greatly simplifies the task of data collection and has the potential to help standardize many aspects of data sharing. We review here the motivations for sharing neuroimaging data, the current data sharing landscape, and the sociological or technical barriers that still need to be addressed. The INCF Task Force on Neuroimaging Datasharing, in conjunction with several collaborative groups around the world, has started work on several tools to ease and eventually automate the practice of data sharing. It is hoped that such tools will allow researchers to easily share raw, processed, and derived neuroimaging data, with appropriate metadata and provenance records, and will improve the reproducibility of neuroimaging studies. By providing seamless integration of data sharing and analysis tools within a commodity research environment, the Task Force seeks to identify and minimize barriers to data sharing in the field of neuroimaging.

  9. Sharing Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Mohler, Bryan L.

    2004-09-01

    Workplace safety is inextricably tied to the culture – the leadership, management and organization – of the entire company. Nor is a safety lesson fundamentally different from any other business lesson. With these points in mind, Pacific Northwest National Laboratory recast its lessons learned program in 2000. The laboratory retained elements of a traditional lessons learned program, such as tracking and trending safety metrics, and added a best practices element to increase staff involvement in creating a safer, healthier work environment. Today, the Lessons Learned/Best Practices program offers the latest business thinking summarized from current external publications and shares better ways PNNL staff have discovered for doing things. According to PNNL strategic planning director Marilyn Quadrel, the goal is to sharpen the business acumen, project management ability and leadership skills of all staff and to capture the benefits of practices that emerge from lessons learned. A key tool in the PNNL effort to accelerate learning from past mistakes is one that can be easily implemented by other firms and tailored to their specific needs. It is the weekly placement of Lessons Learned/Best Practices articles in the lab’s internal electronic newsletter. The program is equally applicable in highly regulated environments, such as the national laboratories, and in enterprises that may have fewer external requirements imposed on their operations. And it is cost effective, using less than the equivalent of one fulltime person to administer.

  10. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  11. Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing

    OpenAIRE

    Yang, Ching-Nung; Lai, Jia-Bin; Fu, Zhangjie

    2015-01-01

    Cloud computing is an Internet-based computing. In cloud computing, the service is fully served by the provider. Users need nothing but personal devices and Internet access. Computing services, such as data, storage, software, computing, and application, can be delivered to local devices through Internet. The major security issue of cloud computing is that cloud providers must ensure that their infrastructure is secure, and prevent illegal data accesses from outsiders, other clients, or even ...

  12. Traffic Visualization

    DEFF Research Database (Denmark)

    Picozzi, Matteo; Verdezoto, Nervo; Pouke, Matti

    2013-01-01

    techniques to give a rapid overview of traffic data. We illustrate our approach as a case study for traffic visualization systems, using datasets from the city of Oulu that can be extended to other city planning activities. We also report the feedback of real users (traffic management employees, traffic police...

  13. Visualizing inequality

    Science.gov (United States)

    Eliazar, Iddo

    2016-07-01

    The study of socioeconomic inequality is of substantial importance, scientific and general alike. The graphic visualization of inequality is commonly conveyed by Lorenz curves. While Lorenz curves are a highly effective statistical tool for quantifying the distribution of wealth in human societies, they are less effective a tool for the visual depiction of socioeconomic inequality. This paper introduces an alternative to Lorenz curves-the hill curves. On the one hand, the hill curves are a potent scientific tool: they provide detailed scans of the rich-poor gaps in human societies under consideration, and are capable of accommodating infinitely many degrees of freedom. On the other hand, the hill curves are a powerful infographic tool: they visualize inequality in a most vivid and tangible way, with no quantitative skills that are required in order to grasp the visualization. The application of hill curves extends far beyond socioeconomic inequality. Indeed, the hill curves are highly effective 'hyperspectral' measures of statistical variability that are applicable in the context of size distributions at large. This paper establishes the notion of hill curves, analyzes them, and describes their application in the context of general size distributions.

  14. A comparative psychophysical approach to visual perception in primates.

    Science.gov (United States)

    Matsuno, Toyomi; Fujita, Kazuo

    2009-04-01

    Studies on the visual processing of primates, which have well developed visual systems, provide essential information about the perceptual bases of their higher-order cognitive abilities. Although the mechanisms underlying visual processing are largely shared between human and nonhuman primates, differences have also been reported. In this article, we review psychophysical investigations comparing the basic visual processing that operates in human and nonhuman species, and discuss the future contributions potentially deriving from such comparative psychophysical approaches to primate minds.

  15. Bile salts secretion in cirrhosis.

    Science.gov (United States)

    Correia, J P; Areias, E; Meneses, L; Tiago, E

    1977-02-01

    The bile salts secretion was studied in ten normal subjects and sixteen patients with alcoholic cirrhosis, in a basal period and during 60 minutes after Secretin injection. Total bile salts were measured by a modification of the enzymatic method of Iwata and Yamasaki and the individual bile salts were separated by silica gel thin-layer chromatography. During the 60 minutes after Secretin the mean concentration was 2.88 +/- 2.58 muM/ml in normals and 1.96 +/- 1.25 muM/ml in cirrhotics. The difference is not significant. During the first 20 minutes however the concentration was higher than 3 muM/ml in 8 out of 10 normals and lower than 2 muM/ml in 10 out 16 cirrhotics. The ratios of tri-to dihydroxy bile salts was similar in both groups. The ratios between bile salts conjugated with glycine and with taurine was higher in normals, and the ratio between free to conjugated bile salts was higher in cirrhotics. The lower concentration of total bile salts immediatly after Secretin, the higher proportion of taurin conjugates and of free bile salts could be important factors in the difficulties of fact digestion and absorption frequently found in patients with alcoholic cirrhosis.

  16. Resource-sharing between internal maintenance and external selection modulates attentional capture by working memory content

    OpenAIRE

    Anastasia eKiyonaga; Tobias eEgner

    2014-01-01

    It is unclear why and under what circumstances working memory (WM) and attention interact. Here, we apply the logic of the time-based resource-sharing (TBRS) model of WM (e.g., Barrouillet, Bernardin, & Camos, 2004) to explore the mixed findings of a separate, but related, literature that studies the guidance of visual attention by WM contents. Specifically, we hypothesize that the linkage between WM representations and visual attention is governed by a time-shared cognitive resource that al...

  17. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  18. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  19. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  20. Identification of protein secretion systems and novel secreted proteins in Rhizobium leguminosarum bv. viciae

    Directory of Open Access Journals (Sweden)

    Krehenbrink Martin

    2008-01-01

    Full Text Available Abstract Background Proteins secreted by bacteria play an important role in infection of eukaryotic hosts. Rhizobia infect the roots of leguminous plants and establish a mutually beneficial symbiosis. Proteins secreted during the infection process by some rhizobial strains can influence infection and modify the plant defence signalling pathways. The aim of this study was to systematically analyse protein secretion in the recently sequenced strain Rhizobium leguminosarum bv. viciae 3841. Results Similarity searches using defined protein secretion systems from other Gram-negative bacteria as query sequences revealed that R. l. bv. viciae 3841 has ten putative protein secretion systems. These are the general export pathway (GEP, a twin-arginine translocase (TAT secretion system, four separate Type I systems, one putative Type IV system and three Type V autotransporters. Mutations in genes encoding each of these (except the GEP were generated, but only mutations affecting the PrsDE (Type I and TAT systems were observed to affect the growth phenotype and the profile of proteins in the culture supernatant. Bioinformatic analysis and mass fingerprinting of tryptic fragments of culture supernatant proteins identified 14 putative Type I substrates, 12 of which are secreted via the PrsDE, secretion system. The TAT mutant was defective for the symbiosis, forming nodules incapable of nitrogen fixation. Conclusion None of the R. l. bv. viciae 3841 protein secretion systems putatively involved in the secretion of proteins to the extracellular space (Type I, Type IV, Type V is required for establishing the symbiosis with legumes. The PrsDE (Type I system was shown to be the major route of protein secretion in non-symbiotic cells and to secrete proteins of widely varied size and predicted function. This is in contrast to many Type I systems from other bacteria, which typically secrete specific substrates encoded by genes often localised in close proximity to

  1. Identification of protein secretion systems and novel secreted proteins in Rhizobium leguminosarum bv. viciae.

    Science.gov (United States)

    Krehenbrink, Martin; Downie, J Allan

    2008-01-29

    Proteins secreted by bacteria play an important role in infection of eukaryotic hosts. Rhizobia infect the roots of leguminous plants and establish a mutually beneficial symbiosis. Proteins secreted during the infection process by some rhizobial strains can influence infection and modify the plant defence signalling pathways. The aim of this study was to systematically analyse protein secretion in the recently sequenced strain Rhizobium leguminosarum bv. viciae 3841. Similarity searches using defined protein secretion systems from other Gram-negative bacteria as query sequences revealed that R. l. bv. viciae 3841 has ten putative protein secretion systems. These are the general export pathway (GEP), a twin-arginine translocase (TAT) secretion system, four separate Type I systems, one putative Type IV system and three Type V autotransporters. Mutations in genes encoding each of these (except the GEP) were generated, but only mutations affecting the PrsDE (Type I) and TAT systems were observed to affect the growth phenotype and the profile of proteins in the culture supernatant. Bioinformatic analysis and mass fingerprinting of tryptic fragments of culture supernatant proteins identified 14 putative Type I substrates, 12 of which are secreted via the PrsDE, secretion system. The TAT mutant was defective for the symbiosis, forming nodules incapable of nitrogen fixation. None of the R. l. bv. viciae 3841 protein secretion systems putatively involved in the secretion of proteins to the extracellular space (Type I, Type IV, Type V) is required for establishing the symbiosis with legumes. The PrsDE (Type I) system was shown to be the major route of protein secretion in non-symbiotic cells and to secrete proteins of widely varied size and predicted function. This is in contrast to many Type I systems from other bacteria, which typically secrete specific substrates encoded by genes often localised in close proximity to the genes encoding the secretion system itself.

  2. Pituitary adenylate cyclase-activating polypeptide promotes eccrine gland sweat secretion.

    Science.gov (United States)

    Sasaki, S; Watanabe, J; Ohtaki, H; Matsumoto, M; Murai, N; Nakamachi, T; Hannibal, J; Fahrenkrug, J; Hashimoto, H; Watanabe, H; Sueki, H; Honda, K; Miyazaki, A; Shioda, S

    2017-02-01

    Sweat secretion is the major function of eccrine sweat glands; when this process is disturbed (paridrosis), serious skin problems can arise. To elucidate the causes of paridrosis, an improved understanding of the regulation, mechanisms and factors underlying sweat production is required. Pituitary adenylate cyclase-activating polypeptide (PACAP) exhibits pleiotropic functions that are mediated via its receptors [PACAP-specific receptor (PAC1R), vasoactive intestinal peptide (VIP) receptor type 1 (VPAC1R) and VPAC2R]. Although some studies have suggested a role for PACAP in the skin and several exocrine glands, the effects of PACAP on the process of eccrine sweat secretion have not been examined. To investigate the effect of PACAP on eccrine sweat secretion. Reverse transcriptase-polymerase chain reaction and immunostaining were used to determine the expression and localization of PACAP and its receptors in mouse and human eccrine sweat glands. We injected PACAP subcutaneously into the footpads of mice and used the starch-iodine test to visualize sweat-secreting glands. Immunostaining showed PACAP and PAC1R expression by secretory cells from mouse and human sweat glands. PACAP immunoreactivity was also localized in nerve fibres around eccrine sweat glands. PACAP significantly promoted sweat secretion at the injection site, and this could be blocked by the PAC1R-antagonist PACAP6-38. VIP, an agonist of VPAC1R and VPAC2R, failed to induce sweat secretion. This is the first report demonstrating that PACAP may play a crucial role in sweat secretion via its action on PAC1R located in eccrine sweat glands. The mechanisms underlying the role of PACAP in sweat secretion may provide new therapeutic options to combat sweating disorders. © 2016 British Association of Dermatologists.

  3. SharePoint User's Guide

    CERN Document Server

    Corporation, Infusion Development

    2009-01-01

    This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.

  4. Modeling Shared Variables in VHDL

    DEFF Research Database (Denmark)

    Madsen, Jan; Brage, Jens P.

    1994-01-01

    A set of concurrent processes communicating through shared variables is an often used model for hardware systems. This paper presents three modeling techniques for representing such shared variables in VHDL, depending on the acceptable constraints on accesses to the variables. Also a set...... of guidelines for handling atomic updates of multiple shared variables is given. 1 Introduction It is often desirable to partition a computational system into discrete functional units which cooperates to....

  5. Emergent Resource Sharing & Interlibrary Loan

    OpenAIRE

    Oberlander, Cyril

    2006-01-01

    Resource sharing and Interlibrary Loan face exciting opportunities to develop new connections between information and library resources and services. Emergent consumer technology is radically changing the nature of Library service; however, we can shape the transformation of resource sharing and interlibrary loan. Framing the evolution of request management systems and resource sharing workflow are communities of adaptations to the changed information and technology landscape. The redefini...

  6. Instant Social Ride-Sharing

    OpenAIRE

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben

    2008-01-01

    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  7. Comparative Analysis of Secretomes from Ectomycorrhizal Fungi with an Emphasis on Small-Secreted Proteins

    Science.gov (United States)

    Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.; Veneault-Fourrey, Claire

    2015-01-01

    Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict and analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. ECM fungi shared lifestyle-specific SSPs likely involved in

  8. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... to other high stress, unique and complex situations, such as natural disasters. Recommendations for more effective information behaviour techniques in dynamic group work situations are presented....... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  9. Governing Individual Knowledge Sharing Behavior

    DEFF Research Database (Denmark)

    Minbaeva, Dana; Pedersen, Torben

    2010-01-01

    The emerging Knowledge Governance Approach asserts the need to build microfoundations grounded in individual action. Toward this goal, using the Theory of Planned Behavior, we aim to explain individual knowledge sharing behavior as being determined by the intention to share knowledge and its...... antecedents: attitude toward knowledge sharing, subjective norms, and perceived behavioral control. In addition, we consider managerial interventions (governance mechanisms) that managers can employ to influence the identified antecedents and thereby govern individual knowledge sharing behavior. We test...... a positive effect on subjective norms and perceived behavioral control, respectively....

  10. THE BUFFER CAPACITY OF AIRWAY EPITHELIAL SECRETIONS

    Directory of Open Access Journals (Sweden)

    Dusik eKim

    2014-06-01

    Full Text Available The pH of airway epithelial secretions influences bacterial killing and mucus properties and is reduced by acidic pollutants, gastric reflux, and respiratory diseases such as cystic fibrosis (CF. The effect of acute acid loads depends on buffer capacity, however the buffering of airway secretions has not been well characterized. In this work we develop a method for titrating micro-scale (30 µl volumes and use it to study fluid secreted by the human airway epithelial cell line Calu-3, a widely used model for submucosal gland serous cells. Microtitration curves revealed that HCO3- is the major buffer. Peak buffer capacity (β increased from 17 to 28 mM/pH during forskolin stimulation, and was reduced by >50% in fluid secreted by cystic fibrosis transmembrane conductance regulator (CFTR-deficient Calu-3 monolayers, confirming an important role of CFTR in HCO3- secretion. Back-titration with NaOH revealed non-volatile buffer capacity due to proteins synthesized and released by the epithelial cells. Lysozyme and mucin concentrations were too low to buffer Calu-3 fluid significantly, however model titrations of porcine gastric mucins at concentrations near the sol-gel transition suggest that mucins may contribute to the buffer capacity of ASL in vivo. We conclude that CFTR-dependent HCO3- secretion and epithelially-derived proteins are the predominant buffers in Calu-3 secretions.

  11. Concentrations of ceftibuten in bronchial secretions.

    Science.gov (United States)

    Scaglione, F; Triscari, F; Demartini, G; Arcidiacono, M; Cocuzza, C; Fraschini, F

    1995-01-01

    Ceftibuten is a broad-spectrum oral cephalosporin exhibiting antimicrobial activity against a wide range of gram-negative and some gram-positive pathogens. Pharmacokinetic studies have shown that the molecule has an oral bioavailability higher than 90% of the administered dose (reaching peak serum concentrations of 5-19 mg/l after a single dose of 200 and 400 mg). Moreover, ceftibuten has been shown to be useful in the treatment of acute lower respiratory tract infections. This study was performed to determine the distribution of ceftibuten in bronchial secretions from patients affected by the exacerbation of chronic bronchitis. Patients were treated with a single 400-mg oral dose of ceftibuten. Blood and bronchial-secretion samples were obtained just before, and at 0.5, 1, 2, 4, 8, 12, 16 and 24 h after dosing. Cells were separated from bronchial secretions by centrifugation. Ceftibuten in duplicate samples of both serum and bronchial secretion was quantified by HPLC. Ceftibuten reached peak levels 2 and 4 h after oral administration in serum and in bronchial secretions, respectively (18.12 +/- 2.13 and 9.19 +/- 3.1 mg/l, respectively). Falling curves after the peaks showed a monoexponential decay. The absorption was very rapid both in serum and bronchial secretions, but elimination was slower in bronchial secretions than in serum.

  12. The buffer capacity of airway epithelial secretions.

    Science.gov (United States)

    Kim, Dusik; Liao, Jie; Hanrahan, John W

    2014-01-01

    The pH of airway epithelial secretions influences bacterial killing and mucus properties and is reduced by acidic pollutants, gastric reflux, and respiratory diseases such as cystic fibrosis (CF). The effect of acute acid loads depends on buffer capacity, however the buffering of airway secretions has not been well characterized. In this work we develop a method for titrating micro-scale (30 μl) volumes and use it to study fluid secreted by the human airway epithelial cell line Calu-3, a widely used model for submucosal gland serous cells. Microtitration curves revealed that HCO(-) 3 is the major buffer. Peak buffer capacity (β) increased from 17 to 28 mM/pH during forskolin stimulation, and was reduced by >50% in fluid secreted by cystic fibrosis transmembrane conductance regulator (CFTR)-deficient Calu-3 monolayers, confirming an important role of CFTR in HCO(-) 3 secretion. Back-titration with NaOH revealed non-volatile buffer capacity due to proteins synthesized and released by the epithelial cells. Lysozyme and mucin concentrations were too low to buffer Calu-3 fluid significantly, however model titrations of porcine gastric mucins at concentrations near the sol-gel transition suggest that mucins may contribute to the buffer capacity of ASL in vivo. We conclude that CFTR-dependent HCO(-) 3 secretion and epithelially-derived proteins are the predominant buffers in Calu-3 secretions.

  13. Lycaenid Caterpillar Secretions Manipulate Attendant Ant Behavior.

    Science.gov (United States)

    Hojo, Masaru K; Pierce, Naomi E; Tsuji, Kazuki

    2015-08-31

    Mutualistic interactions typically involve the exchange of different commodities between species. Nutritious secretions are produced by a number of insects and plants in exchange for services such as defense. These rewards are valuable metabolically and can be used to reinforce the behavior of symbiotic partners that can learn and remember them effectively. We show here novel effects of insect exocrine secretions produced by caterpillars in modulating the behavior of attendant ants in the food-for-defense interaction between lycaenid butterflies and ants. Reward secretions from the dorsal nectary organ (DNO) of Narathura japonica caterpillars function to reduce the locomotory activities of their attendant ants, Pristomyrmex punctatus workers. Moreover, workers that feed from caterpillar secretions are significantly more likely to show aggressive responses to eversion of the tentacle organs of the caterpillars. Analysis of the neurogenic amines in the brains of workers that consumed caterpillar secretions showed a significant decrease in levels of dopamine compared with controls. Experimental treatments in which reserpine, a known inhibitor of dopamine in Drosophila, was fed to workers similarly reduced their locomotory activity. We conclude that DNO secretions of lycaenid caterpillars can manipulate attendant ant behavior by altering dopaminergic regulation and increasing partner fidelity. Unless manipulated ants also receive a net nutritional benefit from DNO secretions, this suggests that similar reward-for-defense interactions that have been traditionally considered to be mutualisms may in fact be parasitic in nature. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Technology Mediated Information Sharing (Monitor Sharing) in Primary Care Encounters

    Science.gov (United States)

    Asan, Onur

    2013-01-01

    The aim of this dissertation study was to identify and describe the use of electronic health records (EHRs) for information sharing between patients and clinicians in primary-care encounters and to understand work system factors influencing information sharing. Ultimately, this will promote better design of EHR technologies and effective training…

  15. Oral administration of royal jelly restores tear secretion capacity in rat blink-suppressed dry eye model by modulating lacrimal gland function.

    Science.gov (United States)

    Imada, Toshihiro; Nakamura, Shigeru; Kitamura, Naoki; Shibuya, Izumi; Tsubota, Kazuo

    2014-01-01

    Tears are secreted from the lacrimal gland (LG), a dysfunction in which induces dry eye, resulting in ocular discomfort and visual impairment. Honey bee products are used as a nutritional source in daily life and medicine; however, little is known about their effects on dry eye. The aim of the present study was to investigate the effects of honey bee products on tear secretion capacity in dry eye. We selected raw honey, propolis, royal jelly (RJ), pollen, or larva from commercially available honey bee products. Tear secretion capacity was evaluated following the oral administration of each honey bee product in a rat blink-suppressed dry eye model. Changes in tear secretion, LG ATP content, and LG mitochondrial levels were measured. RJ restored the tear secretion capacity and decrease in LG ATP content and mitochondrial levels to the largest extent. Royal jelly can be used as a preventative intervention for dry eye by managing tear secretion capacity in the LG.

  16. Oral administration of royal jelly restores tear secretion capacity in rat blink-suppressed dry eye model by modulating lacrimal gland function.

    Directory of Open Access Journals (Sweden)

    Toshihiro Imada

    Full Text Available Tears are secreted from the lacrimal gland (LG, a dysfunction in which induces dry eye, resulting in ocular discomfort and visual impairment. Honey bee products are used as a nutritional source in daily life and medicine; however, little is known about their effects on dry eye. The aim of the present study was to investigate the effects of honey bee products on tear secretion capacity in dry eye. We selected raw honey, propolis, royal jelly (RJ, pollen, or larva from commercially available honey bee products. Tear secretion capacity was evaluated following the oral administration of each honey bee product in a rat blink-suppressed dry eye model. Changes in tear secretion, LG ATP content, and LG mitochondrial levels were measured. RJ restored the tear secretion capacity and decrease in LG ATP content and mitochondrial levels to the largest extent. Royal jelly can be used as a preventative intervention for dry eye by managing tear secretion capacity in the LG.

  17. Shared governance and shared leadership: meeting the challenges of implementation.

    Science.gov (United States)

    Scott, Linda; Caress, Ann-Louise

    2005-01-01

    New forms of leadership are required if staff are to be effectively engaged and involved in decision-making and promoting clinical effectiveness. One such mechanism is shared governance and shared leadership to ensure practice is both practitioner owned and organizationally supported. Empowering staff is a great challenge requiring effective planning, preparation and commitment. Establishing the process of shared governance requires effective leadership, implementation of a suitable framework, multidisciplinary working and examination of the organization's structure and culture. This paper discusses the challenges of implementation, preparation of staff, and alignment with the organizational agenda. It emphasizes that shared governance is an ongoing and fluid process, requiring continual assessment and re-evaluation in order to be flexible and responsive to an ever-changing environment. The Christie model provides a sustainable framework for moving practice forward and successful implementation has led to greater coordination of practice development and sharing of best practice.

  18. [Mechanism of alcohol action on gastric secretion].

    Science.gov (United States)

    Vasilevskaia, L S; Skurikhin, I M; Guliev, R R

    2001-01-01

    In chronic experiment on dogs (3 dogs with Pavlov's miniature stomach, 3 dogs with Heidenhain's miniature stomach) the mechanism of action of alcohol (8%-150 ml) on gastric secretion was clarified. For this purpose the new inhibitor of gastric secretion--glycopeptide was utilized, which action was preset in laboratory of G.K. Shlygin. Was shown, that in effect of alcohol on gastric secretion take place the complicated mechanism including as a nervous regulation (vagus nerves), and humoral: participation of gastrin and histamine in secretory effect of a stomach, and also immediate effect of ethanol on acid glands.

  19. Regulation of glucagon secretion by incretins

    DEFF Research Database (Denmark)

    Holst, Jens Juul; Christensen, M; Lund, A

    2011-01-01

    Glucagon secretion plays an essential role in the regulation of hepatic glucose production, and elevated fasting and postprandial plasma glucagon concentrations in patients with type 2 diabetes (T2DM) contribute to their hyperglycaemia. The reason for the hyperglucagonaemia is unclear, but recent...... that endogenous GLP-1 plays an important role in regulation of glucagon secretion during fasting as well as postprandially. The mechanisms whereby GLP-1 regulates glucagon secretion are debated, but studies in isolated perfused rat pancreas point to an important role for a paracrine regulation by somatostatin...

  20. Writing virtual environments for software visualization

    CERN Document Server

    Jeffery, Clinton

    2015-01-01

    This book describes the software for creating networked, 3D multi-user virtual environments that allow users to create and remotely share visualizations of program behavior. The authors cover the major features of collaborative virtual environments and how to program them in a very high level language, and show how visualization can enable important advances in our ability to understand and reduce the costs of maintaining software. The book also examines the application of popular game-like software technologies.   • Discusses the acquisition of program behavior data to be visualized • Demonstrates the integration of multiple 2D and 3D dynamic views within a 3Dscene • Presents the network messaging capabilities to share those visualizations

  1. Venom allergen-like proteins in secretions of plant-parasitic nematodes activate and suppress extracellular plant immune receptors

    NARCIS (Netherlands)

    Lozano Torres, J.L.

    2014-01-01

      Parasitic worms threaten human, animal and plant health by infecting people, livestock and crops worldwide. Animals and plants share an anciently evolved innate immune system. Parasites modulate this immune system by secreting proteins to maintain their parasitic lifestyle. This thesis

  2. DBSecSys 2.0: a database of Burkholderia mallei and Burkholderia pseudomallei secretion systems

    OpenAIRE

    Memi?evi?, Vesna; Kumar, Kamal; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques

    2016-01-01

    Background Burkholderia mallei and B. pseudomallei are the causative agents of glanders and melioidosis, respectively, diseases with high morbidity and mortality rates. B. mallei and B. pseudomallei are closely related genetically; B. mallei evolved from an ancestral strain of B. pseudomallei by genome reduction and adaptation to an obligate intracellular lifestyle. Although these two bacteria cause different diseases, they share multiple virulence factors, including bacterial secretion syste...

  3. A novel secreted cyclophilin-like protein (SCYLP).

    Science.gov (United States)

    Spik, G; Haendler, B; Delmas, O; Mariller, C; Chamoux, M; Maes, P; Tartar, A; Montreuil, J; Stedman, K; Kocher, H P

    1991-06-15

    A novel cyclosporin A binding glycoprotein of 21 kDa was isolated from human milk by several steps of cation exchange chromatography. The corresponding gene was cloned from human T cells, expressed in Escherichia coli and the recombinant protein purified. The protein shares 58% amino acid identity with the cytosolic cyclophilin and is initially synthesized with a hydrophobic leader sequence. The cyclophilin-like protein has also peptidyl-prolyl cis/trans-isomerase activity, although less efficient, that is inhibited by cyclosporin A. The existence of a secreted form of cyclophilin-like protein in addition to the previously known cytosolic cyclophilin implies that these proteins act on different in vivo targets.

  4. Visualizing Transformation

    DEFF Research Database (Denmark)

    Pedersen, Pia

    2012-01-01

    the finished charts as a starting point and then going back to the beginning; furthermore, this inquiry presents a novel approach to clarifying the process by designing symbols and diagrams. It will be demonstrated that transformation offers an improved approach to data visualization. The message in the chart...... is not preformed, but formed through the process of transformation; this means that the purpose of transformation is not the styling of charts with pictograms, but rather creating a meaningful message. The contribution of this paper is an elaborated understanding of the process of transformation...... design. Recently transformation has attracted renewed interest because of the book The Transformer written by Robin Kinross and Marie Neurath. My on-going research project, summarized in this paper, identifies and depicts the essential principles of data visualization underlying the process...

  5. Discovering Knowledge Through Visual Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, James J.; Cowley, Paula J.; Kuchar, Olga A.; Nowell, Lucy T.; Thomson, Judi R.; Wong, Pak C.

    2001-07-12

    This paper describes a vision for the near future in digital content analysis as it relates to the creation, verification, and presentation of knowledge. This paper focuses on how visualization enables humans to gain knowledge. Visualization, in this context, is not just the picture representing the data, but a two-way interaction between the human and their information resources for the purposes of knowledge discovery, verification, and the sharing of knowledge with others. We present PNNL-developed software to demonstrate how current technology can use visualization tools to analyze large diverse collections of text. This will be followed by lessons learned and the presentation of a core concept for a new human information discourse.

  6. Visualizing thought.

    Science.gov (United States)

    Tversky, Barbara

    2011-07-01

    Depictive expressions of thought predate written language by thousands of years. They have evolved in communities through a kind of informal user testing that has refined them. Analyzing common visual communications reveals consistencies that illuminate how people think as well as guide design; the process can be brought into the laboratory and accelerated. Like language, visual communications abstract and schematize; unlike language, they use properties of the page (e.g., proximity and place: center, horizontal/up-down, vertical/left-right) and the marks on it (e.g., dots, lines, arrows, boxes, blobs, likenesses, symbols) to convey meanings. The visual expressions of these meanings (e.g., individual, category, order, relation, correspondence, continuum, hierarchy) have analogs in language, gesture, and especially in the patterns that are created when people design the world around them, arranging things into piles and rows and hierarchies and arrays, spatial-abstraction-action interconnections termed spractions. The designed world is a diagram. Copyright © 2010 Cognitive Science Society, Inc.

  7. Distributed Programming with Shared Data

    NARCIS (Netherlands)

    Bal, H.E.; Tanenbaum, A.S.

    1991-01-01

    Until recently, at least one thing was clear about parallel programming: shared-memory machines were programmed in a language based on shared variables and distributed machines were programmed using message passing. Recent research on distributed systems and their languages, however, has led to new

  8. Barriers to Cyber Information Sharing

    Science.gov (United States)

    2014-12-01

    that compete for use within organizations.89 According to Kathleen Moriarty of EMC Corporation, threat information-sharing efforts must affect the...Intelligence Sharing (Hopkinton, MA: EMC , 2013). 90 Ibid. 22 release of too much information...has expressed concern that extending protections would only serve as a legal shield against liability.131 In addition, the challenges of information

  9. Benefit sharing in health research

    African Journals Online (AJOL)

    2015-08-02

    Aug 2, 2015 ... [7,9] The guideline's MTA template provides for the 'fair and equitable sharing of benefits' derived ... exposure which could assist in safeguarding the women's rights to any benefits that may accrue from ..... biological resources in developing countries: Benefit sharing without undue inducement (in press).

  10. Food Sharing: An Evolutionary Perspective.

    Science.gov (United States)

    Feinman, Saul

    Food altruism and the consumption of food are examined from a sociological perspective which assumes that humans share food as inclusive fitness actors. Inclusive fitness implies the representation of an individual's genes in future generations through his own or others' offspring. The discussion includes characteristics of food sharing among kin…

  11. Lycaenid Caterpillar Secretions Manipulate Attendant Ant Behavior

    National Research Council Canada - National Science Library

    Hojo, Masaru K; Pierce, Naomi E; Tsuji, Kazuki

    2015-01-01

    .... We show here novel effects of insect exocrine secretions produced by caterpillars in modulating the behavior of attendant ants in the food-for-defense interaction between lycaenid butterflies and ants...

  12. Acetylcholine regulates ghrelin secretion in humans

    NARCIS (Netherlands)

    F. Broglio (Fabio); E. Ghigo (Ezio); C. Gottero; F. Prodam (Flavia); S. Destefanis; A. Benso; C. Gauna (Carlotta); L.J. Hofland (Leo); E. Arvat; A-J. van der Lely (Aart-Jan); P.M. van Koetsveld (Peter)

    2004-01-01

    textabstractGhrelin secretion has been reportedly increased by fasting and energy restriction but decreased by food intake, glucose, insulin, and somatostatin. However, its regulation is still far from clarified. The cholinergic system mediates some ghrelin actions, e.g.

  13. Cell Secretion: Current Structural and Biochemical Insights

    Directory of Open Access Journals (Sweden)

    Saurabh Trikha

    2010-01-01

    Full Text Available Essential physiological functions in eukaryotic cells, such as release of hormones and digestive enzymes, neurotransmission, and intercellular signaling, are all achieved by cell secretion. In regulated (calcium-dependent secretion, membrane-bound secretory vesicles dock and transiently fuse with specialized, permanent, plasma membrane structures, called porosomes or fusion pores. Porosomes are supramolecular, cup-shaped lipoprotein structures at the cell plasma membrane that mediate and control the release of vesicle cargo to the outside of the cell. The sizes of porosomes range from 150nm in diameter in acinar cells of the exocrine pancreas to 12nm in neurons. In recent years, significant progress has been made in our understanding of the porosome and the cellular activities required for cell secretion, such as membrane fusion and swelling of secretory vesicles. The discovery of the porosome complex and the molecular mechanism of cell secretion are summarized in this article.

  14. Microbial cell surfaces and secretion systems

    NARCIS (Netherlands)

    Tommassen, J.P.M.|info:eu-repo/dai/nl/069127077; Wosten, H.A.B.|info:eu-repo/dai/nl/120693186

    2015-01-01

    Microbial cell surfaces, surface-exposed organelles, and secreted proteins are important for the interaction with the environment, including adhesion to hosts, protection against host defense mechanisms, nutrient acquisition, and intermicrobial competition. Here, we describe the structures of the

  15. Shared Contract-Obedient Endpoints

    Directory of Open Access Journals (Sweden)

    Étienne Lozes

    2012-12-01

    Full Text Available Most of the existing verification techniques for message-passing programs suppose either that channel endpoints are used in a linear fashion, where at most one thread may send or receive from an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach usually forbids the sharing of channels while the latter limits what is provable about programs. In this paper we propose a midpoint between these techniques by extending a proof system based on separation logic to allow sharing of endpoints. We identify two independent mechanisms for supporting sharing: an extension of fractional shares to endpoints, and a new technique based on what we call reflexive ownership transfer. We demonstrate on a number of examples that a linear treatment of sharing is possible.

  16. Competitive Inhibition of Renal Tubular Secretion of Gemifloxacin by Probenecid▿

    Science.gov (United States)

    Landersdorfer, Cornelia B.; Kirkpatrick, Carl M. J.; Kinzig, Martina; Bulitta, Jürgen B.; Holzgrabe, Ulrike; Drusano, George L.; Sörgel, Fritz

    2009-01-01

    Probenecid interacts with transport processes of drugs at several sites in the body. For most quinolones, renal clearance is reduced by concomitant administration of probenecid. The interaction between gemifloxacin and probenecid has not yet been studied. We studied the extent, time course, site(s), and mechanism of this interaction. Seventeen healthy volunteers participated in a randomized, two-way crossover study. Subjects received 320 mg gemifloxacin as an oral tablet without and with 4.5 g probenecid divided in eight oral doses. Drug concentrations in plasma and urine were analyzed by liquid chromatography-tandem mass spectrometry. WinNonlin was used for noncompartmental analysis, compartmental modeling, and statistics, and NONMEM was used for visual predictive checks. Concomitant administration of probenecid increased plasma gemifloxacin concentrations and amounts excreted in urine compared to baseline amounts. Data are average estimates (percent coefficients of variation). Modeling showed a competitive inhibition of the renal tubular secretion of gemifloxacin by probenecid as the most likely mechanism of the interaction. The estimated Km and Vmax for the saturable part of renal elimination were 9.16 mg/liter (20%) and 113 mg/h (21%), respectively. Based on the molar ratio, the affinity for the renal transporter was 10-fold higher for gemifloxacin than for probenecid. Since probenecid reached an ∼200-times-higher area under the molar concentration-time curve from 0 to 24 h than gemifloxacin, probenecid inhibited the active tubular secretion of gemifloxacin. Probenecid also reduced the nonrenal clearance of gemifloxacin from 25.2 (26%) to 21.0 (23%) liters/h. Probenecid inhibited the renal tubular secretion of gemifloxacin, most likely by a competitive mechanism, and slightly decreased nonrenal clearance of gemifloxacin. PMID:19564368

  17. Competitive inhibition of renal tubular secretion of gemifloxacin by probenecid.

    Science.gov (United States)

    Landersdorfer, Cornelia B; Kirkpatrick, Carl M J; Kinzig, Martina; Bulitta, Jürgen B; Holzgrabe, Ulrike; Drusano, George L; Sörgel, Fritz

    2009-09-01

    Probenecid interacts with transport processes of drugs at several sites in the body. For most quinolones, renal clearance is reduced by concomitant administration of probenecid. The interaction between gemifloxacin and probenecid has not yet been studied. We studied the extent, time course, site(s), and mechanism of this interaction. Seventeen healthy volunteers participated in a randomized, two-way crossover study. Subjects received 320 mg gemifloxacin as an oral tablet without and with 4.5 g probenecid divided in eight oral doses. Drug concentrations in plasma and urine were analyzed by liquid chromatography-tandem mass spectrometry. WinNonlin was used for noncompartmental analysis, compartmental modeling, and statistics, and NONMEM was used for visual predictive checks. Concomitant administration of probenecid increased plasma gemifloxacin concentrations and amounts excreted in urine compared to baseline amounts. Data are average estimates (percent coefficients of variation). Modeling showed a competitive inhibition of the renal tubular secretion of gemifloxacin by probenecid as the most likely mechanism of the interaction. The estimated K(m) and Vmax for the saturable part of renal elimination were 9.16 mg/liter (20%) and 113 mg/h (21%), respectively. Based on the molar ratio, the affinity for the renal transporter was 10-fold higher for gemifloxacin than for probenecid. Since probenecid reached an approximately 200-times-higher area under the molar concentration-time curve from 0 to 24 h than gemifloxacin, probenecid inhibited the active tubular secretion of gemifloxacin. Probenecid also reduced the nonrenal clearance of gemifloxacin from 25.2 (26%) to 21.0 (23%) liters/h. Probenecid inhibited the renal tubular secretion of gemifloxacin, most likely by a competitive mechanism, and slightly decreased nonrenal clearance of gemifloxacin.

  18. Protein Secretion and the Endoplasmic Reticulum

    OpenAIRE

    Benham, Adam M.

    2012-01-01

    In a complex multicellular organism, different cell types engage in specialist functions, and as a result, the secretory output of cells and tissues varies widely. Whereas some quiescent cell types secrete minor amounts of proteins, tissues like the pancreas, producing insulin and other hormones, and mature B cells, producing antibodies, place a great demand on their endoplasmic reticulum (ER). Our understanding of how protein secretion in general is controlled in the ER is now quite sophisti...

  19. Transepithelial Bicarbonate Secretion: Lessons from the Pancreas

    Science.gov (United States)

    Park, Hyun Woo; Lee, Min Goo

    2012-01-01

    Many cystic fibrosis transmembrane conductance regulator (CFTR)-expressing epithelia secrete bicarbonate (HCO3−)-containing fluids. Recent evidence suggests that defects in epithelial bicarbonate secretion are directly involved in the pathogenesis of cystic fibrosis, in particular by building up hyperviscous mucus in the ductal structures of the lung and pancreas. Pancreatic juice is one of the representative fluids that contain a very high concentration of bicarbonate among bodily fluids that are secreted from CFTR-expressing epithelia. We introduce up-to-date knowledge on the basic principles of transepithelial bicarbonate transport by showing the mechanisms involved in pancreatic bicarbonate secretion. The model of pancreatic bicarbonate secretion described herein may also apply to other exocrine epithelia. As a central regulator of bicarbonate transport at the apical membrane, CFTR plays an essential role in both direct and indirect bicarbonate secretion. The major role of CFTR in bicarbonate secretion would be variable depending on the tissue and cell type. For example, in epithelial cells that produce a low concentration of bicarbonate-containing fluid (up to 80 mm), either CFTR-dependent Cl−/HCO3− exchange or CFTR anion channel with low bicarbonate permeability would be sufficient to generate such fluid. However, in cells that secrete high-bicarbonate-containing fluids, a highly selective CFTR bicarbonate channel activity is required. Therefore, understanding the molecular mechanism of transepithelial bicarbonate transport and the role of CFTR in each specific epithelium will provide therapeutic strategies to recover from epithelial defects induced by hyposecretion of bicarbonate in cystic fibrosis. PMID:23028131

  20. Peptides and neurotransmitters that affect renin secretion

    Science.gov (United States)

    Ganong, W. F.; Porter, J. P.; Bahnson, T. D.; Said, S. I.

    1984-01-01

    Substance P inhibits renin secretion. This polypeptide is a transmitter in primary afferent neurons and is released from the peripheral as well as the central portions of these neurons. It is present in afferent nerves from the kidneys. Neuropeptide Y, which is a cotransmitter with norepinephrine and epinephrine, is found in sympathetic neurons that are closely associated with and presumably innervate the juxtagolmerular cells. Its effect on renin secretion is unknown, but it produces renal vasoconstriction and natriuresis. Vasoactive intestinal polypeptide (VIP) is a cotransmitter with acetylocholine in cholinergic neurons, and this polypeptide stimulates renin secretion. We cannot find any evidence for its occurence in neurons in the kidneys, but various stimuli increase plasma VIP to levels comparable to those produced by doses of exogenous VIP which stimulated renin secretion. Neostigmine increases plasma VIP and plasma renin activity, and the VIP appears to be responsible for the increase in renin secretion, since the increase is not blocked by renal denervation or propranolol. Stimulation of various areas in the brain produces sympathetically mediated increases in plasma renin activity associated with increases in blood pressure. However, there is pharmacological evidence that the renin response can be separated from the blood pressure response. In anaesthetized dogs, drugs that increase central serotonergic discharge increase renin secretion without increasing blood pressure. In rats, activation of sertonergic neurons in the dorsal raphe nucleus increases renin secretion by a pathway that projects from this nucleus to the ventral hypothalamus, and from there to the kidneys via the sympathetic nervous system. The serotonin releasing drug parachloramphetamine also increases plasma VIP, but VIP does not appear to be the primary mediator of the renin response. There is preliminary evidence that the serotonergic neurons in the dorsal raphe nucleus are part of the

  1. Reduced insulin secretion and glucose intolerance are involved in the fasting susceptibility of common vampire bats.

    Science.gov (United States)

    Freitas, Mariella B; Queiroz, Joicy F; Dias Gomes, Carolinne I; Collares-Buzato, Carla B; Barbosa, Helena C; Boschero, Antonio C; Gonçalves, Carlos A; Pinheiro, Eliana C

    2013-03-01

    Susceptibility during fasting has been reported for the common vampire bat (Desmodus rotundus), to the point of untimely deaths after only 2-3 nights of fasting. To investigate the underlying physiology of this critical metabolic condition, we analyzed serum insulin levels, pancreatic islets morphometry and immunocytochemistry (ICC), static insulin secretion in pancreas fragments, and insulin signaling mechanism in male vampire bats. A glucose tolerance test (ipGTT) was also performed. Serum insulin was found to be lower in fed vampires compared to other mammals, and was significantly reduced after 24h fasting. Morphometrical analyses revealed small irregular pancreatic islets with reduced percentage of β-cell mass compared to other bats. Static insulin secretion analysis showed that glucose-stimulated insulin secretion was impaired, as insulin levels did not reach significance under high glucose concentrations, whereas the response to the amino acid leucin was preserved. Results from ipGTT showed a failure on glucose clearance, indicating glucose intolerance due to diminished pancreatic insulin secretion and/or decreased β-cell response to glucose. In conclusion, data presented here indicate lower insulinemia and impaired insulin secretion in D. rotundus, which is consistent with the limited ability to store body energy reserves, previously reported in these animals. Whether these metabolic and hormonal features are associated with their blood diet remains to be determined. The peculiar food sharing through blood regurgitation, reported to this species, might be an adaptive mechanism overcoming this metabolic susceptibility. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Cholecystokinin inhibits gastrin secretion independently of paracrine somatostatin secretion in the pig

    DEFF Research Database (Denmark)

    Schmidt, P T; Hansen, L; Hilsted, L

    2004-01-01

    BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...

  3. Development of secreted proteins as biotherapeutic agents.

    Science.gov (United States)

    Bonin-Debs, Angelika L; Boche, Irene; Gille, Hendrik; Brinkmann, Ulrich

    2004-04-01

    As one of the most important classes of proteins, secreted factors account for about one-tenth of the human genome, 3000 - 4000 in total, including factors of signalling pathways, blood coagulation and immune defence, as well as digestive enzymes and components of the extracellular matrix. Secreted proteins are a rich source of new therapeutics and drug targets, and are currently the focus of major drug discovery programmes throughout the industry. Many of the most important novel drugs developed in biotechnology have resulted from the application of secreted proteins as therapeutics. Secreted proteins often circulate throughout the body and, therefore, have access to most organs and tissues. Because of that, many of the factors are themselves therapeutic agents. This paper gives an overview on the features and functions of human secreted proteins and peptides, as well as strategies by which to discover additional therapeutic proteins from the human 'secretome'. Furthermore, a variety of examples are provided for the therapeutic use of recombinant secreted proteins as 'biologicals', including features and applications of recombinant antibodies, erythropoietin, insulin, interferon, plasminogen activators, growth hormone and colony-stimulating factors.

  4. Substrate adaptation of Trichophyton rubrum secreted endoproteases.

    Science.gov (United States)

    Chen, Jian; Yi, Jinling; Liu, Li; Yin, Songchao; Chen, Rongzhang; Li, Meirong; Ye, Congxiu; Zhang, Yu-qing; Lai, Wei

    2010-02-01

    Trichophyton rubrum is the most common pathogen caused the dermatophytosis of nail and skin in human. The secreted proteases were considered to be the most important virulence factors. However, the substrates adaptation of T. rubrum secreted proteases is largely unknown. For the first time, we use the keratins from human nail and skin stratum corneum as the growth medium to investigate the different expression patterns of T. rubrum secreted endoproteases genes. During grow in both keratin-containing media SUB7 and MEP2 were the highest expressed gene in each family. These results indicated that SUB7 and MEP2 may be the dominant endoproteases secreted by T. rubrum during host infection and the other proteases may play a supplementary role. The direct comparison of T. rubrum grown on skin and nail medium showed different substrate favorite of secreted endoproteases. The genes MEP2, SUB5, SUB2 and SUB3 were more active during growth in skin medium, possibly these proteases have a higher affinity for skin original keratins. While the structures of SUB1, SUB4, and MEP4 maybe more suitable for the degradation of nail original keratins. This work presents useful molecular details for further understanding the pathogenesis of secreted proteases and the wide adaptation of T. rubrum.

  5. High levels of DegU-P activate an Esat-6-like secretion system in Bacillus subtilis.

    Directory of Open Access Journals (Sweden)

    Catarina Baptista

    Full Text Available The recently discovered Type VII/Esat-6 secretion systems seem to be widespread among bacteria of the phyla Actinobacteria and Firmicutes. In some species they play an important role in pathogenic interactions with eukaryotic hosts. Several studies have predicted that the locus yukEDCByueBC of the non-pathogenic, Gram-positive bacterium Bacillus subtilis would encode an Esat-6-like secretion system (Ess. We provide here for the first time evidences for the functioning of this secretion pathway in an undomesticated B. subtilis strain. We show that YukE, a small protein with the typical features of the secretion substrates from the WXG100 superfamily is actively secreted to culture media. YukE secretion depends on intact yukDCByueBC genes, whose products share sequence or structural homology with known components of the S. aureus Ess. Biochemical characterization of YukE indicates that it exists as a dimer both in vitro and in vivo. We also show that the B. subtilis Ess essentially operates in late stationary growth phase in absolute dependence of phosphorylated DegU, the response regulator of the two-component system DegS-DegU. We present possible reasons that eventually have precluded the study of this secretion system in the B. subtilis laboratory strain 168.

  6. Glycosylation in secreted proteins from yeast Kluyveromyces lactis

    Energy Technology Data Exchange (ETDEWEB)

    Santos, A.V.; Passos, F.M.L. [Universidade Federal de Vicosa (UFV), MG (Brazil). Dept. de Microbiologia. Lab. de Fisiologia de Microrganismos; Azevedo, B.R.; Pimenta, A.M.C.; Santoro, M.M. [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Bioquimica e Imunologia. Lab. de Enzimologia e Fisico-Quimica de Proteina

    2008-07-01

    Full text: The nutritional status of a cell culture affects either the expression or the traffic of a number of proteins. The identification of the physiological conditions which favor protein secretion has important biotechnological consequences in designing systems for recombinant extracellular protein industrial production. Yeast Kluyvromyces lactis has been cultured in a continuous stirring tank bioreactor (CSTR) under nitrogen limitation at growth rates (0.03 h{sup -1} and 0.09 h{sup -1}) close to either exponential or stationary batch growth phases, respectively the objective was to investigate the extracellular glycoproteins at these two level of nitrogen limitation. Proteins from free cell extracts were separated by gradient SDS-PAGE (5-15%) and two-dimensional chromatography, and were analyzed by mass spectrometry (MALDI-TOF-TOF-MS). In SDS-PAGE analysis, differences in extracellular proteome were visualized: different proteins profiles at these two growth rates. The 0.09 h-1 growth rate showed larger number of bands using colloidal Coma ssie Blue staining. Different bands were detected at these two growth rates when the PAS assay for glycoprotein detection in polyacrylamide gel was used. The two-dimensional chromatogram profiles were comparatively distinguished between the 0.03 h{sup -1} and 0.09 h{sup -1} growth rate samples. Protein peaks from the second dimension, were subjected to mass spectrometry. The mass spectrums visualized showed glycosylated proteins with N-acetylglucosamine molecules and 8, 9 or 15 hexoses molecules. Comparisons between the proteins averaged mass values with the deduced proteins masses from K. lactis secreted proteins database indicated possible post-translational modifications, such as post-translational proteolysis, acetylation, deamidation and myristoylation.

  7. Visual cognition

    National Research Council Canada - National Science Library

    Cavanagh, Patrick

    2011-01-01

    ... is unified in our mind even if not in the image. The construction of these entities is the task of visual cognition and, in almost all cases, each construct is a choice among an infinity of possibilities, chosen based on likelihood, bias, or a whim, but chosen by rejecting other valid competitors. The entities are not limited to static surfaces or structures but also include dynamic structures that only emerge over time – from dots that appear to be walking like a human or a moon orbiting a planet, to the...

  8. Type VI Secretion System in Pseudomonas aeruginosa

    Science.gov (United States)

    Hachani, Abderrahman; Lossi, Nadine S.; Hamilton, Alexander; Jones, Cerith; Bleves, Sophie; Albesa-Jové, David; Filloux, Alain

    2011-01-01

    Pseudomonas aeruginosa is a Gram-negative bacterium causing chronic infections in cystic fibrosis patients. Such infections are associated with an active type VI secretion system (T6SS), which consists of about 15 conserved components, including the AAA+ ATPase, ClpV. The T6SS secretes two categories of proteins, VgrG and Hcp. Hcp is structurally similar to a phage tail tube component, whereas VgrG proteins show similarity to the puncturing device at the tip of the phage tube. In P. aeruginosa, three T6SSs are known. The expression of H1-T6SS genes is controlled by the RetS sensor. Here, 10 vgrG genes were identified in the PAO1 genome, among which three are co-regulated with H1-T6SS, namely vgrG1a/b/c. Whereas VgrG1a and VgrG1c were secreted in a ClpV1-dependent manner, secretion of VgrG1b was ClpV1-independent. We show that VgrG1a and VgrG1c form multimers, which confirmed the VgrG model predicting trimers similar to the tail spike. We demonstrate that Hcp1 secretion requires either VgrG1a or VgrG1c, which may act independently to puncture the bacterial envelope and give Hcp1 access to the surface. VgrG1b is not required for Hcp1 secretion. Thus, VgrG1b does not require H1-T6SS for secretion nor does H1-T6SS require VgrG1b for its function. Finally, we show that VgrG proteins are required for secretion of a genuine H1-T6SS substrate, Tse3. Our results demonstrate that VgrG proteins are not only secreted components but are essential for secretion of other T6SS substrates. Overall, we emphasize variability in behavior of three P. aeruginosa VgrGs, suggesting that, although very similar, distinct VgrGs achieve specific functions. PMID:21325275

  9. One Share-One Vote

    DEFF Research Database (Denmark)

    Poulsen, Thomas; Eklund, Johan E.

    Shares with more voting rights than cash flow rights provide their owners with a disproportional influence that is often found to destroy the value of outside equity. This is taken as evidence of discretionary use of power. However, concentration of power does not necessarily result from control...... enhancing mechanisms; it could also be that some shareholders retain a large block in a one share-one vote structure. In this paper, we develop a methodology to disentangle disproportionality, which allows us to test the effect of deviations from one share-one vote more precisely. Our empirical findings add...

  10. i-Review: Sharing Code

    Directory of Open Access Journals (Sweden)

    Jonas Kubilius

    2014-02-01

    Full Text Available Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF. GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  11. How information visualization novices construct visualizations.

    Science.gov (United States)

    Grammel, Lars; Tory, Melanie; Storey, Margaret-Anne

    2010-01-01

    It remains challenging for information visualization novices to rapidly construct visualizations during exploratory data analysis. We conducted an exploratory laboratory study in which information visualization novices explored fictitious sales data by communicating visualization specifications to a human mediator, who rapidly constructed the visualizations using commercial visualization software. We found that three activities were central to the iterative visualization construction process: data attribute selection, visual template selection, and visual mapping specification. The major barriers faced by the participants were translating questions into data attributes, designing visual mappings, and interpreting the visualizations. Partial specification was common, and the participants used simple heuristics and preferred visualizations they were already familiar with, such as bar, line and pie charts. We derived abstract models from our observations that describe barriers in the data exploration process and uncovered how information visualization novices think about visualization specifications. Our findings support the need for tools that suggest potential visualizations and support iterative refinement, that provide explanations and help with learning, and that are tightly integrated into tool support for the overall visual analytics process.

  12. COAST Map Sharing Plugin Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose the development of a capability which will allow ecosystem managers to share a map view in terms of location, magnification level, and data layers (to...

  13. Knowledge Sharing and National Culture

    DEFF Research Database (Denmark)

    Michailova, Snejina; Hutchings, Kate

    2004-01-01

    the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... and particularist social relations facilitate knowledge sharing. We also maintainthat there are important differences between China and Russia in terms of motivation forknowledge sharing and propose that the differences between the two countries in terms of originsof collectivism and degree of collectivism impact...

  14. Positive train control shared network.

    Science.gov (United States)

    2015-05-01

    The Interoperable Train Control (ITC) Positive : Train Control (PTC) Shared Network (IPSN) : project investigated anticipated industry benefits : and the level of support for the development of : a hosted technological platform for PTC : messaging ac...

  15. The Precategorical Nature of Visual Short-Term Memory

    Science.gov (United States)

    Quinlan, Philip T.; Cohen, Dale J.

    2016-01-01

    We conducted a series of recognition experiments that assessed whether visual short-term memory (VSTM) is sensitive to shared category membership of to-be-remembered (tbr) images of common objects. In Experiment 1 some of the tbr items shared the same basic level category (e.g., hand axe): Such items were no better retained than others. In the…

  16. Developing SharePoint applications

    OpenAIRE

    Rupnik, Gašper

    2011-01-01

    The thesis includes a research on SharePoint 2010 programming capabilities and a display of products created by this knowledge. The introduction part includes background information on how the topic was chosen and how the thesis was developed. The second chapter presents the SharePoint platform, which includes a description of its structure, function and usability. The third chapter focuses solely on the programming of the platform. First, some of the most useful software tools for i...

  17. Information Sharing and Environmental Policies

    Directory of Open Access Journals (Sweden)

    Nikos Tsakiris

    2010-10-01

    Full Text Available Based on the assumption that in a standard eco-dumping model governments are uncertain about future product demand and allowing governments to obtain information from firms, we examine governments’ and firms’ incentives to share information. We show that when governments regulate polluting firms through emission standards, then governments and firms will reach an agreement concerning information sharing. The opposite holds when governments regulate pollution through emission taxes.

  18. Cost-Sharing and Productivity

    OpenAIRE

    Gibson, Teresa B.; A. Mark Fendrick; Chernew, Michael E.

    2012-01-01

    A growing body of literature examines the cross price elasticities between different health care services. For example, increasing the patient out of pocket price for some health care services increases the utilization of other health care services. Yet, the literature has generally ignored the connection between cost sharing for health care services and labor market outcomes. This paper examines the direction and magnitude of the reduced form relationship between patient cost-sharing and wor...

  19. Shared Year Exchange in Nursing

    DEFF Research Database (Denmark)

    Vedsegaard, Helle Wendner; Wederkinck, Elisabeth

    2010-01-01

    Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien.......Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien....

  20. The value of shared services.

    Science.gov (United States)

    Wallace, Beverly B

    2011-07-01

    A multisite shared services organization, combined with a robust business continuity plan, provides infrastructure and redundancies that mitigate risk for hospital CFOs. These structures can position providers to do the following: move essential operations out of a disaster impact zone, if necessary. Allow resources to focus on immediate patient care needs. Take advantage of economies of scale in temporary staffing. Leverage technology. Share in investments in disaster preparedness and business continuity solutions

  1. Effects of endothelin family on ANP secretion.

    Science.gov (United States)

    Yuan, Kuichang; Park, Byung Mun; Choi, Young Tae; Kim, Jong Hun; Cho, Kyung Woo; Kim, Suhn Hee

    2016-08-01

    The endothelins (ET) peptide family consists of ET-1, ET-2, ET-3, and sarafotoxin (s6C, a snake venom) and their actions appears to be different among isoforms. The aim of this study was to compare the secretagogue effect of ET-1 on atrial natriuretic peptide (ANP) secretion with ET-3 and evaluate its physiological meaning. Isolated nonbeating atria from male Sprague-Dawley rats were used to evaluate stretch-activated ANP secretion in response to ET-1, ET-2, ET-3, and s6C. Changes in mean blood pressure (MAP) were measured during acute injection of ET-1 and ET-3 with and without natriuretic peptide receptor-A antagonist (A71915) in anesthetized rats. Changes in atrial volume induced by increased atrial pressure from o to 1, 2, 4, or 6cm H2O caused proportional increases in mechanically-stimulated extracellular fluid (ECF) translocation and stretch-activated ANP secretion. ET-1 (10nM) augmented basal and stretch-activated ANP secretion in terms of ECF translocation, which was blocked by the pretreatment with ETA receptor antagonist (BQ123, 1μM) but not by ETB receptor antagonist (BQ788, 1μM). ETA receptor antagonist itself suppressed stretch-activated ANP secretion. As compared to ET-1- induced ANP secretion (3.2-fold by 10nM), the secretagogue effects of ANP secretion by ET-2 was similar (2.8-fold by 10nM) and ET-3 and s6C were less potent (1.7-fold and 1.5-fold by 100nM, respectively). Acute injection of ET-1 or ET-3 increased mean blood pressure (MAP), which was augmented in the presence of natriuretic peptide receptor-A antagonist. Therefore, we suggest that the order of secretagogue effect of ET family on ANP secretion was ET-1≥ET-2>ET-3>s6C and ET-1-induced ANP secretion negatively regulates the pressor effect of ET-1. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Type VI Secretion System in Pseudomonas aeruginosa SECRETION AND MULTIMERIZATION OF VgrG PROTEINS

    NARCIS (Netherlands)

    Hachani, Abderrahman; Lossi, Nadine S.; Hamilton, Alexander; Jones, Cerith; Bleves, Sophie; Albesa-Jove, David; Filloux, Alain

    2011-01-01

    Pseudomonas aeruginosa is a Gram-negative bacterium causing chronic infections in cystic fibrosis patients. Such infections are associated with an active type VI secretion system (T6SS), which consists of about 15 conserved components, including the AAA(+) ATPase, ClpV. The T6SS secretes two

  3. Characterization of Nops, nodulation outer proteins, secreted via the type III secretion system of NGR234.

    Science.gov (United States)

    Marie, Corinne; Deakin, William J; Viprey, Virginie; Kopciñska, Joanna; Golinowski, Wladyslaw; Krishnan, Hari B; Perret, Xavier; Broughton, William J

    2003-09-01

    The nitrogen-fixing symbiotic bacterium Rhizobium species NGR234 secretes, via a type III secretion system (TTSS), proteins called Nops (nodulation outer proteins). Abolition of TTSS-dependent protein secretion has either no effect or leads to a change in the number of nodules on selected plants. More dramatically, Nops impair nodule development on Crotalaria juncea roots, resulting in the formation of nonfixing pseudonodules. A double mutation of nopX and nopL, which code for two previously identified secreted proteins, leads to a phenotype on Pachyrhizus tuberosus differing from that of a mutant in which the TTSS is not functional. Use of antibodies and a modification of the purification protocol revealed that NGR234 secretes additional proteins in a TTSS-dependent manner. One of them was identified as NopA, a small 7-kDa protein. Single mutations in nopX and nopL were also generated to assess the involvement of each Nop in protein secretion and nodule formation. Mutation of nopX had little effect on NopL and NopA secretion but greatly affected the interaction of NGR234 with many plant hosts tested. NopL was not necessary for the secretion of any Nops but was required for efficient nodulation of some plant species. NopL may thus act as an effector protein whose recognition is dependent upon the hosts' genetic background.

  4. Functional anatomy and physiology of gastric secretion.

    Science.gov (United States)

    Schubert, Mitchell L

    2015-11-01

    This review summarizes the past year's literature regarding the neuroendocrine and intracellular regulation of gastric acid secretion, discussing both basic and clinical aspects. Gastric acid facilitates the digestion of protein as well as the absorption of iron, calcium, vitamin B12, and certain medications. High acidity kills ingested microorganisms and limits bacterial overgrowth, enteric infection, and possibly spontaneous bacterial peritonitis. The main stimulants of acid secretion are gastrin, released from antral gastrin cells; histamine, released from oxyntic enterochromaffin-like cells; and acetylcholine, released from antral and oxyntic intramural neurons. Ghrelin and coffee also stimulate acid secretion whereas somatostatin, cholecystokinin, glucagon-like peptide-1, and atrial natriuretic peptide inhibit acid secretion. Although 95% of parietal cells are contained within the oxyntic mucosa (fundus and body), 50% of human antral glands contain parietal cells. Proton pump inhibitors are considered well tolerated drugs, but concerns have been raised regarding dysbiosis, atrophic gastritis, hypergastrinemia, hypomagnesemia, and enteritis/colitis. Our understanding of the functional anatomy and physiology of gastric secretion continues to advance. Such knowledge is crucial for improved management of acid-peptic disorders, prevention and management of neoplasia, and the development of novel medications.

  5. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melaton...... secretion in these patients. Remifentanil did not affect melatonin secretion but was associated with lower risk of atypical sleep pattern. REM sleep was only registered during the period of nonsedation.......Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...... secretion and sleep patterns differed in these patients with and without remifentanil infusion. Eight patients were included. Blood-melatonin was taken every 4th hour, and polysomnography was carried out continually during a 48-hour period. American Academy of Sleep Medicine criteria were used for sleep...

  6. Visual analytics in scalable visualization environments

    OpenAIRE

    Yamaoka, So

    2011-01-01

    Visual analytics is an interdisciplinary field that facilitates the analysis of the large volume of data through interactive visual interface. This dissertation focuses on the development of visual analytics techniques in scalable visualization environments. These scalable visualization environments offer a high-resolution, integrated virtual space, as well as a wide-open physical space that affords collaborative user interaction. At the same time, the sheer scale of these environments poses ...

  7. Visualization rhetoric: framing effects in narrative visualization.

    Science.gov (United States)

    Hullman, Jessica; Diakopoulos, Nicholas

    2011-12-01

    Narrative visualizations combine conventions of communicative and exploratory information visualization to convey an intended story. We demonstrate visualization rhetoric as an analytical framework for understanding how design techniques that prioritize particular interpretations in visualizations that "tell a story" can significantly affect end-user interpretation. We draw a parallel between narrative visualization interpretation and evidence from framing studies in political messaging, decision-making, and literary studies. Devices for understanding the rhetorical nature of narrative information visualizations are presented, informed by the rigorous application of concepts from critical theory, semiotics, journalism, and political theory. We draw attention to how design tactics represent additions or omissions of information at various levels-the data, visual representation, textual annotations, and interactivity-and how visualizations denote and connote phenomena with reference to unstated viewing conventions and codes. Classes of rhetorical techniques identified via a systematic analysis of recent narrative visualizations are presented, and characterized according to their rhetorical contribution to the visualization. We describe how designers and researchers can benefit from the potentially positive aspects of visualization rhetoric in designing engaging, layered narrative visualizations and how our framework can shed light on how a visualization design prioritizes specific interpretations. We identify areas where future inquiry into visualization rhetoric can improve understanding of visualization interpretation. © 2011 IEEE

  8. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...... secretion and sleep patterns differed in these patients with and without remifentanil infusion. Eight patients were included. Blood-melatonin was taken every 4th hour, and polysomnography was carried out continually during a 48-hour period. American Academy of Sleep Medicine criteria were used for sleep...... scoring if sleep patterns were identified; otherwise, Watson's classification was applied. As remifentanil was periodically administered during the study, its effect on melatonin and sleep was assessed. Melatonin secretion in these patients followed a phase-delayed diurnal curve. We did not observe any...

  9. Standpoints and protection of business secrets

    Directory of Open Access Journals (Sweden)

    Brane Bertoncelj

    2001-06-01

    Full Text Available The human impact on an information system where data bases, containing business secretes, are stored is one of the most unreliable and unforeseeable factors. For this reason, it must not be underestimated. The results of this study indicate a correlation between behavioural intention and protection of business secretes. There is a statistically significant correlation between behavioural intention and behavioural supervision. This means that an increased level of perceived supervision over one's own behaviour is related to behavioural intention. A great majority of participants would not divulge a business secret due to internal moral factors, i.e., they possess the appropriate capabilities to determine the advantages of social moral values over personal values.

  10. Targeted Secretion Inhibitors—Innovative Protein Therapeutics

    Directory of Open Access Journals (Sweden)

    Foster Keith

    2010-12-01

    Full Text Available Botulinum neurotoxins are highly effective therapeutic products. Their therapeutic success results from highly specific and potent inhibition of neurotransmitter release with a duration of action measured in months. These same properties, however, make the botulinum neurotoxins the most potent acute lethal toxins known. Their toxicity and restricted target cell activity severely limits their clinical utility. Understanding the structure-function relationship of the neurotoxins has enabled the development of recombinant proteins selectively incorporating specific aspects of their pharmacology. The resulting proteins are not neurotoxins, but a new class of biopharmaceuticals, Targeted Secretion Inhibitors (TSI, suitable for the treatment of a wide range of diseases where secretion plays a major role. TSI proteins inhibit secretion for a prolonged period following a single application, making them particularly suited to the treatment of chronic diseases. A TSI for the treatment of chronic pain is in clinical development.

  11. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  12. Display Sharing: An Alternative Paradigm

    Science.gov (United States)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  13. Visual Culture and the anthropological insight

    Directory of Open Access Journals (Sweden)

    Ricardo Campos

    2012-06-01

    Full Text Available With this paper we intend to reflect on the possibilities of a closer relationship between the discipline of Anthropology and the interdisciplinary field of Visual Culture. If it is true that, although residual, the presence of the visual sphere has always been a crucial feature in the history of anthropology, it also seems clear that the connection between image and this scientific discipline has been essentially constructed on the basis of a practical use of the visual technologies (photography, cinema, video. Thus the importance granted to the visual methodologies in fieldwork and the consequent production of visual documents (ethnographic films, photoessays, etc.. Currently the field of Visual Culture, forged at the crossroads of multiple disciplinary interests and assets, suggests that the visual dimension in human culture is highly complex, making way to new approaches informed by different perspectives and theoretical and methodological frameworks. In this context, we believe that anthropology, with its prime methodological practice - ethnography – has something to say. It can contribute to thicken the debates around human visuality, regarding essentially the social processes of visual production, sharing and consumption.

  14. DBSecSys 2.0: a database of Burkholderia mallei and Burkholderia pseudomallei secretion systems.

    Science.gov (United States)

    Memišević, Vesna; Kumar, Kamal; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques

    2016-09-20

    Burkholderia mallei and B. pseudomallei are the causative agents of glanders and melioidosis, respectively, diseases with high morbidity and mortality rates. B. mallei and B. pseudomallei are closely related genetically; B. mallei evolved from an ancestral strain of B. pseudomallei by genome reduction and adaptation to an obligate intracellular lifestyle. Although these two bacteria cause different diseases, they share multiple virulence factors, including bacterial secretion systems, which represent key components of bacterial pathogenicity. Despite recent progress, the secretion system proteins for B. mallei and B. pseudomallei, their pathogenic mechanisms of action, and host factors are not well characterized. We previously developed a manually curated database, DBSecSys, of bacterial secretion system proteins for B. mallei. Here, we report an expansion of the database with corresponding information about B. pseudomallei. DBSecSys 2.0 contains comprehensive literature-based and computationally derived information about B. mallei ATCC 23344 and literature-based and computationally derived information about B. pseudomallei K96243. The database contains updated information for 163 B. mallei proteins from the previous database and 61 additional B. mallei proteins, and new information for 281 B. pseudomallei proteins associated with 5 secretion systems, their 1,633 human- and murine-interacting targets, and 2,400 host-B. mallei interactions and 2,286 host-B. pseudomallei interactions. The database also includes information about 13 pathogenic mechanisms of action for B. mallei and B. pseudomallei secretion system proteins inferred from the available literature or computationally. Additionally, DBSecSys 2.0 provides details about 82 virulence attenuation experiments for 52 B. mallei secretion system proteins and 98 virulence attenuation experiments for 61 B. pseudomallei secretion system proteins. We updated the Web interface and data access layer to speed-up users

  15. Lubiprostone Stimulates Duodenal Bicarbonate Secretion in Rats

    OpenAIRE

    Mizumori, Misa; Akiba, Yasutada; Kaunitz, Jonathan D

    2009-01-01

    Background Lubiprostone, a bicyclic fatty acid, is used for the treatment of chronic constipation. No published study has addressed the effect of lubiprostone on intestinal ion secretion in vivo. Aim The aim of this study was to test the hypothesis that lubiprostone augments duodenal HCO3 ? secretion (DBS). Methods Rat proximal duodenal loops were perfused with pH 7.0 Krebs, control vehicle (medium-chain triglycerides), or lubiprostone (0.1?10??M). We measured DBS with flow-through pH and CO2...

  16. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  17. Visualizing Entropy

    Science.gov (United States)

    Lechner, Joseph H.

    1999-10-01

    This report describes two classroom activities that help students visualize the abstract concept of entropy and apply the second law of thermodynamics to real situations. (i) A sealed "rainbow tube" contains six smaller vessels, each filled with a different brightly colored solution (low entropy). When the tube is inverted, the solutions mix together and react to form an amorphous precipitate (high entropy). The change from low entropy to high entropy is irreversible as long as the tube remains sealed. (ii) When U.S. currency is withdrawn from circulation, intact bills (low entropy) are shredded into small fragments (high entropy). Shredding is quick and easy; the reverse process is clearly nonspontaneous. It is theoretically possible, but it is time-consuming and energy-intensive, to reassemble one bill from a pile that contains fragments of hundreds of bills. We calculate the probability P of drawing pieces of only one specific bill from a mixture containing one pound of bills, each shredded into n fragments. This result can be related to Boltzmann's entropy formula S?=klnW.

  18. Vibrio chromosomes share common history

    Directory of Open Access Journals (Sweden)

    Gevers Dirk

    2010-05-01

    Full Text Available Abstract Background While most gamma proteobacteria have a single circular chromosome, Vibrionales have two circular chromosomes. Horizontal gene transfer is common among Vibrios, and in light of this genetic mobility, it is an open question to what extent the two chromosomes themselves share a common history since their formation. Results Single copy genes from each chromosome (142 genes from chromosome I and 42 genes from chromosome II were identified from 19 sequenced Vibrionales genomes and their phylogenetic comparison suggests consistent phylogenies for each chromosome. Additionally, study of the gene organization and phylogeny of the respective origins of replication confirmed the shared history. Conclusions Thus, while elements within the chromosomes may have experienced significant genetic mobility, the backbones share a common history. This allows conclusions based on multilocus sequence analysis (MLSA for one chromosome to be applied equally to both chromosomes.

  19. Knowledge Sharing is Knowledge Creation

    DEFF Research Database (Denmark)

    Greve, Linda

    2015-01-01

    Knowledge sharing and knowledge transfer are important to knowledge communication. However when groups of knowledge workers engage in knowledge communication activities, it easily turns into mere mechanical information processing despite other ambitions. This article relates literature of knowledge...... communication and knowledge creation to an intervention study in a large Danish food production company. For some time a specific group of employees uttered a wish for knowledge sharing, but it never really happened. The group was observed and submitted to metaphor analysis as well as analysis of co......-creation strategies. Confronted with the results, the group completely altered their approach to knowledge sharing and let it become knowledge co-creation. The conclusions are, that knowledge is and can only be a diverse and differentiated concept, and that groups are able to embrace this complexity. Thus rather than...

  20. Data sharing for pharmacokinetic studies.

    Science.gov (United States)

    Anderson, Brian J; Merry, Alan F

    2009-10-01

    Pooling data from different pediatric studies can provide a single robust pharmacokinetic analysis that allows covariate analysis and hypothesis testing. Data sharing should be driven by the altruistic purpose of improving drug understanding to the clinical benefit of children. Electronic communications have rendered the sharing of data relatively easy, and data sharing within the wider scientific community has become commonplace. Data sharing allows verification of results, save costs and time, allows new interpretation of old data, and can fulfill teaching benefits. It may stimulate cooperative competition between researchers and allow individual researchers to concentrate on unique aspects of the scientific puzzle. However, there is occasionally a reluctance to share, in part because of fear of others stealing the hard work of a research group, which may not be recognized in subsequent publications that reuse data. Providing data may require additional effort for presentation in a suitable format. Data may be abused or used for purposes other than those for which they were collected. Propriety claims may limit access to industry-sponsored drug research. The question of who has ownership of data is contentious. Investigators often consider data they have collected to be their own property. Reputations and grants may be hinge on ownership of a data set. However, other team members, institutions, funding agencies, and the public also have a stake. The difficulties identified in the general scientific community also apply to data sharing for pediatric pharmacokinetic studies. There are few clearly established rules at present, and consideration of the issues hinges on ethical and philosophical arguments. The development of databases will depend on collaboration and cooperation and greater clarity and consensus over appropriate processes and procedures.

  1. Sharing best practice in partnerships

    DEFF Research Database (Denmark)

    Mosgaard, Mette; Remmen, Arne; Pedersen, Claus Stig

    upstream in the supply chain, and “business development” of sustainable products and product service systems. Sharing best practice in partnerships is an example of the latter, but Supply Chain Management goes beyond product chains and into partnerships where the focus is not on one main company......In this paper, the promotion of sustainable products through the sharing of best practices in product chains is examined. The general understanding is that the interactions in the supply chain are changing from a traditional focus on the supply of goods “just in time” towards a focus on value...

  2. Melatonin and cortisol secretion profile in patients with pineal cyst before and after pineal cyst resection.

    Science.gov (United States)

    Májovský, Martin; Řezáčová, Lenka; Sumová, Alena; Pospíšilová, Lenka; Netuka, David; Bradáč, Ondřej; Beneš, Vladimír

    2017-05-01

    A pineal cyst is a benign affection of the human pineal gland on the borderline between pathology and normality. Only a small percentage of patients present with symptoms and a surgical treatment is indicated in highly selected cases. A melatonin secretion in patients with a pineal cyst before and after a pineal cyst resection has not been studied yet and the effect of surgery on human metabolism is unknown. The present study examined melatonin, cortisol and blood glucose secretion profiles perioperatively in a surgical group of 4 patients. The control group was represented by 3 asymptomatic patients with a pineal cyst. For each patient, 24-h circadian secretion curves of melatonin, cortisol and glycemia were acquired. An analysis of melatonin profiles showed an expected diurnal pattern with the night peak in patients before the surgery and in the control group. In contrast, melatonin levels in patients after the surgery were at their minimum throughout the whole 24-h period. The cortisol secretion was substantially increased in patients after the surgery. Blood glucose sampling showed no statistically significant differences. Clinical results demonstrated statistically significant headache relief measured by Visual Analogue Scale in patients after the surgery. Despite the small number of examined patients, we can conclude that patients with a pineal cyst preserved the physiological secretion of the hormone melatonin while patients who underwent the pineal cyst resection experienced a loss of endogenous pineal melatonin production, which equated with pinealectomy. Surprisingly, cortisol secretion substantially increased in patients after the surgery. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Factors influencing insulin secretion from encapsulated islets

    NARCIS (Netherlands)

    de Haan, BJ; Faas, MM; de Vos, P

    2003-01-01

    Adequate regulation of glucose levels by a microencapsulated pancreatic islet graft requires a minute-to-minute regulation of blood glucose. To design such a transplant, it is mandatory to have sufficient insight in factors influencing the kinetics of insulin secretion by encapsulated islets. The

  4. Vesicular secretion of auxin: Evidences and implications.

    Science.gov (United States)

    Baluska, Frantisek; Schlicht, Markus; Volkmann, Dieter; Mancuso, Stefano

    2008-04-01

    The plant hormone auxin is secreted in root apices via phospholipase Dzeta2 (PLDzeta2) activity which produces specific population of phosphatidic acid that stimulates secretion of vesicles enriched with auxin. These vesicles were reported to be localized at plant synapses which are active in auxin secretion, especially at the transition zone of the root apex. There are several implications of this vesicular secretion of auxin. In root apices, auxin emerges as plant neurotransmitter-like signal molecule which coordinates activities of adjacent cells via electric and chemical signaling. Putative quantal release of auxin after electrical stimulation, if confirmed, would be part of neuronal communication between plant cells. As auxin transport across plant synapses is tightly linked with integrated sensory perception of environment, especially of omnipresent gravity and light, this process is proposed to mediate the plant perception of environment. These neuronal features allow sessile plants to integrate multitude of sensory signals into the adaptive behavior of whole plants and the animal-like exploratory behavior of growing roots.

  5. Secret Shopping as User Experience Assessment Tool

    Science.gov (United States)

    Boyce, Crystal M.

    2015-01-01

    Secret shopping is a form of unobtrusive evaluation that can be accomplished with minimal effort, but still produce rich results. With as few as 11 shoppers, the author was able to identify trends in user satisfaction with services provided across two entry-level desks at Illinois Wesleyan University's The Ames Library. The focus of this secret…

  6. Removal of Duodenum Elicits GLP-1 Secretion

    DEFF Research Database (Denmark)

    Muscogiuri, Giovanna; Mezza, Teresa; Prioletta, Annamaria

    2013-01-01

    OBJECTIVETo evaluate the effect of removal of the duodenum on the complex interplay between incretins, insulin, and glucagon in nondiabetic subjects.RESEARCH DESIGN AND METHODSFor evaluation of hormonal secretion and insulin sensitivity, 10 overweight patients without type 2 diabetes (age 61 ± 19...

  7. Apical secretion of apolipoproteins from enterocytes

    DEFF Research Database (Denmark)

    Danielsen, E M; Hansen, Gert Helge; Poulsen, Mona Dam

    1993-01-01

    that enterocytes release most of their newly made free apo A-1 and a significant portion of apo B-48 by exocytosis via the brush border membrane into the intestinal lumen. Fat absorption reduced apolipoprotein secretion to the medium and induced the formation of chylomicrons, containing apo A-1 at their surface...

  8. Gastric Acid Secretion, Mucus Concentration and Ulceration ...

    African Journals Online (AJOL)

    This study was carried out to evaluate the effect of consumption (ingestion) of Cannabis sativa on the gastrointestinal tract using mucus concentration, acid secretion and ulceration in animal (rats) model as indices. Three groups of six (6) rats each were used. The control group were fed on rat chow only while another group ...

  9. Experimental Study on Gastric Juice Secretion by ...

    African Journals Online (AJOL)

    管理平台

    2012-05-29

    May 29, 2012 ... reduced (P < 0.05) when acupuncture at zusanli was applied after treatment with cimetidine. Therefore, our study shows that when electroacupuncture at zusanli is applied, the gastric electrical frequency increased and gastric electrical amplitude reduced, while the flux of gastric juice secretion increased.

  10. Secretion Of Methionine By Microorganisms Associated With ...

    African Journals Online (AJOL)

    The organisms were assessed for optimum methionine production at various levels of glucose, ammonium sulphate and varying mixtures of potassium hydrogen phosphate and di-potassium hydrogen phosphate. All the organisms required 10 g glucose for maximum methionine secretion. All the isolates required 20 g of ...

  11. Proprotein Convertases Process Pmel17 during Secretion*

    Science.gov (United States)

    Leonhardt, Ralf M.; Vigneron, Nathalie; Rahner, Christoph; Cresswell, Peter

    2011-01-01

    Pmel17 is a melanocyte/melanoma-specific protein that traffics to melanosomes where it forms a fibrillar matrix on which melanin gets deposited. Before being cleaved into smaller fibrillogenic fragments the protein undergoes processing by proprotein convertases, a class of serine proteases that typically recognize the canonical motif RX(R/K)R↓. The current model of Pmel17 maturation states that this processing step occurs in melanosomes, but in light of recent reports this issue has become controversial. We therefore addressed this question by thoroughly assessing the processing kinetics of either wild-type Pmel17 or a secreted soluble Pmel17 derivative. Our results demonstrate clearly that processing of Pmel17 occurs during secretion and that it does not require entry of the protein into the endocytic system. Strikingly, processing proceeds even in the presence of the secretion inhibitor monensin, suggesting that Pmel17 is an exceptionally good substrate. In line with this, we find that newly synthesized surface Pmel17 is already quantitatively cleaved. Moreover, we demonstrate that Pmel17 function is independent of the sequence identity of its unconventional proprotein convertase-cleavage motif that lacks arginine in P4 position. The data alter the current view of Pmel17 maturation and suggest that the multistep processing of Pmel17 begins with an early cleavage during secretion that primes the protein for later functional processing. PMID:21247888

  12. Proprotein convertases process Pmel17 during secretion.

    Science.gov (United States)

    Leonhardt, Ralf M; Vigneron, Nathalie; Rahner, Christoph; Cresswell, Peter

    2011-03-18

    Pmel17 is a melanocyte/melanoma-specific protein that traffics to melanosomes where it forms a fibrillar matrix on which melanin gets deposited. Before being cleaved into smaller fibrillogenic fragments the protein undergoes processing by proprotein convertases, a class of serine proteases that typically recognize the canonical motif RX(R/K)R↓. The current model of Pmel17 maturation states that this processing step occurs in melanosomes, but in light of recent reports this issue has become controversial. We therefore addressed this question by thoroughly assessing the processing kinetics of either wild-type Pmel17 or a secreted soluble Pmel17 derivative. Our results demonstrate clearly that processing of Pmel17 occurs during secretion and that it does not require entry of the protein into the endocytic system. Strikingly, processing proceeds even in the presence of the secretion inhibitor monensin, suggesting that Pmel17 is an exceptionally good substrate. In line with this, we find that newly synthesized surface Pmel17 is already quantitatively cleaved. Moreover, we demonstrate that Pmel17 function is independent of the sequence identity of its unconventional proprotein convertase-cleavage motif that lacks arginine in P4 position. The data alter the current view of Pmel17 maturation and suggest that the multistep processing of Pmel17 begins with an early cleavage during secretion that primes the protein for later functional processing.

  13. The Best kept Secrets In Government.

    Science.gov (United States)

    1996-09-01

    workers. 113 The Best Kept Secrets In Government • Sweatshops are under attack. More than 50 manufacturing firms across the country have com...Employment and Training Administration Eradicating Sweatshops Initiative Fax on Demand Federal Employees’ Compensation Reengineering Project Team

  14. Secretion of phytohemagglutinin by monkey COS cells.

    Science.gov (United States)

    Voelker, T A; Florkiewicz, R Z; Chrispeels, M J

    1986-12-01

    The entire coding region of a gene, which encodes a polypeptide of phytohemagglutinin (PHA-L), obtained from a library of genomic DNA of the common bean Phaseolus vulgaris cv. Greensleeves, was introduced into the SV40 expression vector pJC119. Monkey COS1 cells were transfected with the recombinant clone and the synthesis, glycosylation, and transport of PHA-L studied and compared with the normal processes in bean cotyledons. In the bean, phytohemagglutinin is synthesized on the rough endoplasmic reticulum and transported via the Golgi complex to protein bodies, vacuole-like organelles. Phytohemagglutinin was synthesized and glycosylated at the ER and processed in the Golgi apparatus of the transfected COS1 cells. After passing the Golgi apparatus, PHA-L was slowly secreted into the culture medium (half-time of 3-6 h), a result indicating that the signals for targeting proteins beyond the Golgi apparatus in plant cells are different from those in animal cells. PHA, which is stored in protein bodies in the plant cells, is secreted by animal cells. Tunicamycin inhibited both glycosylation and secretion of PHA by the COS1 cells, a finding indicating an essential role of the oligosaccharides for transport of PHA in these cells in contrast to the situation found in bean cotyledons. PHA, secreted into the culture medium, was partially sensitive to endo H, a result indicating the presence of one high-mannose and one complex oligosaccharide chain, a situation identical to that in beans.

  15. Surfactant secretion and clearance in the newborn

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, P.A.; Wright, J.R.; Clements, J.A. (Univ. of California, San Francisco (USA))

    1989-10-01

    Pregnant rabbits (30 days) were injected intravenously with (3H)choline 8 h before delivery. The fetuses were delivered, and lung lavage and lamellar body phospholipids (PL) were analyzed. Some newborns also received radioactively labeled surfactant intratracheally on delivery and were permitted to breathe. With time, intratracheal label decreased in lavage and appeared in the lamellar body fraction, and intravenous label accumulated in both pools. Using a tracer analysis for non-steady state, we calculated surfactant secretion and clearance rates for the newborn period. Before birth, both rates rose slightly from 1.8 micrograms PL.g body wt-1.h-1 at 6 h before birth to 7.3 at birth. Immediately after birth, secretion rate rose to 37.7 micrograms PL.g body wt-1.h-1. Between 1.5 and 2 h after birth it fell to a minimum of 1.8 micrograms PL.g body wt-1.h-1 and then rose slowly to 6.0 at 12 h. After birth, clearance rate increased less than secretion rate (maximum 24.7 micrograms PL.g body wt-1.h-1 shortly after birth) then followed the same pattern but did not balance secretion rate in the 1st day.

  16. Type V secretion: From biogenesis to biotechnology

    NARCIS (Netherlands)

    van Ulsen, P.; Rahman, S.U.; Jong, W.S.P.; Daleke, M.H.; Luirink, J.

    2014-01-01

    The two membranes of Gram-negative bacteria contain protein machines that have a general function in their assembly. To interact with the extra-cellular milieu, Gram-negatives target proteins to their cell surface and beyond. Many specialized secretion systems have evolved with dedicated

  17. Collaborative visualization for military planning

    Science.gov (United States)

    Jacobs, Timothy; Butler, Sean

    2001-07-01

    So that a military commander has precise command, control, and planning information available for a given mission, information must be tailored for a particular area of operation, for a specific level of command, and for a specific time period. The commander must be able to quickly understand the information, query related information, and analyze the information in collaboration with others to plan and control a military operation. To provide such tailored information, we envision an environment in which customized agents traverse a diverse, distributed, frequently changing information space to identify relevant data. Once aware of the data, visual interfaces facilitate understanding and navigation. Geographically separated users manipulate a customized view to access a common information framework in which they can interactively collaborate with other users. We propose an architecture for achieving this vision that is well suited to implementation with Jini networking technologies. As a first step toward achieving this architecture we have developed a collaborative visualization framework that enables multiple distributed users to interact using shared visual interface components while simultaneously communicating via a text-based chat window. Our framework provides communications management and messaging support and well-defined Java class interfaces for integrating visualization components. Initial results indicate significant benefits for application development through reuse and extensibility. We achieved interactive performance and synchronized collaboration using JavaSpaces as the underlying distributed technology.

  18. Web-based visual analysis for high-throughput genomics.

    Science.gov (United States)

    Goecks, Jeremy; Eberhard, Carl; Too, Tomithy; Nekrutenko, Anton; Taylor, James

    2013-06-13

    Visualization plays an essential role in genomics research by making it possible to observe correlations and trends in large datasets as well as communicate findings to others. Visual analysis, which combines visualization with analysis tools to enable seamless use of both approaches for scientific investigation, offers a powerful method for performing complex genomic analyses. However, there are numerous challenges that arise when creating rich, interactive Web-based visualizations/visual analysis applications for high-throughput genomics. These challenges include managing data flow from Web server to Web browser, integrating analysis tools and visualizations, and sharing visualizations with colleagues. We have created a platform simplifies the creation of Web-based visualization/visual analysis applications for high-throughput genomics. This platform provides components that make it simple to efficiently query very large datasets, draw common representations of genomic data, integrate with analysis tools, and share or publish fully interactive visualizations. Using this platform, we have created a Circos-style genome-wide viewer, a generic scatter plot for correlation analysis, an interactive phylogenetic tree, a scalable genome browser for next-generation sequencing data, and an application for systematically exploring tool parameter spaces to find good parameter values. All visualizations are interactive and fully customizable. The platform is integrated with the Galaxy (http://galaxyproject.org) genomics workbench, making it easy to integrate new visual applications into Galaxy. Visualization and visual analysis play an important role in high-throughput genomics experiments, and approaches are needed to make it easier to create applications for these activities. Our framework provides a foundation for creating Web-based visualizations and integrating them into Galaxy. Finally, the visualizations we have created using the framework are useful tools for high

  19. Lubiprostone stimulates duodenal bicarbonate secretion in rats.

    Science.gov (United States)

    Mizumori, Misa; Akiba, Yasutada; Kaunitz, Jonathan D

    2009-10-01

    Lubiprostone, a bicyclic fatty acid, is used for the treatment of chronic constipation. No published study has addressed the effect of lubiprostone on intestinal ion secretion in vivo. The aim of this study was to test the hypothesis that lubiprostone augments duodenal HCO(3) (-) secretion (DBS). Rat proximal duodenal loops were perfused with pH 7.0 Krebs, control vehicle (medium-chain triglycerides), or lubiprostone (0.1-10 microM). We measured DBS with flow-through pH and CO(2) electrodes, perfusate [Cl(-)] with a Cl(-) electrode, and water flux using a non-absorbable ferrocyanide marker. Some rats were pretreated with a potent, selective CFTR antagonist, CFTR(inh)-172 (1 mg/kg, ip), 1 h before experiments. Perfusion of lubiprostone concentration dependently increased DBS, whereas net Cl(-) output and net water output were only increased at 0.1 microM, compared with vehicle. CFTR(inh)-172 reduced lubiprostone (10 microM)-induced DBS increase, whereas net Cl(-) output was also unchanged. Nevertheless, CFTR(inh)-172 reduced basal net water output, which was reversed by lubiprostone. Furthermore, lubiprostone-induced DBS was inhibited by EP4 receptor antagonist, not by an EP1/2 receptor antagonist or by indomethacin pretreatment. In this first study of the effect of lubiprostone on intestinal ion secretion in vivo, lubiprostone stimulated CFTR-dependent DBS without changing net Cl(-) secretion. This effect supports the hypothesis that Cl(-) secreted by CFTR is recycled across the apical membrane by anion exchangers. Recovery of water output during CFTR inhibition suggests that lubiprostone may improve the intestinal phenotype in CF patients. Furthermore, increased DBS suggests that lubiprostone may protect the duodenum from acid-induced injury via EP4 receptor activation.

  20. Regulated Mucin Secretion from Airway Epithelial Cells

    Directory of Open Access Journals (Sweden)

    Kenneth Bruce Adler

    2013-09-01

    Full Text Available Secretory epithelial cells of the proximal airways synthesize and secrete gel-forming polymeric mucins. The secreted mucins adsorb water to form mucus that is propelled by neighboring ciliated cells, providing a mobile barrier which removes inhaled particles and pathogens from the lungs. Several features of the intracellular trafficking of mucins make the airway secretory cell an interesting comparator for the cell biology of regulated exocytosis. Polymeric mucins are exceedingly large molecules (up to 3x10^6 D per monomer whose folding and initial polymerization in the ER requires the protein disulfide isomerase Agr2. In the Golgi, mucins further polymerize to form chains and possibly branched networks comprising more than 20 monomers. The large size of mucin polymers imposes constraints on their packaging into transport vesicles along the secretory pathway. Sugar side chains account for >70% of the mass of mucins, and their attachment to the protein core by O-glycosylation occurs in the Golgi. Mature polymeric mucins are stored in large secretory granules ~1 um in diameter. These are translocated to the apical membrane to be positioned for exocytosis by cooperative interactions among MARCKS, cysteine string protein (CSP, HSP70 and the cytoskeleton. Mucin granules undergo exocytic fusion with the plasma membrane at a low basal rate and a high stimulated rate. Both rates are mediated by a regulated exocytic mechanism as indicated by phenotypes in both basal and stimulated secretion in mice lacking Munc13-2, a sensor of the second messengers calcium and diacylglycerol (DAG. Basal secretion is induced by low levels of activation of P2Y2 purinergic and A3 adenosine receptors by extracellular ATP released in paracrine fashion and its metabolite adenosine. Stimulated secretion is induced by high levels of the same ligands, and possibly by inflammatory mediators as well. Activated receptors are coupled to phospholipase C by Gq, resulting in the

  1. The unconventional secretion of ARMS2.

    Science.gov (United States)

    Kortvely, Elod; Hauck, Stefanie M; Behler, Jennifer; Ho, Nurulain; Ueffing, Marius

    2016-08-01

    Age-related maculopathy susceptibility 2 (ARMS2) is a small (11 kDa), primate-specific protein found in the extracellular matrix of the choroid layer in the eye. Variants in the corresponding genetic locus are highly associated with age-related macular degeneration, a leading cause of blindness in the elderly. So far, the physiological function of ARMS2 has remained enigmatic. It has been demonstrated that ARMS2 is a genuine secreted protein devoid of an N-terminal leader sequence, yet the mechanism how it exits the cells and enters the choroidal matrix is not understood. Here, we show that ARMS2 efficiently recruits lectin chaperones from the cytosol and colocalizes with calnexin-positive and protein disulfide isomerase-negative vesicle-like structures. Site-directed mutagenesis revealed critical elements for this interaction. Mutant forms proving unable to interact with the calnexin/calreticulin system failed secretion. On the other hand, blocking the endoplasmic reticulum to Golgi transport with brefeldin A had no effect on ARMS2 secretion. As we found ARMS2 colocalizing with GRASP65, a marker for unconventional protein secretion, autophagic factors are likely to be key in its export. Interleukin-1ß (IL-1ß) is the most established example of secretory autophagy. Co-expression experiments, however, suggest that the transport of ARMS2 is different from that of IL-1ß. In conclusion, in this work we show that ARMS2 is externalized via an unconventional pathway bypassing Golgi. Its intracellular separation from the classical secretion pathway suggests that the maturation of the protein requires a specific biochemical niche and/or may be needed to impede the premature formation of unwanted protein-protein interactions. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Enhancing knowledge sharing management using BIM technology in construction.

    Science.gov (United States)

    Ho, Shih-Ping; Tserng, Hui-Ping; Jan, Shu-Hui

    2013-01-01

    Construction knowledge can be communicated and reused among project managers and jobsite engineers to alleviate problems on a construction jobsite and reduce the time and cost of solving problems related to constructability. This paper proposes a new methodology for the sharing of construction knowledge by using Building Information Modeling (BIM) technology. The main characteristics of BIM include illustrating 3D CAD-based presentations and keeping information in a digital format and facilitation of easy updating and transfer of information in the BIM environment. Using the BIM technology, project managers and engineers can gain knowledge related to BIM and obtain feedback provided by jobsite engineers for future reference. This study addresses the application of knowledge sharing management using BIM technology and proposes a BIM-based Knowledge Sharing Management (BIMKSM) system for project managers and engineers. The BIMKSM system is then applied in a selected case study of a construction project in Taiwan to demonstrate the effectiveness of sharing knowledge in the BIM environment. The results demonstrate that the BIMKSM system can be used as a visual BIM-based knowledge sharing management platform by utilizing the BIM technology.

  3. Cortical Visual Impairment

    Science.gov (United States)

    ... Frequently Asked Questions Español Condiciones Chinese Conditions Cortical Visual Impairment En Español Read in Chinese What is cortical visual impairment? Cortical visual impairment (CVI) is a decreased ...

  4. The visual divide

    Science.gov (United States)

    Maes, Alfons

    2017-04-01

    Climate change is a playground for visualization. Yet research and technological innovations in visual communication and data visualization do not account for a substantial part of the world's population: vulnerable audiences with low levels of literacy.

  5. Information Sharing and International Taxation

    NARCIS (Netherlands)

    Keen, M.; Ligthart, J.E.

    2004-01-01

    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  6. Scalable shared-memory multiprocessing

    CERN Document Server

    Lenoski, Daniel E

    1995-01-01

    Dr. Lenoski and Dr. Weber have experience with leading-edge research and practical issues involved in implementing large-scale parallel systems. They were key contributors to the architecture and design of the DASH multiprocessor. Currently, they are involved with commercializing scalable shared-memory technology.

  7. Neither invented nor shared here

    DEFF Research Database (Denmark)

    Burcharth, Ana Luiza de Araújo; Knudsen, M. P.; Søndergaard, Helle Alsted

    2014-01-01

    against the sourcing of external knowledge (the Not-invented-here (NIH) syndrome) and against the external exploitation of knowledge assets (the Not-shared-here (NSH) syndrome). Using survey data collected from 331 firms, this article empirically assesses the theoretical assertion that the NIH and NSH...

  8. Dynamic Spectrum Sharing among Femtocells

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira

    2012-01-01

    The ever-growing demand for mobile broadband is leading to an imminent spectrum scarcity. In order to cope with such situation dynamic spectrum sharing and the widespread deployment of small cells (femtocells) are promising solutions. Delivering such a view is not short of challenges. Massive...

  9. Sharing Power in the Classroom.

    Science.gov (United States)

    Richard-Amato, Patricia

    2002-01-01

    Suggests that be sharing power in the classroom teachers allow the development of participatory classrooms in which all students can thrive. Examines participatory teaching and critical pedagogy, components of the participatory learning experience, manifestations of participatory teaching, an application of the language experience approach,…

  10. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2015-01-01

    In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting a...

  11. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2014-01-01

    In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting a...

  12. Performance Modeling of Maximal Sharing

    NARCIS (Netherlands)

    M.J. Steindorfer (Michael); J.J. Vinju (Jurgen)

    2016-01-01

    textabstractIt is noticeably hard to predict the effect of optimization strategies in Java without implementing them. "Maximal sharing" (a.k.a. "hash-consing") is one of these strategies that may have great benefit in terms of time and space, or may have detrimental overhead. It all depends on the

  13. Moralities of sharing and caring

    NARCIS (Netherlands)

    Niehof, A.; Wahlen, S.

    2017-01-01

    This paper propounds the concept of the moral household economy in order to understand and explain gender performances in food practices of sharing and caring in the socio-cultural domain of unpaid food work. Households are the immediate context for meeting people’s food and nutrition needs and for

  14. Job Sharing: One District's Experience.

    Science.gov (United States)

    Lantz, Mahlon L.

    1983-01-01

    Describes responses of principals, teachers, and parents to a job sharing program instituted to reduce impact of staff layoffs. Principals were satisfied overall; teachers believed that students benefited from interaction with two instructors; and a majority of parents felt likewise. (TE)

  15. Knowledge sharing in diverse organizations

    DEFF Research Database (Denmark)

    Lauring, Jakob; Selmer, Jan

    2012-01-01

    It has been argued that both strengths and weaknesses of diversity in organisations stem from the different demographic, national, linguistic, social and cultural backgrounds of their members. However, few attempts have been made to link different types of diversity to knowledge sharing despite t...

  16. Car sharing à la carte

    CERN Document Server

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  17. Visualizing Mobility of Public Transportation System.

    Science.gov (United States)

    Zeng, Wei; Fu, Chi-Wing; Arisona, Stefan Müller; Erath, Alexander; Qu, Huamin

    2014-12-01

    Public transportation systems (PTSs) play an important role in modern cities, providing shared/massive transportation services that are essential for the general public. However, due to their increasing complexity, designing effective methods to visualize and explore PTS is highly challenging. Most existing techniques employ network visualization methods and focus on showing the network topology across stops while ignoring various mobility-related factors such as riding time, transfer time, waiting time, and round-the-clock patterns. This work aims to visualize and explore passenger mobility in a PTS with a family of analytical tasks based on inputs from transportation researchers. After exploring different design alternatives, we come up with an integrated solution with three visualization modules: isochrone map view for geographical information, isotime flow map view for effective temporal information comparison and manipulation, and OD-pair journey view for detailed visual analysis of mobility factors along routes between specific origin-destination pairs. The isotime flow map linearizes a flow map into a parallel isoline representation, maximizing the visualization of mobility information along the horizontal time axis while presenting clear and smooth pathways from origin to destinations. Moreover, we devise several interactive visual query methods for users to easily explore the dynamics of PTS mobility over space and time. Lastly, we also construct a PTS mobility model from millions of real passenger trajectories, and evaluate our visualization techniques with assorted case studies with the transportation researchers.

  18. 'Ectopic' suprasellar type IIa PRL-secreting pituitary adenoma.

    Science.gov (United States)

    Zhou, Heng-Jun; Pan, De-Sheng; Ba, Xiao-Qun; Zhan, Ren-Ya; Zheng, Xiu-Jue; Ma, Yue-Hui

    2017-08-01

    Ectopic pituitary adenomas (EPAs) are rare, and the suprasellar cistern seems to be the most common location. At this time, no detailed original classification, diagnosis, or treatment protocols for suprasellar pituitary adenomas (SPAs) have been described. A 19-year-old man showed visual disturbances and lack of libido for 3 years, he suffered a sharp decline in vision with only light perception in the last week. Magnetic resonance imaging scans revealed a large suprasellar cystic lesion with a normal pituitary in the sella turcica. Endocrinological findings showed an extremely high prolactin level of 1250 ng/mL. Because of the sharp decline in vision, the patient underwent total removal of the suprasellar lesion using a transfrontal interhemispheric approach. The tumor pedicle originated in the lower pituitary stalk without any connection to the anterior pituitary gland in the sella turcica, while the diaphragma sellae was incomplete. Clinical and endocrinological cure criteria were fulfilled and postoperative pathology confirmed a prolactin-secreting pituitary adenoma. Ectopic suprasellar pituitary adenomas (ESPAs) are extremely rare intracranial extracerebral tumors. SPAs can be classified into three types according to their origin and their relationship with surrounding tissue. Only type III is theoretically a true ectopic, based on previous reports. Thus, ESPAs are uncommon compared to other EPAs. Our case is the first reported case of a type IIa 'E'SPA and the first description of this subtype classification until now. The pars tuberalis may be different from the pars distalis, and each subtype of adenohypophyseal cells may have different migration characteristics, which leads to different proportions of each hormone-secreting subtype in SPAs and EPAs. Transsphenoidal surgery is minimally invasive, but transcranial surgery may remain a universal option for the treatment of suprasellar lesions.

  19. Feature-based prediction of non-classical and leaderless protein secretion

    DEFF Research Database (Denmark)

    Bendtsen, Jannick Dyrløv; Jensen, Lars Juhl; Blom, Nikolaj

    2004-01-01

    We present a sequence-based method, SecretomeP, for the prediction of mammalian secretory proteins targeted to the non-classical secretory pathway, i.e. proteins without an N-terminal signal peptide. So far only a limited number of proteins have been shown experimentally to enter the non......-classical secretory pathway. These are mainly fibroblast growth factors, interleukins and galectins found in the extracellular matrix. We have discovered that certain pathway-independent features are shared among secreted proteins. The method presented here is also capable of predicting (signal peptide......-containing) secretory proteins where only the mature part of the protein has been annotated or cases where the signal peptide remains uncleaved. By scanning the entire human proteome we identified new proteins potentially undergoing non-classical secretion. Predictions can be made at http://www.cbs.dtu.dk/services/SecretomeP....

  20. Neuro-Ophthalmological Disorders in Cerebral Palsy: Ophthalmological, Oculomotor, and Visual Aspects

    Science.gov (United States)

    Fazzi, Elisa; Signorini, Sabrina G.; La Piana, Roberta; Bertone, Chiara; Misefari, Walter; Galli, Jessica; Balottin, Umberto; Bianchi, Paolo Emilio

    2012-01-01

    Aim: Cerebral visual impairment (CVI) is a disorder caused by damage to the retrogeniculate visual pathways. Cerebral palsy (CP) and CVI share a common origin: 60 to 70% of children with CP also have CVI. We set out to describe visual dysfunction in children with CP. A further aim was to establish whether different types of CP are associated with…

  1. Visual Literacy for Libraries: A Practical, Standards­-Based Guide

    Science.gov (United States)

    Brown, Nicole E.; Bussert, Kaila; Hattwig, Denise; Medaille, Ann

    2016-01-01

    The importance of images and visual media in today's culture is changing what it means to be literate in the 21st century. Digital technologies have made it possible for almost anyone to create and share visual media. Yet the pervasiveness of images and visual media does not necessarily mean that individuals are able to critically view, use, and…

  2. Visual system manifestations of Alzheimer's disease.

    Science.gov (United States)

    Kusne, Yael; Wolf, Andrew B; Townley, Kate; Conway, Mandi; Peyman, Gholam A

    2017-12-01

    Alzheimer's disease (AD) is an increasingly common disease with massive personal and economic costs. While it has long been known that AD impacts the visual system, there has recently been an increased focus on understanding both pathophysiological mechanisms that may be shared between the eye and brain and how related biomarkers could be useful for AD diagnosis. Here, were review pertinent cellular and molecular mechanisms of AD pathophysiology, the presence of AD pathology in the visual system, associated functional changes, and potential development of diagnostic tools based on the visual system. Additionally, we discuss links between AD and visual disorders, including possible pathophysiological mechanisms and their relevance for improving our understanding of AD. © 2016 Acta Ophthalmologica Scandinavica Foundation. Published by John Wiley & Sons Ltd.

  3. Work-Sharing: Panacea or Palliative?

    Science.gov (United States)

    Dawkins, Peter J.

    1983-01-01

    Recently, high unemployment and a high perceived rate of technological change have created interest in work-sharing. Definitions of different types of work-sharing and theoretical and practical issues related to work-sharing are covered. Work-sharing is not necessarily a panacea, but it does show the potential to help. (Author/IS)

  4. A thyrotropin‑secreting macroadenoma with positive growth ...

    African Journals Online (AJOL)

    2015-02-01

    TSHoma) are rare adenomas presenting with hyperthyroidism due to impaired negative feedback of thyroid hormone on the pituitary and inappropriate TSH secretion. This article presents a case of TSH‑secreting macroadenoma ...

  5. Trichophyton rubrum secreted and membrane-associated carboxypeptidases

    National Research Council Canada - National Science Library

    Zaugg, Christophe; Jousson, Olivier; Léchenne, Barbara; Staib, Peter; Monod, Michel

    2008-01-01

    .... Therefore, secreted proteolytic activity is considered a virulence trait of these fungi. In a medium containing protein as a sole nitrogen and carbon source Trichophyton rubrum secretes a metallocarboxypeptidase (TruMcpA...

  6. Biliary cholesterol secretion : More than a simple ABC

    NARCIS (Netherlands)

    Dikkers, Arne; Tietge, Uwe J. F.

    2010-01-01

    Biliary cholesterol secretion is a process important for 2 major disease complexes, atherosclerotic cardiovascular disease and cholesterol gallstone disease With respect to cardiovascular disease, biliary cholesterol secretion is regarded as the final step for the elimination of cholesterol

  7. A thyrotropin‑secreting macroadenoma with positive growth ...

    African Journals Online (AJOL)

    TSHoma) are rare adenomas presenting with hyperthyroidism due to impaired negative feedback of thyroid hormone on the pituitary and inappropriate TSH secretion. This article presents a case of TSH‑secreting macroadenoma without any ...

  8. Professional SharePoint 2013 administration

    CERN Document Server

    Young, Shane; Klindt, Todd

    2013-01-01

    SharePoint admin author gurus return to prepare you for working with the new features of SharePoint 2013! The new iteration of SharePoint boasts exciting new features. However, any new version also comes with its fair share of challenges and that's where this book comes in. The team of SharePoint admin gurus returns to presents a fully updated resource that prepares you for making all the new SharePoint 2013 features work right. They cover all of the administration components of SharePoint 2013 in detail, and present a clear understanding of how they affect the role of the adminis

  9. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Je Min, E-mail: jemin@knu.ac.kr [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of); Department of Horticultural Science, Kyungpook National University, Daegu (Korea, Republic of); Lee, Sang-Jik [Biotechnology Institute, Nongwoo Bio Co, Ltd, Yeoju (Korea, Republic of); Department of Plant Biology, Cornell University, Ithaca, NY (United States); Rose, Jocelyn K.C. [Department of Plant Biology, Cornell University, Ithaca, NY (United States); Yeam, Inhwa [Department of Horticulture and Breeding, Andong National University, Andong (Korea, Republic of); Kim, Byung-Dong [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of)

    2014-04-18

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening.

  10. Type VI secretion system in Pseudomonas aeruginosa: secretion and multimerization of VgrG proteins.

    Science.gov (United States)

    Hachani, Abderrahman; Lossi, Nadine S; Hamilton, Alexander; Jones, Cerith; Bleves, Sophie; Albesa-Jové, David; Filloux, Alain

    2011-04-08

    Pseudomonas aeruginosa is a Gram-negative bacterium causing chronic infections in cystic fibrosis patients. Such infections are associated with an active type VI secretion system (T6SS), which consists of about 15 conserved components, including the AAA+ ATPase, ClpV. The T6SS secretes two categories of proteins, VgrG and Hcp. Hcp is structurally similar to a phage tail tube component, whereas VgrG proteins show similarity to the puncturing device at the tip of the phage tube. In P. aeruginosa, three T6SSs are known. The expression of H1-T6SS genes is controlled by the RetS sensor. Here, 10 vgrG genes were identified in the PAO1 genome, among which three are co-regulated with H1-T6SS, namely vgrG1a/b/c. Whereas VgrG1a and VgrG1c were secreted in a ClpV1-dependent manner, secretion of VgrG1b was ClpV1-independent. We show that VgrG1a and VgrG1c form multimers, which confirmed the VgrG model predicting trimers similar to the tail spike. We demonstrate that Hcp1 secretion requires either VgrG1a or VgrG1c, which may act independently to puncture the bacterial envelope and give Hcp1 access to the surface. VgrG1b is not required for Hcp1 secretion. Thus, VgrG1b does not require H1-T6SS for secretion nor does H1-T6SS require VgrG1b for its function. Finally, we show that VgrG proteins are required for secretion of a genuine H1-T6SS substrate, Tse3. Our results demonstrate that VgrG proteins are not only secreted components but are essential for secretion of other T6SS substrates. Overall, we emphasize variability in behavior of three P. aeruginosa VgrGs, suggesting that, although very similar, distinct VgrGs achieve specific functions.

  11. Secrets of over-indebted people

    Directory of Open Access Journals (Sweden)

    Valérie BILLAUDEAU

    2013-12-01

    Full Text Available Today, the economic and financial crisis is brought to light and it is now clear that many people are directly impacted by this phenomenon. However, a lot of situations are obviously hidden and in particular those concerning over-indebted people. These people often find that it is difficult to express the hardship they are going through and keep silent because is more comfortable for them. The media also does not tackle this burning issue because the complexity of some situations complicates the message. Therefore, a giant gap has appeared leaving over-indebted people entrapped in their secret. Starting from this hypothesis, this article will examine the results of a research conducted on the over-indebted people (survey on written press, analysis of TV broadcasts, analysis of records related to person in debts and responses of people in debts and the secrets that this phenomenon involves.

  12. Pancreatic bicarbonate secretion involves two proton pumps

    DEFF Research Database (Denmark)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L.

    2011-01-01

    H(+)/HCO(3)(-) transporters, which depend on gradients created by the Na(+)/K(+)-ATPase. However, the model cannot fully account for high-bicarbonate concentrations, and other active transporters, i.e. pumps, have not been explored. Here we show that pancreatic ducts express functional gastric...... and non-gastric H(+)-K(+)-ATPases. We measured intracellular pH and secretion in small ducts isolated from rat pancreas and showed their sensitivity to H(+)-K(+) pump inhibitors and ion substitutions. Gastric and non-gastric H(+)-K(+) pumps were demonstrated on RNA and protein levels, and pumps were...... localized to the plasma membranes of pancreatic ducts. Quantitative analysis of H(+)/HCO(3)(-) and fluid transport shows that the H(+)-K(+) pumps can contribute to pancreatic secretion in several species. Our results call for revision of the bicarbonate transport physiology in pancreas, and most likely...

  13. GLOBALIZATION IMPACT ON UKRAINIAN MARKET OF SHARES

    Directory of Open Access Journals (Sweden)

    O. Zotsenko

    2013-05-01

    Full Text Available The paper examines the impact of globalization on the Ukrainian market of shares. Main trends of globalization of world share market are analyzed. The study highlights key elements of the operating share markets of the world leading countries. The research investigates main factors that affect on the level of national market of shares. The findings trace out a number of problems that hinder and distort the role of the Ukrainian share market in capital allocation.

  14. Understanding shared services (Article 1 of 3)

    OpenAIRE

    T. N. Van der Linde; A. L. Boessenkool; C. J. Jooste

    2006-01-01

    Purpose: Shared services is a viable business model that can be used by organisations to reduce costs and enhance efficiency and effectiveness in the organisation. The purpose of this trilogy of articles is to introduce shared services as a business model, and how to efficiently and effectively manage a shared services business unit. The purpose of the first article in the trilogy, introduces shared services as a business model, defines what shared services is, the transformation requir...

  15. Argumentation for coordinating shared activities

    Science.gov (United States)

    Clement, Bradley J.; Barrett, Anthony C.; Schaffer, Steven R.

    2004-01-01

    an increasing need for space missions to be able to collaboratively (and competitively) develop plans both within and across missions. In addition, interacting spacecraft that interleave onboard planning and execution must reach consensus on their commitments to each other prior to execution. In domains where missions have varying degrees of interaction and different constraints on communication and computation, the missions will require different coordination protocols in order to efficiently reach consensus with in their imposed deadlines. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of multiple agents and a foundation for customizing protocols for negotiating planner interactions. We investigate variations of a few simple protocols based on argumentation and distributed constraints satisfaction techniques and evaluate their abilities to reach consistent solutions according to computation, time, and communication costs in an abstract domain where spacecraft propose joint measurements.

  16. SECTORAL SHARES AND ECONOMIC GROWTH

    DEFF Research Database (Denmark)

    Ahmad, Nisar; Naveed, Amjad; Naz, Amber

    2013-01-01

    believe that structural change is an unimportant side effect of the economic development. On the contrary, economists associated with the World Bank and some others posit that growth is brought about by the changes in sectoral composition. The objective of this study is to empirically test...... the relationship between sectoral shares and economic growth by using the panel data for 20 developed countries. The results of the granger causality suggest that both services and agriculture sectors do granger cause economic growth, whereas industrial sector does not granger cause growth. Reverse causality does...... not hold for any of the three sectors. The results of Barro and Non-Barro regressions along with the set of control variables have suggested that services sector is negatively affecting growth, whereas both industrial and agriculture shares are positively affect economic growth....

  17. Streaming Visual Analytics Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    Cook, Kristin A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burtner, Edwin R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kritzstein, Brian P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Brisbois, Brooke R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mitson, Anna E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-31

    How can we best enable users to understand complex emerging events and make appropriate assessments from streaming data? This was the central question addressed at a three-day workshop on streaming visual analytics. This workshop was organized by Pacific Northwest National Laboratory for a government sponsor. It brought together forty researchers and subject matter experts from government, industry, and academia. This report summarizes the outcomes from that workshop. It describes elements of the vision for a streaming visual analytic environment and set of important research directions needed to achieve this vision. Streaming data analysis is in many ways the analysis and understanding of change. However, current visual analytics systems usually focus on static data collections, meaning that dynamically changing conditions are not appropriately addressed. The envisioned mixed-initiative streaming visual analytics environment creates a collaboration between the analyst and the system to support the analysis process. It raises the level of discourse from low-level data records to higher-level concepts. The system supports the analyst’s rapid orientation and reorientation as situations change. It provides an environment to support the analyst’s critical thinking. It infers tasks and interests based on the analyst’s interactions. The system works as both an assistant and a devil’s advocate, finding relevant data and alerts as well as considering alternative hypotheses. Finally, the system supports sharing of findings with others. Making such an environment a reality requires research in several areas. The workshop discussions focused on four broad areas: support for critical thinking, visual representation of change, mixed-initiative analysis, and the use of narratives for analysis and communication.

  18. Eccrine sweat gland development and sweat secretion.

    Science.gov (United States)

    Cui, Chang-Yi; Schlessinger, David

    2015-09-01

    Eccrine sweat glands help to maintain homoeostasis, primarily by stabilizing body temperature. Derived from embryonic ectoderm, millions of eccrine glands are distributed across human skin and secrete litres of sweat per day. Their easy accessibility has facilitated the start of analyses of their development and function. Mouse genetic models find sweat gland development regulated sequentially by Wnt, Eda and Shh pathways, although precise subpathways and additional regulators require further elucidation. Mature glands have two secretory cell types, clear and dark cells, whose comparative development and functional interactions remain largely unknown. Clear cells have long been known as the major secretory cells, but recent studies suggest that dark cells are also indispensable for sweat secretion. Dark cell-specific Foxa1 expression was shown to regulate a Ca(2+) -dependent Best2 anion channel that is the candidate driver for the required ion currents. Overall, it was shown that cholinergic impulses trigger sweat secretion in mature glands through second messengers - for example InsP3 and Ca(2+) - and downstream ion channels/transporters in the framework of a Na(+) -K(+) -Cl(-) cotransporter model. Notably, the microenvironment surrounding secretory cells, including acid-base balance, was implicated to be important for proper sweat secretion, which requires further clarification. Furthermore, multiple ion channels have been shown to be expressed in clear and dark cells, but the degree to which various ion channels function redundantly or indispensably also remains to be determined. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  19. Eosinophil secretion of granule-derived cytokines

    Directory of Open Access Journals (Sweden)

    Lisa A Spencer

    2014-10-01

    Full Text Available Eosinophils are tissue-dwelling leukocytes, present in the thymus, and gastrointestinal and genitourinary tracts of healthy individuals at baseline, and recruited, often in large numbers, to allergic inflammatory foci and sites of active tissue repair. The biological significance of eosinophils is vast and varied. In health, eosinophils support uterine and mammary gland development, and maintain bone marrow plasma cells and adipose tissue alternatively activated macrophages, while in response to tissue insult eosinophils function as inflammatory effector cells, and, in the wake of an inflammatory response, promote tissue regeneration and wound healing. One common mechanism driving many of the diverse eosinophil functions is the regulated and differential secretion of a vast array of eosinophil-derived cytokines. Eosinophils are distinguished from most other leukocytes in that many, if not all, of the over three dozen eosinophil-derived cytokines are pre-synthesized and stored within intracellular granules, poised for very rapid, stimulus-induced secretion. Eosinophils engaged in cytokine secretion in situ utilize distinct pathways of cytokine release that include: classical exocytosis, whereby granules themselves fuse with the plasma membrane and release their entire contents extracellularly; piecemeal degranulation, whereby granule-derived cytokines are selectively mobilized into vesicles that emerge from granules, traverse the cytoplasm and fuse with the plasma membrane to release discrete packets of cytokines; and eosinophil cytolysis, whereby intact granules are extruded from eosinophils, and deposited within tissues. In this latter scenario, extracellular granules can themselves function as stimulus-responsive secretory-competent organelles within the tissue. Here we review the distinctive processes of differential secretion of eosinophil granule-derived cytokines.

  20. Unconventional protein secretion (UPS) pathways in plants.

    Science.gov (United States)

    Ding, Yu; Robinson, David G; Jiang, Liwen

    2014-08-01

    As in yeast and mammalian cells, novel unconventional protein secretion (UPS) or unconventional membrane trafficking pathways are now known to operate in plants. UPS in plants is generally associated with stress conditions such as pathogen attack, but little is known about its underlying mechanism and function. Here, we present an update on the current knowledge of UPS in the plants in terms of its transport pathways, possible functions and its relationship to autophagy. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  2. Exosomes: secreted vesicles and intercellular communications

    OpenAIRE

    Théry, Clotilde

    2011-01-01

    Exosomes are small membrane vesicles of endocytic origin secreted by most cell types, and are thought to play important roles in intercellular communications. Although exosomes were originally described in 1983, interest in these vesicles has really increased dramatically in the last 3 years, after the finding that they contain mRNA and microRNA. This discovery sparked renewed interest for the general field of membrane vesicles involved in intercellular communications, and research on these s...

  3. A Population Model of Vasopressin Secretion

    OpenAIRE

    Durie, Ruth Frances

    2008-01-01

    Computer modelling is a powerful tool for clarifying and testing theory. In neuroscience, this often means replicating firing patterns. Models need evaluation functions to quantify the significance of features in the firing patterns, but usually the effect of firing is insufficiently understood. The magnocellular vasopressin neurons of the hypothalamus do have an output that is both well understood and quantifiable: they secrete a hormone into the bloodstream in proportion to blood osmol...

  4. Microbial cell surfaces and secretion systems

    OpenAIRE

    Tommassen, J.P.M.; Wosten, H.A.B.

    2015-01-01

    Microbial cell surfaces, surface-exposed organelles, and secreted proteins are important for the interaction with the environment, including adhesion to hosts, protection against host defense mechanisms, nutrient acquisition, and intermicrobial competition. Here, we describe the structures of the cell envelopes of bacteria , fungi, and oomycetes , and the mechanisms they have evolved for the transport of proteins across these envelopes to the cell surface and into the extracellular milieu.

  5. The evolution of reciprocal sharing

    OpenAIRE

    Moore, Jim

    1984-01-01

    Genetical models of the evolution of reciprocal altruism (as distinct from cooperation, mutualism, or nepotism) have difficulty explaining the initial establishment of an altruist gene in a selfish deme. Though potential mechanisms have been suggested, there is an alternative: much "altruistic" behavior may in fact be purely selfish in origin and consequently reciprocity need not be invoked to provide a selective benefit to the actor. _Sharing_ and _helping_ are fundamentally different behavi...

  6. Producing citizenship as shared meaning

    Directory of Open Access Journals (Sweden)

    Fernanda Coelho Liberali

    2011-07-01

    Full Text Available This article discusses the Creative Chain (Liberali, 2006a for citizenship education in the “Citizenship Action Project: Reading in Different Areas”(PAC-LDA. It approaches the concepts of sense, meaning, and answerability-responsibility (Bakhtin, 1992 as the basis for citizenship production. The analysis of data collected in the 2006 activities of the project suggests that shared meanings contribute to the view of citizenship in the Creative Chain of Activities as a desirable attitude (Kymlicka & Norman, 1997.

  7. Visual Working Memory Enhances the Neural Response to Matching Visual Input.

    Science.gov (United States)

    Gayet, Surya; Guggenmos, Matthias; Christophel, Thomas B; Haynes, John-Dylan; Paffen, Chris L E; Van der Stigchel, Stefan; Sterzer, Philipp

    2017-07-12

    Visual working memory (VWM) is used to maintain visual information available for subsequent goal-directed behavior. The content of VWM has been shown to affect the behavioral response to concurrent visual input, suggesting that visual representations originating from VWM and from sensory input draw upon a shared neural substrate (i.e., a sensory recruitment stance on VWM storage). Here, we hypothesized that visual information maintained in VWM would enhance the neural response to concurrent visual input that matches the content of VWM. To test this hypothesis, we measured fMRI BOLD responses to task-irrelevant stimuli acquired from 15 human participants (three males) performing a concurrent delayed match-to-sample task. In this task, observers were sequentially presented with two shape stimuli and a retro-cue indicating which of the two shapes should be memorized for subsequent recognition. During the retention interval, a task-irrelevant shape (the probe) was briefly presented in the peripheral visual field, which could either match or mismatch the shape category of the memorized stimulus. We show that this probe stimulus elicited a stronger BOLD response, and allowed for increased shape-classification performance, when it matched rather than mismatched the concurrently memorized content, despite identical visual stimulation. Our results demonstrate that VWM enhances the neural response to concurrent visual input in a content-specific way. This finding is consistent with the view that neural populations involved in sensory processing are recruited for VWM storage, and it provides a common explanation for a plethora of behavioral studies in which VWM-matching visual input elicits a stronger behavioral and perceptual response. SIGNIFICANCE STATEMENT Humans heavily rely on visual information to interact with their environment and frequently must memorize such information for later use. Visual working memory allows for maintaining such visual information in the mind

  8. Hoopoes color their eggs with antimicrobial uropygial secretions

    Science.gov (United States)

    Soler, Juan J.; Martín-Vivaldi, M.; Peralta-Sánchez, J. M.; Arco, L.; Juárez-García-Pelayo, N.

    2014-09-01

    Uropygial gland secretions are used as cosmetics by some species of birds to color and enhance properties of feathers and teguments, which may signal individual quality. Uropygial secretions also reach eggshells during incubation and, therefore, may influence the coloration of birds' eggs, a trait that has attracted the attention of evolutionary biologists for more than one century. The color of hoopoe eggs typically changes along incubation, from bluish-gray to greenish-brown. Here, we test experimentally the hypothesis that dark uropygial secretion of females is responsible for such drastic color change. Moreover, since uropygial secretion of hoopoes has antimicrobial properties, we also explore the association between color and antimicrobial activity of the uropygial secretion of females. We found that eggs stayed bluish-gray in nests where female access to the uropygial secretion was experimentally blocked. Furthermore, experimental eggs that were maintained in incubators and manually smeared with uropygial secretion experienced similar color changes that naturally incubated eggs did, while control eggs that were not in contact with the secretions did not experience such color changes. All these results strongly support the hypothesis that female hoopoes use their uropygial gland secretion to color the eggs. Moreover, saturation of the uropygial secretion was associated with antimicrobial activity against Bacillus licheniformis. Given the known antimicrobial potential of uropygial secretions of birds, this finding opens the possibility that in scenarios of sexual selection, hoopoes in particular and birds in general signal antimicrobial properties of their uropygial secretion by mean of changes in egg coloration along incubation.

  9. 10 CFR 1016.34 - Accountability for Secret Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...

  10. The Yersinia enterocolitica type three secretion chaperone SycO is integrated into the Yop regulatory network and binds to the Yop secretion protein YscM1

    Directory of Open Access Journals (Sweden)

    Heesemann Jürgen

    2007-07-01

    Full Text Available Abstract Background Pathogenic yersiniae (Y. pestis, Y. pseudotuberculosis, Y. enterocolitica share a virulence plasmid encoding a type three secretion system (T3SS. This T3SS comprises more than 40 constituents. Among these are the transport substrates called Yops (Yersinia outer proteins, the specific Yop chaperones (Sycs, and the Ysc (Yop secretion proteins which form the transport machinery. The effectors YopO and YopP are encoded on an operon together with SycO, the chaperone of YopO. The characterization of SycO is the focus of this study. Results We have established the large-scale production of recombinant SycO in its outright form. We confirm that Y. enterocolitica SycO forms homodimers which is typical for Syc chaperones. SycO overproduction in Y. enterocolitica decreases secretion of Yops into the culture supernatant suggesting a regulatory role of SycO in type III secretion. We demonstrate that in vitro SycO interacts with YscM1, a negative regulator of Yop expression in Y. enterocolitica. However, the SycO overproduction phenotype was not mediated by YscM1, YscM2, YopO or YopP as revealed by analysis of isogenic deletion mutants. Conclusion We present evidence that SycO is integrated into the regulatory network of the Yersinia T3SS. Our picture of the Yersinia T3SS interactome is supplemented by identification of the SycO/YscM1 interaction. Further, our results suggest that at least one additional interaction partner of SycO has to be identified.

  11. Preconditioning stimuli that augment chromaffin cell secretion.

    Science.gov (United States)

    Tapia, Laura; García-Eguiagaray, Josefina; García, Antonio G; Gandía, Luis

    2009-04-01

    We have investigated here whether a preconditioned stimulation of nicotinic and muscarinic receptors augmented the catecholamine release responses elicited by supramaximal 3-s pulses of 100 muM acetylcholine (100ACh) or 100 mM K(+) (100K(+)) applied to fast-perifused bovine adrenal chromaffin cells. Threshold concentrations of nicotine (1-3 muM) that caused only a tiny secretion did, however, augment the responses elicited by 100ACh or 100K(+) by 2- to 3.5-fold. This effect was suppressed by mecamylamine and by Ca(2+) deprivation, was developed with a half-time (t(1/2)) of 1 min, and was reversible. The nicotine effect was mimicked by threshold concentrations of ACh, choline, epibatidine, and oxotremorine-M but not by methacholine. Threshold concentrations of K(+) caused lesser potentiation of secretion compared with that of threshold nicotine. The data are compatible with an hypothesis implying 1) that continuous low-frequency sympathetic discharge places chromaffin cells at the adrenal gland in a permanent "hypersensitive" state; and 2) this allows an explosive secretion of catecholamines by high-frequency sympathetic discharge during stress.

  12. Secretion of dilevalol in breast milk.

    Science.gov (United States)

    Radwanski, E; Nagabhushan, N; Affrime, M B; Perentesis, G; Symchowicz, S; Patrick, J E

    1988-05-01

    The pharmacokinetics of unchanged and total (unchanged plus Glusulase [Biotechnology Systems, Boston, MA]) released dilevalol and secretion into human breast milk was studied in six healthy breast-feeding female volunteers administered a single 400-mg dilevalol hydrochloride capsule. In plasma, the mean Cmax for unchanged dilevalol, 485 ng/mL was reached at 0.8 hour (tmax) and the AUC(48 hours) was 1435 hr X ng/mL. Pharmacokinetic analysis of unchanged dilevalol in plasma showed that dilevalol was distributed and eliminated with half-lives of 0.9 and 8.2 hours, respectively. Breast milk concentrations of unchanged dilevalol as a function of time, paralleled those of plasma but were consistently lower. The milk Cmax, 149 ng/mL, occurred during the 0 to 2 hour collection interval; the AUC(42 hours) for unchanged dilevalol in milk was 663 hr X ng/mL. The mean milk to plasma concentration ratio was 0.46. The unchanged dilevalol plasma concentrations were 12 to 18% those of total drug suggesting that the drug is extensively conjugated. By contrast, the concentrations of unchanged dilevalol in breast milk, based on Cmax and AUC data were 63 to 94% those of total drug, indicating that very little conjugated drug is secreted into breast milk. Through 48 hours, a mean of only 27 micrograms dilevalol or 0.007% of the administered dose was secreted into breast milk, which is much less than that reported for other beta blockers.

  13. Unconventional Protein Secretion in Animal Cells.

    Science.gov (United States)

    Ng, Fanny; Tang, Bor Luen

    2016-01-01

    All eukaryotic cells secrete a range of proteins in a constitutive or regulated manner through the conventional or canonical exocytic/secretory pathway characterized by vesicular traffic from the endoplasmic reticulum, through the Golgi apparatus, and towards the plasma membrane. However, a number of proteins are secreted in an unconventional manner, which are insensitive to inhibitors of conventional exocytosis and use a route that bypasses the Golgi apparatus. These include cytosolic proteins such as fibroblast growth factor 2 (FGF2) and interleukin-1β (IL-1β), and membrane proteins that are known to also traverse to the plasma membrane by a conventional process of exocytosis, such as α integrin and the cystic fibrosis transmembrane conductor (CFTR). Mechanisms underlying unconventional protein secretion (UPS) are actively being analyzed and deciphered, and these range from an unusual form of plasma membrane translocation to vesicular processes involving the generation of exosomes and other extracellular microvesicles. In this chapter, we provide an overview on what is currently known about UPS in animal cells.

  14. Dragon's blood secretion and its ecological significance.

    Science.gov (United States)

    Jura-Morawiec, Joanna; Tulik, Mirela

    Dragon's blood is the name given to a red exudate produced by some plant species belonging to the genera Daemonorops, Dracaena, Croton and Pterocarpus. These are endemic to various parts of the globe. It is classified as a resin or latex depending on its mode of secretion and its chemical composition, which is species specific. This red substance functions in defence and is produced (a) constitutively and stored in preformed anatomical structures, or (b) by induction in response to traumatic events, such as mechanical injury, pathogen attack or invasion by insects. Apart from its defensive role in plants, dragon's blood is also a valuable natural resource renowned since antiquity for its diverse medicinal properties and uses in art. Despite the great importance of dragon's blood, our knowledge of the biological basis for its secretion is still incomplete. This review summarizes recent advances in the study of the anatomical basis for its secretion, and discusses its classification and ecological function. Bringing some clarity to these issues may also help in the commercial sourcing of dragon's blood.

  15. An Ectopic ACTH Secreting Metastatic Parotid Tumour

    Directory of Open Access Journals (Sweden)

    Thomas Dacruz

    2016-01-01

    Full Text Available A 60-year old woman presented with features of Cushing’s syndrome (CS secondary to an ectopic adrenocorticotropic hormone (ACTH secreting metastatic parotid tumour 3 years after excision of the original tumour. She subsequently developed fatal intestinal perforation and unfortunately died despite best possible medical measures. Ectopic ACTH secretion accounts for 5–10% of all patients presenting with ACTH dependent hypercortisolism; small cell carcinoma of lung (SCLC and neuroendocrine tumours (NET account for the majority of such cases. Although there are 4 previous case reports of ectopic ACTH secreting salivary tumours in literature, to our knowledge this is the first published case report in which the CS developed after 3 years of what was deemed as a successful surgical excision of primary salivary tumour. Our patient initially had nonspecific symptoms which may have contributed to a delay in diagnosis. Perforation of sigmoid colon is a recognised though underdiagnosed complication associated with steroid therapy and hypercortisolism. This case demonstrates the challenges faced in diagnosis as well as management of patients with CS apart from the practical difficulties faced while trying to identify source of ectopic ACTH.

  16. Tubular control of renin synthesis and secretion

    Science.gov (United States)

    Briggs, Josephine P.

    2012-01-01

    The intratubular composition of fluid at the tubulovascular contact site of the juxtaglomerular apparatus serves as regulatory input for secretion and synthesis of renin. Experimental evidence, mostly from in vitro perfused preparations, indicates an inverse relation between luminal NaCl concentration and renin secretion. The cellular transduction mechanism is initiated by concentration-dependent NaCl uptake through the Na–K–2Cl cotransporter (NKCC2) with activation of NKCC2 causing inhibition and deactivation of NKCC2 causing stimulation of renin release. Changes in NKCC2 activity are coupled to alterations in the generation of paracrine factors that interact with granular cells. Among these factors, generation of PGE2 in a COX-2-dependent fashion appears to play a dominant role in the stimulatory arm of tubular control of renin release. [NaCl] is a determinant of local PG release over an appropriate concentration range, and blockade of COX-2 activity interferes with the NaCl dependency of renin secretion. The complex array of local paracrine controls also includes nNOS-mediated synthesis of nitric oxide, with NO playing the role of a modifier of the intracellular signaling pathway. A role of adenosine may be particularly important when [NaCl] is increased, and at least some of the available evidence is consistent with an important suppressive effect of adenosine at higher salt concentrations. PMID:22665048

  17. sizzled function and secreted factor network dynamics

    Directory of Open Access Journals (Sweden)

    Jianli Shi

    2012-02-01

    Studies on the role of the E-box binding transcription factor Snail2 (Slug in the induction of neural crest by mesoderm (Shi et al., 2011 revealed an unexpected increase in the level of sizzled RNA in the dorsolateral mesodermal zone (DMLZ of morphant Xenopus embryos. sizzled encodes a secreted protein with both Wnt and BMP inhibitor activities. Morpholino-mediated down-regulation of sizzled expression in one cell of two cell embryos or the C2/C3 blastomeres of 32-cell embryos, which give rise to the DLMZ, revealed decreased expression of the mesodermal marker brachyury and subsequent defects in neural crest induction, pronephros formation, and muscle patterning. Loss of sizzled expression led to decreases in RNAs encoding the secreted Wnt inhibitor SFRP2 and the secreted BMP inhibitor Noggin; the sizzled morphant phenotype could be rescued by co-injection of RNAs encoding Noggin and either SFRP2 or Dickkopf (a mechanistically distinct Wnt inhibitor. Together, these observations reveal that sizzled, in addition to its established role in dorsal-ventral patterning, is also part of a dynamic BMP and Wnt signaling network involved in both mesodermal patterning and neural crest induction.

  18. Secreted dipeptidyl peptidases as potential virulence factors for Microsporum canis.

    Science.gov (United States)

    Vermout, Sandy; Baldo, Aline; Tabart, Jérémy; Losson, Bertrand; Mignon, Bernard

    2008-12-01

    Dermatophytoses caused by Microsporum canis are frequently encountered in cats and dogs; they are highly contagious and readily transmissible to humans. In this study, two single genes, respectively coding for dipeptidyl peptidases IV and V (DppIV and DppV), were isolated and characterized. Both proteins share homology with serine proteases of the S9 family, some of which display properties compatible with implication in pathogenic processes. Both genes are expressed in vivo in experimentally infected guinea-pigs and in naturally infected cats, and when the fungus is grown on extracellular matrix proteins as the sole nitrogen and carbon source. DppIV and V were produced as active recombinant proteases in the yeast Pichia pastoris; the apparent molecular weight of rDppV is 83 kDa, whereas rDppIV appears as a doublet of 95 and 98 kDa. Like other members of its enzymatic subfamily, rDppIV has an unusual ability to cleave Pro-X bonds. This activity does not enhance the solubilization of keratin by fungal secreted endoproteases, and the protease probably acts solely on small soluble peptides. RDppV showed no ability to induce delayed-type hypersensitivity (DTH) skin reactions in guinea-pigs, despite the known immunogenic properties of homologous proteins.

  19. Architecture for the Secret-Key BC3 Cryptography Algorithm

    Directory of Open Access Journals (Sweden)

    Arif Sasongko

    2011-08-01

    Full Text Available Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the implementation aspect. This paper aims to introduce BC3 algorithm with focus on its hardware implementation. It proposes architecture for the hardware implementation for this algorithm. BC3 algorithm is a secret-key cryptography algorithm developed with two considerations: robustness and implementation efficiency. This algorithm has been implemented on software and has good performance compared to AES algorithm. BC3 is improvement of BC2 and AE cryptographic algorithm and it is expected to have the same level of robustness and to gain competitive advantages in the implementation aspect. The development of the architecture gives much attention on (1 resource sharing and (2 having single clock for each round. It exploits regularity of the algorithm. This architecture is then implemented on an FPGA. This implementation is three times smaller area than AES, but about five times faster. Furthermore, this BC3 hardware implementation has better performance compared to BC3 software both in key expansion stage and randomizing stage. For the future, the security of this implementation must be reviewed especially against side channel attack.

  20. Jazz improvisers’ shared understanding: A case study

    Directory of Open Access Journals (Sweden)

    Michael F. Schober

    2014-08-01

    Full Text Available To what extent and in what arenas do collaborating musicians need to understand what they are doing in the same way? Two experienced jazz musicians who had never previously played together played three improvisations on a jazz standard (It Could Happen to You on either side of a visual barrier. They were then immediately interviewed separately about the performances, their musical intentions, and their judgments of their partner’s musical intentions, both from memory and prompted with the audiorecordings of the performances. Statements from both (audiorecorded interviews as well as statements from an expert listener were extracted and anonymized. Two months later, the performers listened to the recordings and rated the extent to which they endorsed each statement. Performers endorsed statements they themselves had generated more often than statements by their performing partner and the expert listener; their overall level of agreement with each other was greater than chance but moderate to low, with disagreements about the quality of one of the performances and about who was responsible for it. The quality of the performances combined with the disparities in agreement suggest that, at least in this case study, fully shared understanding of what happened is not essential for successful improvisation. The fact that the performers endorsed an expert listener’s statements more than their partner’s argues against a simple notion that performers’ interpretations are always privileged relative to an outsider’s.