WorldWideScience

Sample records for zeste identifies key

  1. Effects of chromosomal rearrangements on the zeste-white interaction in Drosophila melanogaster

    International Nuclear Information System (INIS)

    Smolik-Utlaut, S.M.; Gelbart, W.M.

    1987-01-01

    Three gene systems have been shown to exhibit proximity-dependent phenotypes in Drosophila melanogaster; bithorax (BX-C), decapentaplegic (DPP-C) and white (w). In structurally homozygous genotypes, specific allelic combinations at these loci exhibit one phenotype, while in certain rearrangement heterozygotes the same allelic combinations exhibit dramatically different phenotypes. The genetic properties of the proximity-dependent allelic complementation (termed transvection effects) at the BX-C and DPP-C, are quite similar. As determined by cytogenetic analysis of transvection-disrupting rearrangements, the critical regions for the BX-C and DDP-C transvection effects extend proximally from these loci for several hundred polytene chromosome bands. The interaction between the zeste and white loci appears to depend upon the proximity of the two w + alleles. By use of insertional duplications, displacement of w + homologues has been shown to interfere with the zeste-white interaction. In this report, the authors investigate the basis for the difference in the size of the BX-C and DPP-C critical regions from that of white using a 137 Cs-mutagenesis procedure. The authors test and eliminate the possibility that the difference is due to evidence strongly suggests that the zeste-white interaction is, at the phenotypic level, much less sensitive to displacement of the homologous genes than is transvection at either the BX-C or DPP-C. Given these results, they suggest that the zeste-white interaction and transvection are two different proximity-dependent phenomena

  2. Targeting the Enhancer of Zeste Homologue 2 in Medulloblastoma

    Science.gov (United States)

    Alimova, Irina; Venkataraman, Sujatha; Harris, Peter; Marquez, Victor E.; Northcott, Paul A; Dubuc, Adrian; Taylor, Michael D; Foreman, Nicholas K; Vibhakar, Rajeev

    2012-01-01

    Enhancer of zeste homologue 2 (EZH2) is the catalytic subunit of Polycomb repressive complex 2 that catalyzes the trimethylation of histone H3 on Lys 27, and represses gene transcription. EZH2 enhances cancer-cell proliferation and regulates stem cell maintenance and differentiation. Here, we demonstrate that EZH2 is highly expressed in medulloblastoma, a highly malignant brain tumor of childhood, and this altered expression is correlated with genomic gain of chromosome 7 in a subset of medulloblastoma. Inhibition of EZH2 by RNAi suppresses medulloblastoma tumor cell growth. We show that 3-deazaneplanocin A, a chemical inhibitor of EZH2, can suppress medulloblastoma cell growth partially by inducing apoptosis. Suppression of EZH2 expression diminishes the ability of tumor cells to form spheres in culture and strongly represses the ability of known oncogenes to transform neural stem cells. These findings establish a role of EZH2 in medulloblastoma and identify EZH2 as a potential therapeutic target especially in high-risk tumors. PMID:22287205

  3. Mind full of life: Does mindfulness confer resilience to suicide by increasing zest for life?

    Science.gov (United States)

    Collins, Khan R L; Stritzke, Werner G K; Page, Andrew C; Brown, Julia D; Wylde, Tricia J

    2018-01-15

    Mindfulness is a trainable skill that may enhance resilience to suicidality among vulnerable groups such as young people. The current study examined whether mindfulness protects against suicidal desire in the face of heightened risk and adversity by increasing zest for life in a sample of university students. In a prospective design, participants (N = 233) were assessed at two time points over eight weeks. Online surveys included the Mindful Attention and Awareness Scale, Zest for Life Scale, Interpersonal Needs Questionnaire, Kessler Psychological Distress Scale, and items assessing suicidal ideation and suicidal intent. Baseline mindfulness was associated with lower suicidal ideation and intent at follow-up. Moderated mediation analyses confirmed the effects of mindfulness on ideation and intent were mediated by zest for life and these indirect effects were stronger at higher versus lower levels of general (psychological distress) and suicide-specific (perceived burdensomeness and thwarted belongingness) risk. Single item assessments of suicidal desire. Findings suggest that mindfulness protects against suicidal desire in conditions of heightened risk and adversity by enhancing one's orientation towards a life worth living. Theories of suicide should consider the dynamic interplay between risk and life-sustaining resilience, while clinicians treating suicidality could use mindfulness strategies to strengthen the desire to (re)engage with life, thereby complementing direct amelioration of suicide risk factors. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Mindfulness and zest for life buffer the negative effects of experimentally-induced perceived burdensomeness and thwarted belongingness: Implications for theories of suicide.

    Science.gov (United States)

    Collins, Khan R L; Best, Ida; Stritzke, Werner G K; Page, Andrew C

    2016-07-01

    Suicide research can be enhanced by an ability to safely manipulate putative causal variables. The present studies developed an experimental task to modify risk factors identified by the interpersonal theory of suicide (perceived burdensomeness and thwarted belongingness) and examine their hypothesized suppressive effect on persistence in adversity in undergraduate university students. Variables that may moderate the impact of these risk factors on persistence (zest for life and mindful awareness) were incorporated as potential resilience factors. Study 1 (N = 92) found elevated burdensomeness and diminished belongingness significantly impaired persistence. Additionally, these predicted effects were moderated by individual differences in zest for life. In Study 2 (N = 52), individuals trained in mindfulness prior to the experimental task displayed greater persistence relative to controls. Findings provide experimental support for the role of perceived burdensomeness and thwarted belongingness in the manner predicted by the interpersonal theory, and demonstrate a way to experimentally test the effects of resilience factors that reduce the impact of these interpersonal factors. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  5. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  6. Academic Optimism, Hope and Zest for Work as Predictors of Teacher Self-Efficacy and Perceived Success

    Science.gov (United States)

    Sezgin, Ferudun; Erdogan, Onur

    2015-01-01

    This study explores the predictive influence of primary school teachers' academic optimism, hope and zest for work on perceptions of their self-efficacy and success. A total of 600 teachers were selected through stratified sampling from 27 primary schools in central districts of Ankara, Turkey, to form the research sample. Intervariable…

  7. ZEST: A Fast Code for Simulating Zeeman-Stark Line-Shape Functions

    Directory of Open Access Journals (Sweden)

    Franck Gilleron

    2018-03-01

    Full Text Available We present the ZEST code, dedicated to the calculation of line shapes broadened by Zeeman and Stark effects. As concerns the Stark effect, the model is based on the Standard Lineshape Theory in which ions are treated in the quasi-static approximation, whereas the effects of electrons are represented by weak collisions in the framework of a binary collision relaxation theory. A static magnetic field may be taken into account in the radiator Hamiltonian in the dipole approximation, which leads to additional Zeeman splitting patterns. Ion dynamics effects are implemented using the fast Frequency-Fluctuation Model. For fast calculations, the static ion microfield distribution in the plasma is evaluated using analytic fits of Monte-Carlo simulations, which depend only on the ion-ion coupling parameter and the electron-ion screening factor.

  8. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  9. Enhancer of Zeste Homolog 2 Overexpression in Nasopharyngeal Carcinoma: An Independent Poor Prognosticator That Enhances Cell Growth

    International Nuclear Information System (INIS)

    Hwang, Chung-Feng; Huang, Hsuan-Ying; Chen, Chang-Han; Chien, Chih-Yen; Hsu, Yao-Chung; Li, Chien-Feng

    2012-01-01

    Purpose: As a key component of polycomb-repressive complex 2, enhancer of zeste homolog 2 (EZH2) represses target genes through histone methylation and is frequently overexpressed and associated with poor prognosis in common carcinomas. For the first time, we reported EZH2 expression and its biological and clinical significance in nasopharyngeal carcinoma (NPC). Methods and Materials: In NPC cell lines and specimens, endogenous expression of EZH2 mRNA and protein was determined by semiquantitative reverse transcription–polymerase chain reaction and immunoblotting, respectively. To analyze the effect on cell growth, stable silencing of EZH2 was established in EZH2-expressing TW02 NPC cells with RNA interference. EZH2 immunolabeling was assessable for 89 primary NPC biopsy samples and correlated with clinicopathological variables, disease-specific survival (DSS), and overall survival (OS). Results: Growth activity of TW02 cells was significantly suppressed (p < 0.001) with stable EZH2 silencing. Compared with normal nasopharyngeal tissue, expression levels of EZH2 transcript and protein were apparently upregulated in NPC specimens. As a continuous variable, higher EZH2 expression preferentially occurred in NPCs of T3 to T4 stages (p = 0.03) and significantly predicted inferior DSS (p = 0.0010) and OS (p = 0.004). The prognostic implications for DSS (p = 0.010) and OS (p = 0.006) still remained valid when using the median (≥60%) of EZH2 immunolabeling index to dichotomize the cohort. In the multivariate model, higher EZH2 expression was an independent adverse factor of both DSS (p = 0.012) and OS (p = 0.011), along with American Joint Committee on Cancer Stages III to IV (p = 0.024 for DSS, p = 0.017 for OS). Conclusion: At least partly through promoting cell growth, EZH2 implicates disease progression, confers tumor aggressiveness, and represents an independent adverse prognosticator in patients with NPC.

  10. Prevalence of Enhancer of Zeste Homolog 2 in Patients with Resected Small Cell Lung Cancer.

    Science.gov (United States)

    Toyokawa, Gouji; Takada, Kazuki; Tagawa, Tetsuzo; Kinoshita, Fumihiko; Kozuma, Yuka; Matsubara, Taichi; Haratake, Naoki; Takamori, Shinkichi; Akamine, Takaki; Hirai, Fumihiko; Yamada, Yuichi; Hamamoto, Ryuji; Oda, Yoshinao; Maehara, Yoshihiko

    2018-06-01

    Enhancer of zeste homolog 2 (EZH2) is a histone methyltransferase that is deeply involved in cancer pathogenesis. Although clinicopathological significance of EZH2 in non-small cell lung cancer has been gradually elucidated, such significance in small cell lung cancer (SCLC) has yet to be fully investigated. Forty patients with resected SCLC were analyzed for EZH2. EZH2 expression was evaluated using the Allred score (0-8) and was classified into negative (0-6) and positive (7 and 8). We evaluated the association between EZH2 and the clinicopathological characteristics and postoperative survivals. Among 40 patients, 15 (37.5%) and 25 (62.5%) were classified as being negative and positive for EZH2, respectively. Fisher's exact test demonstrated no significant associations between the positivity for EZH2 and clinicopathological characteristics. No significant differences were observed in recurrence-free and overall survivals between EZH2-negative/low and EZH2-high patients. EZH2 was frequently observed in patients with resected SCLC, but no significant associations were found between its expression and the clinicopathological characteristics and postoperative survivals. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  11. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  12. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  13. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  14. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  15. A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper

    OpenAIRE

    Carina Ihlström Eriksson; Jesper Svensson

    2009-01-01

    We have studied the pre-adoption phase of the e-newspaper, i.e. a newspaper published with e-paper technology. The research question of this article is: In what way can a user centered innovation process contribute to identifying key values in mobile innovations? The aim of this article is threefold: firstly, to identify key values for the e-newspaper, secondly, to examine the intention to adopt a new possible innovation and thirdly, to explore user centered design processes ability to captur...

  16. Social Network Analysis Identifies Key Participants in Conservation Development.

    Science.gov (United States)

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  17. Enhancer of zeste homologue 2 plays an important role in neuroblastoma cell survival independent of its histone methyltransferase activity.

    Science.gov (United States)

    Bate-Eya, Laurel T; Gierman, Hinco J; Ebus, Marli E; Koster, Jan; Caron, Huib N; Versteeg, Rogier; Dolman, M Emmy M; Molenaar, Jan J

    2017-04-01

    Neuroblastoma is predominantly characterised by chromosomal rearrangements. Next to V-Myc Avian Myelocytomatosis Viral Oncogene Neuroblastoma Derived Homolog (MYCN) amplification, chromosome 7 and 17q gains are frequently observed. We identified a neuroblastoma patient with a regional 7q36 gain, encompassing the enhancer of zeste homologue 2 (EZH2) gene. EZH2 is the histone methyltransferase of lysine 27 of histone H3 (H3K27me3) that forms the catalytic subunit of the polycomb repressive complex 2. H3K27me3 is commonly associated with the silencing of genes involved in cellular processes such as cell cycle regulation, cellular differentiation and cancer. High EZH2 expression correlated with poor prognosis and overall survival independent of MYCN amplification status. Unexpectedly, treatment of 3 EZH2-high expressing neuroblastoma cell lines (IMR32, CHP134 and NMB), with EZH2-specific inhibitors (GSK126 and EPZ6438) resulted in only a slight G1 arrest, despite maximum histone methyltransferase activity inhibition. Furthermore, colony formation in cell lines treated with the inhibitors was reduced only at concentrations much higher than necessary for complete inhibition of EZH2 histone methyltransferase activity. Knockdown of the complete protein with three independent shRNAs resulted in a strong apoptotic response and decreased cyclin D1 levels. This apoptotic response could be rescued by overexpressing EZH2ΔSET, a truncated form of wild-type EZH2 lacking the SET transactivation domain necessary for histone methyltransferase activity. Our findings suggest that high EZH2 expression, at least in neuroblastoma, has a survival function independent of its methyltransferase activity. This important finding highlights the need for studies on EZH2 beyond its methyltransferase function and the requirement for compounds that will target EZH2 as a complete protein. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Key Issues in Empirically Identifying Chronically Low-Performing and Turnaround Schools

    Science.gov (United States)

    Hansen, Michael

    2012-01-01

    One of the US Department of Education's key priorities is turning around the nation's persistently low-achieving schools, yet exactly how to identify low-performing schools is a task left to state policy makers, and a myriad of definitions have been utilized. In addition, exactly how to recognize when a school begins to turn around is not well…

  19. Integrated systems approach identifies risk regulatory pathways and key regulators in coronary artery disease.

    Science.gov (United States)

    Zhang, Yan; Liu, Dianming; Wang, Lihong; Wang, Shuyuan; Yu, Xuexin; Dai, Enyu; Liu, Xinyi; Luo, Shanshun; Jiang, Wei

    2015-12-01

    Coronary artery disease (CAD) is the most common type of heart disease. However, the molecular mechanisms of CAD remain elusive. Regulatory pathways are known to play crucial roles in many pathogenic processes. Thus, inferring risk regulatory pathways is an important step toward elucidating the mechanisms underlying CAD. With advances in high-throughput data, we developed an integrated systems approach to identify CAD risk regulatory pathways and key regulators. Firstly, a CAD-related core subnetwork was identified from a curated transcription factor (TF) and microRNA (miRNA) regulatory network based on a random walk algorithm. Secondly, candidate risk regulatory pathways were extracted from the subnetwork by applying a breadth-first search (BFS) algorithm. Then, risk regulatory pathways were prioritized based on multiple CAD-associated data sources. Finally, we also proposed a new measure to prioritize upstream regulators. We inferred that phosphatase and tensin homolog (PTEN) may be a key regulator in the dysregulation of risk regulatory pathways. This study takes a closer step than the identification of disease subnetworks or modules. From the risk regulatory pathways, we could understand the flow of regulatory information in the initiation and progression of the disease. Our approach helps to uncover its potential etiology. We developed an integrated systems approach to identify risk regulatory pathways. We proposed a new measure to prioritize the key regulators in CAD. PTEN may be a key regulator in dysregulation of the risk regulatory pathways.

  20. Identifying key genes associated with acute myocardial infarction.

    Science.gov (United States)

    Cheng, Ming; An, Shoukuan; Li, Junquan

    2017-10-01

    This study aimed to identify key genes associated with acute myocardial infarction (AMI) by reanalyzing microarray data. Three gene expression profile datasets GSE66360, GSE34198, and GSE48060 were downloaded from GEO database. After data preprocessing, genes without heterogeneity across different platforms were subjected to differential expression analysis between the AMI group and the control group using metaDE package. P FI) network. Then, DEGs in each module were subjected to pathway enrichment analysis using DAVID. MiRNAs and transcription factors predicted to regulate target DEGs were identified. Quantitative real-time polymerase chain reaction (RT-PCR) was applied to verify the expression of genes. A total of 913 upregulated genes and 1060 downregulated genes were identified in the AMI group. A FI network consists of 21 modules and DEGs in 12 modules were significantly enriched in pathways. The transcription factor-miRNA-gene network contains 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p. RT-PCR validations showed that expression levels of FOXO3 and MYBL2 were significantly increased in AMI, and expression levels of hsa-miR-21-5p and hsa-miR-30c-5p were obviously decreased in AMI. A total of 41 DEGs, such as SOCS3, VAPA, and COL5A2, are speculated to have roles in the pathogenesis of AMI; 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p may be involved in the regulation of the expression of these DEGs.

  1. Enhancer of zeste homolog 2 as an independent prognostic marker for cancer: a meta-analysis.

    Directory of Open Access Journals (Sweden)

    Shuling Chen

    Full Text Available Novel biomarkers are of particular interest for predicting cancer prognosis. This study aimed to explore the associations between enhancer of zeste homolog 2 (EZH2 and patient survival in various cancers.Relevant literature was retrieved from PubMed and Web of Science databases. Pooled hazard ratios (HRs, odds ratios (ORs, and 95% confidence intervals (CIs were calculated.Forty-nine studies (8,050 patients were included. High EZH2 expression was significantly associated with shorter overall (hazard ratio [HR] 1.74, 95% CI: 1.46-2.07, disease-free (HR 1.59, 95% CI: 1.27-1.99, metastasis-free (HR 2.19, 95% CI: 1.38-3.47, progression-free (HR 2.53, 95% CI: 1.52-4.21, cancer-specific (HR 3.13, 95% CI: 1.70-5.74, and disease-specific (HR 2.29, 95% CI: 1.56-3.35 survival, but not recurrence-free survival (HR 1.38, 95% CI: 0.93-2.06. Moreover, EZH2 expression significantly correlated with distant metastasis (OR 3.25, 95% CI: 1.07-9.87 in esophageal carcinoma; differentiation (OR 3.00, 95% CI: 1.37-6.55 in non-small cell lung cancer; TNM stage (OR 3.18, 95% CI: 2.49-4.08 in renal cell carcinoma; and histological grade (OR 4.50, 95% CI: 3.33-6.09, estrogen receptor status (OR 0.15, 95% CI: 0.11-0.20 and progesterone receptor status (OR 0.30, 95% CI: 0.23-0.39 in breast cancer.Our results suggested that EZH2 might be an independent prognostic factor for multiple survival measures in different cancers.

  2. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  3. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  4. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  5. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    Science.gov (United States)

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  6. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  7. Predictive model identifies key network regulators of cardiomyocyte mechano-signaling.

    Directory of Open Access Journals (Sweden)

    Philip M Tan

    2017-11-01

    Full Text Available Mechanical strain is a potent stimulus for growth and remodeling in cells. Although many pathways have been implicated in stretch-induced remodeling, the control structures by which signals from distinct mechano-sensors are integrated to modulate hypertrophy and gene expression in cardiomyocytes remain unclear. Here, we constructed and validated a predictive computational model of the cardiac mechano-signaling network in order to elucidate the mechanisms underlying signal integration. The model identifies calcium, actin, Ras, Raf1, PI3K, and JAK as key regulators of cardiac mechano-signaling and characterizes crosstalk logic imparting differential control of transcription by AT1R, integrins, and calcium channels. We find that while these regulators maintain mostly independent control over distinct groups of transcription factors, synergy between multiple pathways is necessary to activate all the transcription factors necessary for gene transcription and hypertrophy. We also identify a PKG-dependent mechanism by which valsartan/sacubitril, a combination drug recently approved for treating heart failure, inhibits stretch-induced hypertrophy, and predict further efficacious pairs of drug targets in the network through a network-wide combinatorial search.

  8. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  9. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  10. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  11. Increased expression of enhancer of Zeste Homolog 2 (EZH2) differentiates squamous cell carcinoma from normal skin and actinic keratosis.

    Science.gov (United States)

    Xie, Qiang; Wang, Hongbei; Heilman, Edward R; Walsh, Michael G; Haseeb, M A; Gupta, Raavi

    2014-01-01

    Enhancer of Zeste Homolog 2 (EZH2) is a polycomb group protein that has been shown to be involved in the progression of multiple human cancers including melanoma. The expression of EZH2 in normal skin and in pre-malignant and malignant cutaneous squamous cell carcinoma (SCC) has not been studied. We examined the expression of EZH2 in normal skin, actinic keratosis (AK), SCC in situ, well-differentiated (SCC-WD), moderately-differentiated (SCC-MD) and poorly-differentiated SCC (SCC-PD) to ascertain whether EZH2 expression differentiates these conditions. Immunohistochemical staining for EZH2 was performed on formalin-fixed paraffin-embedded biopsies and a tissue microarray containing normal skin, AK, SCC in situ, and SCC of different grades. In comparison to the normal skin, EZH2 expression in actinic keratosis was increased (p=0.03). Similarly, EZH2 expression in all of the neoplastic conditions studied (SCC in situ, SCC-WD, SCC-MD and SCC-PD) was greatly increased in comparison to both the normal skin and actinic keratosis (p≤0.001). EZH2 expression increases incrementally from normal skin to AK and further to SCC, suggesting a role for EZH2 in the progression and differentiation of SCC. EZH2 expression may be used as a diagnostic marker for differentiating SCC from AK or normal skin.

  12. Identifying Key Stakeholder Groups for Implementing a Place Branding Policy in Saint Petersburg

    Directory of Open Access Journals (Sweden)

    Kulibanova V. V.

    2017-10-01

    Full Text Available Regional brands have become a valuable intangible asset and a crucial competitive resource for forging partnerships. An effective place branding policy is impossible without a precise understanding of the interests of stakeholder groups. It is essential to realize that each region is unique in its own way. Territories differ in the structure of stakeholders, their influence on regional development, and the range of leverages over regional decision-makers. This study aims to give a more precise definition of key groups of stakeholders in Saint Petersburg place branding, and to identify them. The authors employ the method of theoretical and empirical typology of a territory’s stakeholders within a theoretical framework proposed by E. Freeman, P. Kotler, S. Zenker, and E. Brown. The article defines the concept of key regional stakeholders and identifies them. The proposed target audience (stakeholder group model for a place branding policy is tested on the case of Saint Petersburg. The authors show that each target audience of place marketing requires an individual policy. This is explained by the fact that each group enjoys its unique features that should be taken into account when creating and transmitting messages.

  13. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  14. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  15. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  16. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  17. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  18. Identifying the key personnel in a nurse-initiated hospital waste reduction program.

    Science.gov (United States)

    McDermott-Levy, Ruth; Fazzini, Carol

    2010-01-01

    Hospitals in the United States generate more than 6600 tons of trash a day and approximately 85% of the waste is nonhazardous solid waste such as food, cardboard, and plastic. Treatment and management of hospital waste can lead to environmental problems for the communities that receive the waste. One health system's shared governance model provided the foundation to develop a nurse-led hospital waste reduction program that focused on point-of-care waste management. Waste reduction program development required working with a variety of departments within and external to the health system. The interdisciplinary approach informed the development of the waste reduction program. This article identifies the key departments that were necessary to include when developing a hospital waste reduction program.

  19. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  20. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  1. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  2. Computational modeling identifies key gene regulatory interactions underlying phenobarbital-mediated tumor promotion

    Science.gov (United States)

    Luisier, Raphaëlle; Unterberger, Elif B.; Goodman, Jay I.; Schwarz, Michael; Moggs, Jonathan; Terranova, Rémi; van Nimwegen, Erik

    2014-01-01

    Gene regulatory interactions underlying the early stages of non-genotoxic carcinogenesis are poorly understood. Here, we have identified key candidate regulators of phenobarbital (PB)-mediated mouse liver tumorigenesis, a well-characterized model of non-genotoxic carcinogenesis, by applying a new computational modeling approach to a comprehensive collection of in vivo gene expression studies. We have combined our previously developed motif activity response analysis (MARA), which models gene expression patterns in terms of computationally predicted transcription factor binding sites with singular value decomposition (SVD) of the inferred motif activities, to disentangle the roles that different transcriptional regulators play in specific biological pathways of tumor promotion. Furthermore, transgenic mouse models enabled us to identify which of these regulatory activities was downstream of constitutive androstane receptor and β-catenin signaling, both crucial components of PB-mediated liver tumorigenesis. We propose novel roles for E2F and ZFP161 in PB-mediated hepatocyte proliferation and suggest that PB-mediated suppression of ESR1 activity contributes to the development of a tumor-prone environment. Our study shows that combining MARA with SVD allows for automated identification of independent transcription regulatory programs within a complex in vivo tissue environment and provides novel mechanistic insights into PB-mediated hepatocarcinogenesis. PMID:24464994

  3. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  4. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    International Nuclear Information System (INIS)

    McClain, Lynn; Smith, Art; O'Regan, Patrick

    2002-01-01

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  5. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  6. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Identifying the key concerns of Irish persons with intellectual disability.

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-11-01

    Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in society using an inclusive research strategy for both data gathering and data analysis. A national study involving 23 focus groups and 168 persons was conducted on the island of Ireland with people with intellectual disability as co-facilitators. A thematic content analysis was undertaken of the verbatim transcripts initially by university co-researchers, and 19 themes were identified. Co-researchers with intellectual disability joined in identifying the eight core themes. These were as follows: living options, employment, relationships, citizenship, leisure time, money management, self-advocacy, and communication. The concerns are discussed within the framework of the CRPD, and implications for transforming service policy are drawn. Why we did the research In many countries, people with intellectual disability have difficulties doing things other people without disabilities do, for example to study, to get a job or to live independently. They also find that their rights are not respected under the Convention on the Rights of Persons with Disabilities (the Convention). We did this study to Learn what are the main issues for adults with intellectual disability in Ireland. Do research with people with intellectual disability. How we did the research People with intellectual disability and their supporters worked with university researchers to plan and do the research. We met with people in groups and 168 people told us about things important to them. What we found out We found that there were very important things that people talked about in the groups. We chose the most important: living options, employment, relationships, rights, leisure, money

  8. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  9. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    Science.gov (United States)

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  10. Human-automation collaboration in manufacturing: identifying key implementation factors

    OpenAIRE

    Charalambous, George; Fletcher, Sarah; Webb, Philip

    2013-01-01

    Human-automation collaboration refers to the concept of human operators and intelligent automation working together interactively within the same workspace without conventional physical separation. This concept has commanded significant attention in manufacturing because of the potential applications, such as the installation of large sub-assemblies. However, the key human factors relevant to human-automation collaboration have not yet been fully investigated. To maximise effective implement...

  11. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  12. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  13. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    International Nuclear Information System (INIS)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro; Uehara, Takeki; Kato, Yuki; Kono, Hiroshi; Bataller, Ramon; Rusyn, Ivan

    2016-01-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl 4 )-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl 4 (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl 4 . We observed that combined treatment with CCl 4 and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis

  14. Identifying key drivers of greenhouse gas emissions from biomass feedstocks for energy production

    International Nuclear Information System (INIS)

    Johnson, David R.; Curtright, Aimee E.; Willis, Henry H.

    2013-01-01

    Highlights: • Production emissions dominate transportation and processing emissions. • Choice of feedstock, geographic location and prior land use drive emissions profile. • Within scenarios, emissions variability is driven by uncertainty in yields. • Favorable scenarios maximize carbon storage from direct land-use change. • Similarly, biomass production should attempt to minimize indirect land-use change. -- Abstract: Many policies in the United States, at both the federal and state levels, encourage the adoption of renewable energy from biomass. Though largely motivated by a desire to reduce greenhouse gas emissions, these policies do not explicitly identify scenarios in which the use of biomass will produce the greatest benefits. We have modeled “farm-to-hopper” emissions associated with seven biomass feedstocks, under a wide variety of scenarios and production choices, to characterize the uncertainty in emissions. We demonstrate that only a handful of factors have a significant impact on life cycle emissions: choice of feedstock, geographic location, prior land use, and time dynamics. Within a given production scenario, the remaining variability in emissions is driven by uncertainty in feedstock yields and the release rate of N 2 O into the atmosphere from nitrogen fertilizers. With few exceptions, transport and processing choices have relatively little impact on total emissions. These results illustrate the key decisions that will determine the success of biomass programs in reducing the emissions profile of energy production, and our publicly available model provides a useful tool for identifying the most beneficial production scenarios. While model data and results are restricted to biomass production in the contiguous United States, we provide qualitative guidance for identifying favorable production scenarios that should be applicable in other regions

  15. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  16. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana

    OpenAIRE

    Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original mult...

  17. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    Energy Technology Data Exchange (ETDEWEB)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States); Uehara, Takeki; Kato, Yuki [Laboratory of Veterinary Pathology, Osaka Prefecture University, Osaka (Japan); Kono, Hiroshi [First Department of Surgery, University of Yamanashi, Yamanashi (Japan); Bataller, Ramon [Division of Gastroenterology & Hepatology, Department of Medicine, University of North Carolina, Chapel Hill, NC (United States); Rusyn, Ivan, E-mail: irusyn@tamu.edu [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States)

    2016-11-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl{sub 4})-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl{sub 4} (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl{sub 4}. We observed that combined treatment with CCl{sub 4} and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis.

  18. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  19. Identifying Key Stakeholders in Blended Tertiary Environments: Experts' Perspectives

    Science.gov (United States)

    Tuapawa, Kimberley

    2017-01-01

    Although key stakeholders in blended tertiary environments (BTEs) fulfil an extraordinary role in higher education, significant gaps in knowledge about their identities may be impeding the provision of stakeholder support, limiting their ability to promote effective learning and teaching. As online growth intensifies, it is critical that tertiary…

  20. A Simple Key for Identifying the Sibling Species of the Malaria Vector Anopheles gambiae (Giles Complex by Polytene Chromosome Cytogenetics

    Directory of Open Access Journals (Sweden)

    Music Temitope OBEMBE

    2018-03-01

    Full Text Available It has been established that Anopheles gambiae complex sibling species are the major Plasmodium malaria vectors in Africa; however, not all the sibling species transmit the infection. Easier molecular methods, PCR-based assays, have been developed to distinguish the several members of the A. gambiae complex. However, malaria vector research in less developed countries, particularly sub-Saharan Africa, is being hampered by the lack of PCR facilities in laboratories and the cost of carrying out the assay within lack of funding. Hence, the present study was designed to develop a simple identification key, based on an affordable method of polytene chromosome cytotaxonomy, for identifying the major P. falciparum vectors. The Identification Key was successfully used to identify two members of the A. gambiae complex, A. gambiae sensu stricto and A. arabiensis, which are the most potent malaria vectors in Africa; even so, it could not be used to establish the infective and the refractory strains.

  1. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  2. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  3. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  4. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  5. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    Science.gov (United States)

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  6. A chimeric fusion of the hASH1 and EZH2 promoters mediates high and specific reporter and suicide gene expression and cytotoxicity in small cell lung cancer cells

    DEFF Research Database (Denmark)

    Poulsen, T.T.; Pedersen, N.; Juel, H.

    2008-01-01

    Transcriptionally targeted gene therapy is a promising experimental modality for treatment of systemic malignancies such as small cell lung cancer (SCLC). We have identified the human achaete-scute homolog 1 (hASH1) and enhancer of zeste homolog 2 (EZH2) genes as highly upregulated in SCLC compar...

  7. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  8. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  9. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  10. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  11. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  12. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  13. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  14. Using sensitivity analysis to identify key factors for the propagation of a plant epidemic.

    Science.gov (United States)

    Rimbaud, Loup; Bruchou, Claude; Dallot, Sylvie; Pleydell, David R J; Jacquot, Emmanuel; Soubeyrand, Samuel; Thébaud, Gaël

    2018-01-01

    Identifying the key factors underlying the spread of a disease is an essential but challenging prerequisite to design management strategies. To tackle this issue, we propose an approach based on sensitivity analyses of a spatiotemporal stochastic model simulating the spread of a plant epidemic. This work is motivated by the spread of sharka, caused by plum pox virus , in a real landscape. We first carried out a broad-range sensitivity analysis, ignoring any prior information on six epidemiological parameters, to assess their intrinsic influence on model behaviour. A second analysis benefited from the available knowledge on sharka epidemiology and was thus restricted to more realistic values. The broad-range analysis revealed that the mean duration of the latent period is the most influential parameter of the model, whereas the sharka-specific analysis uncovered the strong impact of the connectivity of the first infected orchard. In addition to demonstrating the interest of sensitivity analyses for a stochastic model, this study highlights the impact of variation ranges of target parameters on the outcome of a sensitivity analysis. With regard to sharka management, our results suggest that sharka surveillance may benefit from paying closer attention to highly connected patches whose infection could trigger serious epidemics.

  15. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  16. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  17. Co-Phenylcaine Spray: can we improve the taste? A randomised, double-blind, crossover study.

    Science.gov (United States)

    Bailey, S; Panizza, B; Cabot, P; Wallwork, B

    2018-02-01

    Co-Phenylcaine Forte is a nasal spray routinely prescribed by otolaryngologists in Australia. The taste of Co-Phenylcaine Forte is typically described as unpleasant. This study sought to improve the overall patient experience associated with Co-Phenylcaine Forte by generating a Co-Phenylcaine Forte formulation, referred to as Co-Phenylcaine Zest, which contains an added vanilla flavour and masking agent. Participants were randomised to receive two actuations of Co-Phenylcaine Forte in each nostril followed by two actuations of Co-Phenylcaine Zest, or vice versa. There was a 6-36-hour washout period between each treatment. After the administration of each spray, participants completed a questionnaire to rate various sensory attributes of each formulation on seven-point ordinal scales. Patients reported their overall formulation preference after receiving both treatments. A total of 86 participants completed the trial. Seventy-four per cent of patients preferred Co-Phenylcaine Zest, 21 per cent preferred Co-Phenylcaine Forte and 5 per cent had no preference (p < 0.001). The satisfaction score associated with Co-Phenylcaine Zest was 1.22 points greater than with Co-Phenylcaine Forte (p < 0.001). A novel formulation of Co-Phenylcaine Forte was created by adding a flavour and a masking agent; this formulation was preferred by most patients.

  18. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  19. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  20. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    Science.gov (United States)

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  1. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  2. Zambian Peer Educators for HIV Self-Testing (ZEST) study: rationale and design of a cluster randomised trial of HIV self-testing among female sex workers in Zambia.

    Science.gov (United States)

    Oldenburg, Catherine E; Ortblad, Katrina F; Chanda, Michael M; Mwanda, Kalasa; Nicodemus, Wendy; Sikaundi, Rebecca; Fullem, Andrew; Barresi, Leah G; Harling, Guy; Bärnighausen, Till

    2017-04-20

    HIV testing and knowledge of status are starting points for HIV treatment and prevention interventions. Among female sex workers (FSWs), HIV testing and status knowledge remain far from universal. HIV self-testing (HIVST) is an alternative to existing testing services for FSWs, but little evidence exists how it can be effectively and safely implemented. Here, we describe the rationale and design of a cluster randomised trial designed to inform implementation and scale-up of HIVST programmes for FSWs in Zambia. The Zambian Peer Educators for HIV Self-Testing (ZEST) study is a 3-arm cluster randomised trial taking place in 3 towns in Zambia. Participants (N=900) are eligible if they are women who have exchanged sex for money or goods in the previous 1 month, are HIV negative or status unknown, have not tested for HIV in the previous 3 months, and are at least 18 years old. Participants are recruited by peer educators working in their communities. Participants are randomised to 1 of 3 arms: (1) direct distribution (in which they receive an HIVST from the peer educator directly); (2) fixed distribution (in which they receive a coupon with which to collect the HIVST from a drug store or health post) or (3) standard of care (referral to existing HIV testing services only, without any offer of HIVST). Participants are followed at 1 and 4 months following distribution of the first HIVST. The primary end point is HIV testing in the past month measured at the 1-month and 4-month visits. This study was approved by the Institutional Review Boards at the Harvard T.H. Chan School of Public Health in Boston, USA and ERES Converge in Lusaka, Zambia. The findings of this trial will be presented at local, regional and international meetings and submitted to peer-reviewed journals for publication. Pre-results; NCT02827240. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  3. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  4. Genome-wide expression profiling analysis to identify key genes in the anti-HIV mechanism of CD4+ and CD8+ T cells.

    Science.gov (United States)

    Gao, Lijie; Wang, Yunqi; Li, Yi; Dong, Ya; Yang, Aimin; Zhang, Jie; Li, Fengying; Zhang, Rongqiang

    2018-07-01

    Comprehensive bioinformatics analyses were performed to explore the key biomarkers in response to HIV infection of CD4 + and CD8 + T cells. The numbers of CD4 + and CD8 + T cells of HIV infected individuals were analyzed and the GEO database (GSE6740) was screened for differentially expressed genes (DEGs) in HIV infected CD4 + and CD8 + T cells. Gene Ontology enrichment, KEGG pathway analyses, and protein-protein interaction (PPI) network were performed to identify the key pathway and core proteins in anti-HIV virus process of CD4 + and CD8 + T cells. Finally, we analyzed the expressions of key proteins in HIV-infected T cells (GSE6740 dataset) and peripheral blood mononuclear cells(PBMCs) (GSE511 dataset). 1) CD4 + T cells counts and ratio of CD4 + /CD8 + T cells decreased while CD8 + T cells counts increased in HIV positive individuals; 2) 517 DEGs were found in HIV infected CD4 + and CD8 + T cells at acute and chronic stage with the criterial of P-value T cells. The main biological processes of the DEGs were response to virus and defense response to virus. At chronic stage, ISG15 protein, in conjunction with IFN-1 pathway might play key roles in anti-HIV responses of CD4 + T cells; and 4) The expression of ISG15 increased in both T cells and PBMCs after HIV infection. Gene expression profile of CD4 + and CD8 + T cells changed significantly in HIV infection, in which ISG15 gene may play a central role in activating the natural antiviral process of immune cells. © 2018 Wiley Periodicals, Inc.

  5. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  6. The building blocks of a 'Liveable Neighbourhood': Identifying the key performance indicators for walking of an operational planning policy in Perth, Western Australia.

    Science.gov (United States)

    Hooper, Paula; Knuiman, Matthew; Foster, Sarah; Giles-Corti, Billie

    2015-11-01

    Planning policy makers are requesting clearer guidance on the key design features required to build neighbourhoods that promote active living. Using a backwards stepwise elimination procedure (logistic regression with generalised estimating equations adjusting for demographic characteristics, self-selection factors, stage of construction and scale of development) this study identified specific design features (n=16) from an operational planning policy ("Liveable Neighbourhoods") that showed the strongest associations with walking behaviours (measured using the Neighbourhood Physical Activity Questionnaire). The interacting effects of design features on walking behaviours were also investigated. The urban design features identified were grouped into the "building blocks of a Liveable Neighbourhood", reflecting the scale, importance and sequencing of the design and implementation phases required to create walkable, pedestrian friendly developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  8. Hillslope characterization: Identifying key controls on local-scale plant communities' distribution using remote sensing and subsurface data fusion.

    Science.gov (United States)

    Falco, N.; Wainwright, H. M.; Dafflon, B.; Leger, E.; Peterson, J.; Steltzer, H.; Wilmer, C.; Williams, K. H.; Hubbard, S. S.

    2017-12-01

    Mountainous watershed systems are characterized by extreme heterogeneity in hydrological and pedological properties that influence biotic activities, plant communities and their dynamics. To gain predictive understanding of how ecosystem and watershed system evolve under climate change, it is critical to capture such heterogeneity and to quantify the effect of key environmental variables such as topography, and soil properties. In this study, we exploit advanced geophysical and remote sensing techniques - coupled with machine learning - to better characterize and quantify the interactions between plant communities' distribution and subsurface properties. First, we have developed a remote sensing data fusion framework based on the random forest (RF) classification algorithm to estimate the spatial distribution of plant communities. The framework allows the integration of both plant spectral and structural information, which are derived from multispectral satellite images and airborne LiDAR data. We then use the RF method to evaluate the estimated plant community map, exploiting the subsurface properties (such as bedrock depth, soil moisture and other properties) and geomorphological parameters (such as slope, curvature) as predictors. Datasets include high-resolution geophysical data (electrical resistivity tomography) and LiDAR digital elevation maps. We demonstrate our approach on a mountain hillslope and meadow within the East River watershed in Colorado, which is considered to be a representative headwater catchment in the Upper Colorado Basin. The obtained results show the existence of co-evolution between above and below-ground processes; in particular, dominant shrub communities in wet and flat areas. We show that successful integration of remote sensing data with geophysical measurements allows identifying and quantifying the key environmental controls on plant communities' distribution, and provides insights into their potential changes in the future

  9. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  10. Labont? Identifies Key Issues for Health Promoters in the New World Order

    OpenAIRE

    Raphael, Dennis

    2016-01-01

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ...

  11. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  12. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  13. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  14. Identifying Key Flavors in Strawberries Driving Liking via Internal and External Preference Mapping.

    Science.gov (United States)

    Oliver, Penelope; Cicerale, Sara; Pang, Edwin; Keast, Russell

    2018-04-01

    Australian consumers desire the development of a more flavorsome Australian strawberry cultivar. To aid in the development of well-liked strawberries, the attributes driving liking need to be identified. The objective of this research is to apply Preference Mapping (PM) techniques to the descriptive profile of commercial and newly bred strawberry cultivars, together with consumer preference data to determine the flavors contributing to liking. A trained sensory panel (n = 12) used Quantitative Descriptive Analysis (QDA®) methodology to evaluate two appearance, seven aroma, five texture, 10 flavor and 10 aftertaste attributes of three commercial strawberry cultivars and six elite breeding lines grown in Victoria, Australia. Strawberry consumers (n = 150) assessed their liking of the same strawberry cultivars. QDA® significantly discriminated strawberries on 28 of the 34 sensory attributes. There were significant differences in hedonic ratings of strawberries (F(8,714) = 11.5, P = 0.0001), with Hierarchical Cluster Analysis (HCA) identifying three consumer clusters each displaying differing patterns of preference. Internal and external PM techniques were applied to the data to identify the attributes driving consumer acceptability. Sweet, berry, caramel, fruity and floral attributes were identified as most contributing to liking. Sour, citrus, green, astringent, firm and gritty attributes were conversely associated with a reduction in consumer liking. Elite Lines 2 and 6 have been identified as having the broadest appeal, satisfying between 60% and 70% of consumers in the population assessed, thus the introduction of these cultivars should satisfy the largest group of consumers in the Australian market. The results of this research could be applied to breeding programs, to ensure newly bred cultivars express characteristics that were identified as well-liked amongst consumers. In addition, this research provides evidence for marketing strawberries by

  15. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  16. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  17. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  18. 生きる力に影響する要因 : 体育における学習意欲、ストレス適応、心理社会的スキルの視点から

    OpenAIRE

    西田, 保; 伊藤, 豊彦; 佐々木, 万丈; 磯貝, 浩久; 杉山, 佳生; 渋倉, 崇行; NISHIDA, Tamotsu; ITO, Toyohiko; SASAKI, Banjou; ISOGAI, Hirohisa; SUGIYAMA, Yoshio; SHIBUKURA, Takayuki

    2010-01-01

    lkiru chikara, a Japanese concept officially translated as "zest for living" that refers to the ability to grow and adapt, is necessary for successful adaptation to a lifelong learning society. Ikiru chikara is said to encompass the ability to identify problems for oneself, to learn, think, make judgments and act independently, and to be more adept at problem solving. It also is linked to a rich sense of humanity, selfcontrol, the ability to cooperate and consider other people's feelings, a s...

  19. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  20. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  1. An Integrated Strategy to Identify Key Genes in Almond Adventitious Shoot Regeneration

    Science.gov (United States)

    Plant genetic transformation usually depends on efficient adventitious regeneration systems. In almond (Prunus dulcis Mill.), regeneration of transgenic adventitious shoots was achieved but with low efficiency. Histological studies identified two main stages of organogenesis in almond explants that ...

  2. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  3. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    Directory of Open Access Journals (Sweden)

    Gaora Peadar Ó

    2010-10-01

    Full Text Available Abstract Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of

  4. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  5. The Promise of Virtual Teams: Identifying Key Factors in Effectiveness and Failure

    Science.gov (United States)

    Horwitz, Frank M.; Bravington, Desmond; Silvis, Ulrik

    2006-01-01

    Purpose: The aim of the investigation is to identify enabling and disenabling factors in the development and operation of virtual teams; to evaluate the importance of factors such as team development, cross-cultural variables, leadership, communication and social cohesion as contributors to virtual team effectiveness. Design/methodology/approach:…

  6. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  7. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  8. Identifying the impacts of climate change on key pests and diseases of plant and animal industries

    International Nuclear Information System (INIS)

    Luck, Jo; Aurambout, Jean-Philippe; Finlay, Kyla; Azuloas, Joe; Constable, Fiona; Rijswijk, Bonny Rowles-Van

    2007-01-01

    Full text: Full text: Climate change is increasingly recognised as a major threat to natural and agricultural systems. Understanding these threats will enable government and primary industries to better prepare and adapt to climate change. While observations of climate change are well documented, the potential effects on pests, pathogens and their hosts are not clearly understood. To address this, a review of the potential impacts on plant biosecurity was undertaken to determine the effects of climate change on the behaviour and distribution of emergent plant pests and pathogens. The review identified increasing C02 and temperature, decreasing frost events, heavy and unseasonal rains, increased humidity, drought, cyclones and hurricanes, and warmer winter temperatures as influencing the behaviour of plant pests and pathogens. To study the effects of these changes in detail, three key plant biosecurity threats were analysed in case studies; wheat stripe rust, silver leaf whitefly and citrus canker. The predicted distribution of citrus canker was examined with increasing temperature scenarios using the bioclimatic model CLIMEX. The model predicted a southerly shift in the geographic range of the causal organism which would threaten the major southern citrus growing regions in future climates. A similar study on Bluetongue disease of sheep, spread by the Culicoides midge, also predicted a southerly shift in the vector's geographic range. Significant limitations were identified with bioclimatic modelling when examining the effects of climate change on pests and diseases. The model was unable to assess the plant and animal response to increasing temperature in conjunction with the pest. Also the influence of temperature on the life cycle of the organism, pathogenicity of strains, competition with other species, host coverage and the general effect on the biology of the organism could not be assessed. To begin to address this, a dynamic model was constructed using daily

  9. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  10. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  11. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  12. SNP interaction pattern identifier (SIPI)

    DEFF Research Database (Denmark)

    Lin, Hui Yi; Chen, Dung Tsa; Huang, Po Yu

    2017-01-01

    Motivation: Testing SNP-SNP interactions is considered as a key for overcoming bottlenecks of genetic association studies. However, related statistical methods for testing SNP-SNP interactions are underdeveloped. Results: We propose the SNP Interaction Pattern Identifier (SIPI), which tests 45...

  13. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  14. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  15. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  16. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  17. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  18. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  19. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  20. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  1. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  2. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  4. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  5. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  6. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  8. Identifying Opportunities for Vertical Integration of Biochemistry and Clinical Medicine.

    Science.gov (United States)

    Wendelberger, Karen J.; Burke, Rebecca; Haas, Arthur L.; Harenwattananon, Marisa; Simpson, Deborah

    1998-01-01

    Objectives: Retention of basic science knowledge, as judged by National Board of Medical Examiners' (NBME) data, suffers due to lack of apparent relevance and isolation of instruction from clinical application, especially in biochemistry. However, the literature reveals no systematic process for identifying key biochemical concepts and associated clinical conditions. This study systematically identified difficult biochemical concepts and their common clinical conditions as a critical step towards enhancing relevance and retention of biochemistry.Methods: A multi-step/ multiple stakeholder process was used to: (1) identify important biochemistry concepts; (2) determine students' perceptions of concept difficulty; (3) assess biochemistry faculty, student, and clinical teaching scholars' perceived relevance of identified concepts; and (4) identify associated common clinical conditions for relevant and difficult concepts. Surveys and a modified Delphi process were used to gather data, subsequently analyzed using SPSS for Windows.Results: Sixteen key biochemical concepts were identified. Second year medical students rated 14/16 concepts as extremely difficult while fourth year students rated nine concepts as moderately to extremely difficult. On average, each teaching scholar generated common clinical conditions for 6.2 of the 16 concepts, yielding a set of seven critical concepts and associated clinical conditions.Conclusions: Key stakeholders in the instructional process struggle to identify biochemistry concepts that are critical, difficult to learn and associated with common clinical conditions. However, through a systematic process beginning with identification of concepts and associated clinical conditions, relevance of basic science instruction can be enhanced.

  9. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  10. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  11. Energy conservation in China: Key provincial sectors at two-digit level

    International Nuclear Information System (INIS)

    Liao, Hua; Du, Jian; Wei, Yi-Ming

    2013-01-01

    Highlights: ► We identify the keys for energy conversation across China’s 31 provinces × 65 sectors. ► The results are visualized in map and matrix tables, and easy for use. ► 39 Industrial sectors by province are classified into three categories for conservation. ► There is large energy wasting in the public management sector. ► There are both urban–rural gap and provincial inequality on electricity consumption. - Abstract: In March 2011, China’s central government set a new challenging target of reducing its energy intensity by 16% during 2011–2015, after it had achieved a reduction of 19.1% during 2006–2010. And this new target was assigned to provincial authorities in August 2011. However, China’s provincial energy-economic developments are unbalanced and different provinces have different key sectors for energy conservation. Most previous studies focused on provincial energy efficiency at the aggregate level, or the three-industry level (or one-digit level). However, whether for policy decision or academic research, it is necessary to further subdivide the sectors. In this paper, we use three indicators (Gini Coefficient, energy consumption share and energy intensity) to compare provincial energy conservation potentials at the two-digit sector level. To our knowledge, this paper is the first one to identify the keys for energy conversation across the 31 provinces × 65 sectors. And the results are shown in visualized maps and matrix tables to help identify the key province × sectors for energy conservation easier. This also helps the central and provincial governments to distinguish key sectors when they monitor the energy conservation progress

  12. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  13. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  14. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  15. Cooking without salt

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000760.htm Cooking without salt To use the sharing features on ... other dishes to add zest. Try Salt-free Cooking Explore cooking with salt substitutes. Add a splash ...

  16. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  17. Simulation-based Assessment to Reliably Identify Key Resident Performance Attributes.

    Science.gov (United States)

    Blum, Richard H; Muret-Wagstaff, Sharon L; Boulet, John R; Cooper, Jeffrey B; Petrusa, Emil R; Baker, Keith H; Davidyuk, Galina; Dearden, Jennifer L; Feinstein, David M; Jones, Stephanie B; Kimball, William R; Mitchell, John D; Nadelberg, Robert L; Wiser, Sarah H; Albrecht, Meredith A; Anastasi, Amanda K; Bose, Ruma R; Chang, Laura Y; Culley, Deborah J; Fisher, Lauren J; Grover, Meera; Klainer, Suzanne B; Kveraga, Rikante; Martel, Jeffrey P; McKenna, Shannon S; Minehart, Rebecca D; Mitchell, John D; Mountjoy, Jeremi R; Pawlowski, John B; Pilon, Robert N; Shook, Douglas C; Silver, David A; Warfield, Carol A; Zaleski, Katherine L

    2018-04-01

    Obtaining reliable and valid information on resident performance is critical to patient safety and training program improvement. The goals were to characterize important anesthesia resident performance gaps that are not typically evaluated, and to further validate scores from a multiscenario simulation-based assessment. Seven high-fidelity scenarios reflecting core anesthesiology skills were administered to 51 first-year residents (CA-1s) and 16 third-year residents (CA-3s) from three residency programs. Twenty trained attending anesthesiologists rated resident performances using a seven-point behaviorally anchored rating scale for five domains: (1) formulate a clear plan, (2) modify the plan under changing conditions, (3) communicate effectively, (4) identify performance improvement opportunities, and (5) recognize limits. A second rater assessed 10% of encounters. Scores and variances for each domain, each scenario, and the total were compared. Low domain ratings (1, 2) were examined in detail. Interrater agreement was 0.76; reliability of the seven-scenario assessment was r = 0.70. CA-3s had a significantly higher average total score (4.9 ± 1.1 vs. 4.6 ± 1.1, P = 0.01, effect size = 0.33). CA-3s significantly outscored CA-1s for five of seven scenarios and domains 1, 2, and 3. CA-1s had a significantly higher proportion of worrisome ratings than CA-3s (chi-square = 24.1, P < 0.01, effect size = 1.50). Ninety-eight percent of residents rated the simulations more educational than an average day in the operating room. Sensitivity of the assessment to CA-1 versus CA-3 performance differences for most scenarios and domains supports validity. No differences, by experience level, were detected for two domains associated with reflective practice. Smaller score variances for CA-3s likely reflect a training effect; however, worrisome performance scores for both CA-1s and CA-3s suggest room for improvement.

  18. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  19. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  20. Identifying and Ranking the Determinants of Tourism Performance

    DEFF Research Database (Denmark)

    Assaf, A.George; Josiassen, Alexander

    2012-01-01

    , their tourism industries, and tourism businesses seek to improve the performance of the tourism industry and its constituents by vigorously promoting themselves to international tourists, cutting costs, and identifying synergies in their tourism endeavors. In seeking to improve the tourism industry......, the determinants that affect tourism performance are of key interest to the stakeholders. A key obstacle toward improving performance is the multitude of determinants that can affect tourism performance. The literature has yet to provide concrete insights into the determinants of tourism performance...... and their relative importance. The present study addresses this important gap. We identify and rank the determinants of tourism performance. We also provide performance measures of international tourism destinations. The results are derived using the Data Envelopment Analysis (DEA) and bootstrap truncated regression...

  1. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  2. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  3. KEY PERFORMANCE INDICATORS FOR HEALTHCARE RESEARCH ORGANIZATIONS BETWEEN 2011 AND 2015

    OpenAIRE

    ANISKEVICH A.S.; HALFIN R.A.

    2017-01-01

    In this work we identify 16 key indicators to evaluate the performance of healthcare research organizations. These indicators comprehensively characterize such aspects of performance as research output and relevance, human resource development, integration into the international scientific community, distribution of scientific knowledge, promotion of the prestige of science, and resource provision. Below, we review the existing classification of medical research institutions and their key fea...

  4. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    Science.gov (United States)

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  5. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  6. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  7. Almost-sure identifiability of multidimensional harmonic retrieval

    NARCIS (Netherlands)

    Jiang, T; Sidiropoulos, ND; ten Berge, JMF

    Two-dimensional (2-D) and, more generally, multidimensional harmonic retrieval is of interest in a variety of applications, including transmitter localization and joint time and frequency offset estimation in wireless communications. The associated identifiability problem is key in understanding the

  8. The Relevance of Abraham Maslow's Work to Health Education

    Science.gov (United States)

    Nolte, Ann

    1976-01-01

    Health educators should be aware of people as growth aspiring, with a basic nature of goodness, and that individuals need to experience those qualities within themselves which produce health and a zest for living. (JD)

  9. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    Science.gov (United States)

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  10. Identifying PHM market and network opportunities.

    Science.gov (United States)

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  11. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  12. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  13. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  14. Development of key indicators to quantify the health impacts of climate change on Canadians

    OpenAIRE

    Cheng, June J.; Berry, Peter

    2013-01-01

    Objectives This study aimed at developing a list of key human health indicators for quantifying the health impacts of climate change in Canada. Methods A literature review was conducted in OVID Medline to identify health morbidity and mortality indicators currently used to quantify climate change impacts. Public health frameworks and other studies of climate change indicators were reviewed to identify criteria with which to evaluate the list of proposed key indicators and a rating scale was d...

  15. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Science.gov (United States)

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  16. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  17. Identifying key controls on the behavior of an acidic-U(VI) plume in the Savannah River Site using reactive transport modeling.

    Science.gov (United States)

    Bea, Sergio A; Wainwright, Haruko; Spycher, Nicolas; Faybishenko, Boris; Hubbard, Susan S; Denham, Miles E

    2013-08-01

    Acidic low-level waste radioactive waste solutions were discharged to three unlined seepage basins at the F-Area of the Department of Energy (DOE) Savannah River Site (SRS), South Carolina, USA, from 1955 through 1989. Despite many years of active remediation, the groundwater remains acidic and contaminated with significant levels of U(VI) and other radionuclides. Monitored Natural Attenuation (MNA) is a desired closure strategy for the site, based on the premise that regional flow of clean background groundwater will eventually neutralize the groundwater acidity, immobilizing U(VI) through adsorption. An in situ treatment system is currently in place to accelerate this in the downgradient portion of the plume and similar measures could be taken upgradient if necessary. Understanding the long-term pH and U(VI) adsorption behavior at the site is critical to assess feasibility of MNA along with the in-situ remediation treatments. This paper presents a reactive transport (RT) model and uncertainty quantification (UQ) analyses to explore key controls on the U(VI)-plume evolution and long-term mobility at this site. Two-dimensional numerical RT simulations are run including the saturated and unsaturated (vadose) zones, U(VI) and H(+) adsorption (surface complexation) onto sediments, dissolution and precipitation of Al and Fe minerals, and key hydrodynamic processes are considered. UQ techniques are applied using a new open-source tool that is part of the developing ASCEM reactive transport modeling and analysis framework to: (1) identify the complex physical and geochemical processes that control the U(VI) plume migration in the pH range where the plume is highly mobile, (2) evaluate those physical and geochemical parameters that are most controlling, and (3) predict the future plume evolution constrained by historical, chemical and hydrological data. The RT simulation results show a good agreement with the observed historical pH and concentrations of U(VI), nitrates

  18. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  19. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  20. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  1. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  2. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  3. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  4. Network-Guided Key Gene Discovery for a Given Cellular Process

    DEFF Research Database (Denmark)

    He, Feng Q; Ollert, Markus

    2018-01-01

    Identification of key genes for a given physiological or pathological process is an essential but still very challenging task for the entire biomedical research community. Statistics-based approaches, such as genome-wide association study (GWAS)- or quantitative trait locus (QTL)-related analysis...... have already made enormous contributions to identifying key genes associated with a given disease or phenotype, the success of which is however very much dependent on a huge number of samples. Recent advances in network biology, especially network inference directly from genome-scale data...

  5. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  6. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  7. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  8. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  9. Assessment of Biotechnology Policies and International Trade in Key Markets for U.S. Agriculture

    OpenAIRE

    Marchant, Mary A.; Song, Baohui

    2005-01-01

    The United States leads the world in agricultural biotechnology research, adoption, commercialization, and exports. Our biotech commodities are highly dependent on international markets. Thus, any biotech policy changes by key importing countries may affect U.S. agricultural biotech product exports. This article identifies key markets for U.S. agricultural exports including biotech commodities and discusses current and proposed biotech policies in key markets for U.S. agricultural exports foc...

  10. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  11. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  12. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  13. The Key Pieces of the Career Survival and Success Puzzle.

    Science.gov (United States)

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  14. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  15. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  16. Posttranscriptional silencing of the lncRNA MALAT1 by miR-217 inhibits the epithelial–mesenchymal transition via enhancer of zeste homolog 2 in the malignant transformation of HBE cells induced by cigarette smoke extract

    International Nuclear Information System (INIS)

    Lu, Lu; Luo, Fei; Liu, Yi; Liu, Xinlu; Shi, Le; Lu, Xiaolin; Liu, Qizhan

    2015-01-01

    Lung cancer is regarded as the leading cause of cancer-related deaths, and cigarette smoking is one of the strongest risk factors for the development of lung cancer. However, the mechanisms for cigarette smoke-induced lung carcinogenesis remain unclear. The present study investigated the effects of an miRNA (miR-217) on levels of an lncRNA (MALAT1) and examined the role of these factors in the epithelial–mesenchymal transition (EMT) induced by cigarette smoke extract (CSE) in human bronchial epithelial (HBE) cells. In these cells, CSE caused decreases of miR-217 levels and increases in lncRNA MALAT1 levels. Over-expression of miR-217 with a mimic attenuated the CSE-induced increase of MALAT1 levels, and reduction of miR-217 levels by an inhibitor enhanced expression of MALAT1. Moreover, the CSE-induced increase of MALAT1 expression was blocked by an miR-217 mimic, indicating that miR-217 negatively regulates MALAT1 expression. Knockdown of MALAT1 reversed CSE-induced increases of EZH2 (enhancer of zeste homolog 2) and H3K27me3 levels. In addition to the alteration from epithelial to spindle-like mesenchymal morphology, chronic exposure of HBE cells to CSE increased the levels of EZH2, H3K27me3, vimentin, and N-cadherin and decreased E-cadherin levels, effects that were reversed by MALAT1 siRNA or EZH2 siRNA. The results indicate that miR-217 regulation of EZH2/H3K27me3 via MALAT1 is involved in CSE-induced EMT and malignant transformation of HBE cells. The posttranscriptional silencing of MALAT1 by miR-217 provides a link, through EZH2, between ncRNAs and the EMT and establishes a mechanism for CSE-induced lung carcinogenesis. - Highlights: • CSE exposure decreases miR-217 levels and increases MALAT1 levels. • miR-217 negatively regulates MALAT1 expression. • MALAT1, via EZH2, is involved in the EMT of CSE-transformed HBE cells.

  17. Integrated network analysis identifies fight-club nodes as a class of hubs encompassing key putative switch genes that induce major transcriptome reprogramming during grapevine development.

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-12-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named "fight-club hubs" characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named "switch genes" was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. © 2014 American Society of Plant Biologists. All rights reserved.

  18. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  19. An approach to identify issues affecting ERP implementation in Indian SMEs

    Directory of Open Access Journals (Sweden)

    Rana Basu

    2012-06-01

    Full Text Available Purpose: The purpose of this paper is to present the findings of a study which is based on the results of a comprehensive compilation of literature and subsequent analysis of ERP implementation success issues in context to Indian Small and Medium scale Enterprises (SME’s. This paper attempts to explore the existing literature and highlight those issues on ERP implementation and further to this the researchers applied TOPSIS (Technique for order preference by similarity to ideal solution method to prioritize issues affecting successful implementation of ERP. Design/methodology/approach: Based on the literature review certain issues leading to successful ERP implementation have been identified and to identify key issues Pareto Analysis (80-20 Rule have been applied. Further to extraction of key issues a survey based on TOPSIS was carried out in Indian small and medium scale enterprises. Findings: Based on review of literature 25 issues have been identified and further Pareto analysis has been done to extract key issues which is further prioritized by applying Topsis method. Research limitations/implications: Beside those identified issues there may be other issues that need to be explored. There is scope to enhance this study by taking into consideration different type of industries and by extending number of respondents. Practical implications: By identifying key issues for SMEs, managers can better prioritize issues to make implementation process smooth without disruption. ERP vendors can take inputs from this study to change their implementation approach while targeting small scale enterprises. Originality/value: There is no published literature available which followed a similar approach in identification of the critical issues affecting ERP in small and mid-sized companies in India or in any developing economy.

  20. A quantitative metric to identify critical elements within seafood supply networks.

    Directory of Open Access Journals (Sweden)

    Éva E Plagányi

    Full Text Available A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  1. A Quantitative Metric to Identify Critical Elements within Seafood Supply Networks

    Science.gov (United States)

    Plagányi, Éva E.; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J.; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H.; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical. PMID:24633147

  2. A quantitative metric to identify critical elements within seafood supply networks.

    Science.gov (United States)

    Plagányi, Éva E; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  3. Measuring social inclusion--a key outcome in global mental health.

    Science.gov (United States)

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  4. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  5. Key events and their effects on cycling behaviour in Dar-es-Salaam : abstract + powerpoint

    NARCIS (Netherlands)

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper explores key events and investigates their effects on cycling behaviour in the city of Dar-es-Salaam, Tanzania. The objective of the study is to identify specific key events during a person’s life course with a significant effect on change of travel behaviour towards cycling in relation to

  6. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  7. Identification of key residues for protein conformational transition using elastic network model.

    Science.gov (United States)

    Su, Ji Guo; Xu, Xian Jin; Li, Chun Hua; Chen, Wei Zu; Wang, Cun Xin

    2011-11-07

    Proteins usually undergo conformational transitions between structurally disparate states to fulfill their functions. The large-scale allosteric conformational transitions are believed to involve some key residues that mediate the conformational movements between different regions of the protein. In the present work, a thermodynamic method based on the elastic network model is proposed to predict the key residues involved in protein conformational transitions. In our method, the key functional sites are identified as the residues whose perturbations largely influence the free energy difference between the protein states before and after transition. Two proteins, nucleotide binding domain of the heat shock protein 70 and human/rat DNA polymerase β, are used as case studies to identify the critical residues responsible for their open-closed conformational transitions. The results show that the functionally important residues mainly locate at the following regions for these two proteins: (1) the bridging point at the interface between the subdomains that control the opening and closure of the binding cleft; (2) the hinge region between different subdomains, which mediates the cooperative motions between the corresponding subdomains; and (3) the substrate binding sites. The similarity in the positions of the key residues for these two proteins may indicate a common mechanism in their conformational transitions.

  8. The MycoKey 3.1 DVD. Included in Knudsen, H. & Vesterholt, J. (eds.). Funga Nordica

    DEFF Research Database (Denmark)

    2008-01-01

    . It is, of course, also possible to do a direct search on a name in MycoKey in order to find a genus or a particular species. MycoKey gives access to more than 4,000 illustrations of fungi and more than 17,000 links to references. From within the genera you can also open the Funga Nordica keys in a a pdf-viwer......MycoKey enables the user to identify fungal genera (fruitbody forming Basidiomycota and discomycetes) by means of a digital, synoptical key. This key offers a very different way of choosing between genera than the traditional analytical key and the the two approaches complete each other nicely...

  9. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  10. Predicting suicidal ideation in primary care: An approach to identify easily assessable key variables.

    Science.gov (United States)

    Jordan, Pascal; Shedden-Mora, Meike C; Löwe, Bernd

    To obtain predictors of suicidal ideation, which can also be used for an indirect assessment of suicidal ideation (SI). To create a classifier for SI based on variables of the Patient Health Questionnaire (PHQ) and sociodemographic variables, and to obtain an upper bound on the best possible performance of a predictor based on those variables. From a consecutive sample of 9025 primary care patients, 6805 eligible patients (60% female; mean age = 51.5 years) participated. Advanced methods of machine learning were used to derive the prediction equation. Various classifiers were applied and the area under the curve (AUC) was computed as a performance measure. Classifiers based on methods of machine learning outperformed ordinary regression methods and achieved AUCs around 0.87. The key variables in the prediction equation comprised four items - namely feelings of depression/hopelessness, low self-esteem, worrying, and severe sleep disturbances. The generalized anxiety disorder scale (GAD-7) and the somatic symptom subscale (PHQ-15) did not enhance prediction substantially. In predicting suicidal ideation researchers should refrain from using ordinary regression tools. The relevant information is primarily captured by the depression subscale and should be incorporated in a nonlinear model. For clinical practice, a classification tree using only four items of the whole PHQ may be advocated. Copyright © 2018 Elsevier Inc. All rights reserved.

  11. Positioning and deciding : key factors for talent development in soccer

    NARCIS (Netherlands)

    Kannekens, R.; Elferink-Gemser, M. T.; Visscher, C.

    2011-01-01

    Talent identification and development implicate recognizing youth players who will be successful in the future and guiding them to the top. A major determinant of this success is tactical skills. To identify possible key factors that help in predicting success over time, this study assesses the

  12. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  13. Evaluating predictive models for solar energy growth in the US states and identifying the key drivers

    Science.gov (United States)

    Chakraborty, Joheen; Banerji, Sugata

    2018-03-01

    Driven by a desire to control climate change and reduce the dependence on fossil fuels, governments around the world are increasing the adoption of renewable energy sources. However, among the US states, we observe a wide disparity in renewable penetration. In this study, we have identified and cleaned over a dozen datasets representing solar energy penetration in each US state, and the potentially relevant socioeconomic and other factors that may be driving the growth in solar. We have applied a number of predictive modeling approaches - including machine learning and regression - on these datasets over a 17-year period and evaluated the relative performance of the models. Our goals were: (1) identify the most important factors that are driving the growth in solar, (2) choose the most effective predictive modeling technique for solar growth, and (3) develop a model for predicting next year’s solar growth using this year’s data. We obtained very promising results with random forests (about 90% efficacy) and varying degrees of success with support vector machines and regression techniques (linear, polynomial, ridge). We also identified states with solar growth slower than expected and representing a potential for stronger growth in future.

  14. Sulfur Denitrosylation by an Engineered Trx-like DsbG Enzyme Identifies Nucleophilic Cysteine Hydrogen Bonds as Key Functional Determinant.

    Science.gov (United States)

    Lafaye, Céline; Van Molle, Inge; Tamu Dufe, Veronica; Wahni, Khadija; Boudier, Ariane; Leroy, Pierre; Collet, Jean-François; Messens, Joris

    2016-07-15

    Exposure of bacteria to NO results in the nitrosylation of cysteine thiols in proteins and low molecular weight thiols such as GSH. The cells possess enzymatic systems that catalyze the denitrosylation of these modified sulfurs. An important player in these systems is thioredoxin (Trx), a ubiquitous, cytoplasmic oxidoreductase that can denitrosylate proteins in vivo and S-nitrosoglutathione (GSNO) in vitro However, a periplasmic or extracellular denitrosylase has not been identified, raising the question of how extracytoplasmic proteins are repaired after nitrosative damage. In this study, we tested whether DsbG and DsbC, two Trx family proteins that function in reducing pathways in the Escherichia coli periplasm, also possess denitrosylating activity. Both DsbG and DsbC are poorly reactive toward GSNO. Moreover, DsbG is unable to denitrosylate its specific substrate protein, YbiS. Remarkably, by borrowing the CGPC active site of E. coli Trx-1 in combination with a T200M point mutation, we transformed DsbG into an enzyme highly reactive toward GSNO and YbiS. The pKa of the nucleophilic cysteine, as well as the redox and thermodynamic properties of the engineered DsbG are dramatically changed and become similar to those of E. coli Trx-1. X-ray structural insights suggest that this results from a loss of two direct hydrogen bonds to the nucleophilic cysteine sulfur in the DsbG mutant. Our results highlight the plasticity of the Trx structural fold and reveal that the subtle change of the number of hydrogen bonds in the active site of Trx-like proteins is the key factor that thermodynamically controls reactivity toward nitrosylated compounds. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  15. Tropical Journal of Pharmaceutical Research - Vol 14, No 9 (2015)

    African Journals Online (AJOL)

    ... on Zeste Homolog 2 (Ezh2) Enhancement in Human Esophageal Cell Lines ... Impact of Caryolanemagnolol on Gait and Functional Mobility on Individuals ... L Song, H Kang, D Liu, Z Dai, J He, B Wang, Y Zhao, X Wang, W Xi, 1719-1722 ...

  16. Genomic Landscape Survey Identifies SRSF1 as a Key Oncodriver in Small Cell Lung Cancer.

    Directory of Open Access Journals (Sweden)

    Liyan Jiang

    2016-04-01

    Full Text Available Small cell lung cancer (SCLC is an aggressive disease with poor survival. A few sequencing studies performed on limited number of samples have revealed potential disease-driving genes in SCLC, however, much still remains unknown, particularly in the Asian patient population. Here we conducted whole exome sequencing (WES and transcriptomic sequencing of primary tumors from 99 Chinese SCLC patients. Dysregulation of tumor suppressor genes TP53 and RB1 was observed in 82% and 62% of SCLC patients, respectively, and more than half of the SCLC patients (62% harbored TP53 and RB1 mutation and/or copy number loss. Additionally, Serine/Arginine Splicing Factor 1 (SRSF1 DNA copy number gain and mRNA over-expression was strongly associated with poor survival using both discovery and validation patient cohorts. Functional studies in vitro and in vivo demonstrate that SRSF1 is important for tumorigenicity of SCLC and may play a key role in DNA repair and chemo-sensitivity. These results strongly support SRSF1 as a prognostic biomarker in SCLC and provide a rationale for personalized therapy in SCLC.

  17. Key Concept Identification: A Comprehensive Analysis of Frequency and Topical Graph-Based Approaches

    Directory of Open Access Journals (Sweden)

    Muhammad Aman

    2018-05-01

    Full Text Available Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. The statistical frequency and topical graph-based ranking are the two kinds of potentially powerful and leading unsupervised approaches in this area, devised to address the problem. To utilize the potential of these approaches and improve key concept identification, a comprehensive performance analysis of these approaches on datasets from different domains is needed. The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. For experimental analysis, we have selected TF-IDF, KP-Miner and TopicRank. Three major sources of error, i.e., frequency errors, syntactical errors and semantical errors, and the factors that contribute to these errors are identified. Analysis of the results reveals that performance of the selected approaches is significantly degraded by these errors. These findings can help us develop an intelligent solution for key concept extraction in the future.

  18. Key enabling technologies (Kets) observatory. Second report December 2015

    OpenAIRE

    Velde, Els van de; Pieterjan, Debergh; Wydra, Sven; Som, Oliver; Heide, Marcel de

    2015-01-01

    Key Enabling Technologies (KETs) provide the basis for innovation in a wide range of products and processes across all industrial sectors (emerging and traditional) and are essential to solve Europe’s major societal challenges. Six KETs have been identified as important for Europe’s future competitiveness: Advanced Manufacturing Technology, Advanced Materials, Nanotechnology, Micro- and Nanoelectronics, Industrial Biotechnology, and Photonics.

  19. Building capacity in Australian interprofessional health education: perspectives from key health and higher education stakeholders.

    Science.gov (United States)

    Matthews, Lynda R; Pockett, Rosalie B; Nisbet, Gillian; Thistlethwaite, Jill E; Dunston, Roger; Lee, Alison; White, Jill F

    2011-05-01

    A substantial literature engaging with the directions and experiences of stakeholders involved in interprofessional health education exists at the international level, yet almost nothing has been published that documents and analyses the Australian experience. Accordingly, this study aimed to scope the experiences of key stakeholders in health and higher education in relation to the development of interprofessional practice capabilities in health graduates in Australia. Twenty-seven semi-structured interviews and two focus groups of key stakeholders involved in the development and delivery of interprofessional health education in Australian higher education were undertaken. Interview data were coded to identify categories that were organised into key themes, according to principles of thematic analysis. Three themes were identified: the need for common ground between health and higher education, constraints and enablers in current practice, and the need for research to establish an evidence base. Five directions for national development were also identified. The study identified a range of interconnected changes that will be required to successfully mainstream interprofessional education within Australia, in particular, the importance of addressing issues of culture change and the need for a nationally coordinated and research informed approach. These findings reiterate those found in the international literature.

  20. The applicability of LCA to evaluate the key environmental challenges in food supply chains

    DEFF Research Database (Denmark)

    Aronsson, Anna K.S.; Landquist, Birgit; Esturo, Aintzane

    2014-01-01

    System analysis was performed to gain an overview of key environmental challenges and pinpoint hotspots causing environmental impacts in three European food supply chains. An overview was obtained based on a review on LCA studies for beef, dairy, orange juice and aquaculture food supply chains....... Similarities of the main environmental impacts were identified to rationalize and justify the selection of key performance indicators chosen for a simplified web based LCA tool developed within the EC funded project SENSE (FP7). Life Cycle Assessment methodology covered many of the key challenges identified...... but will not be sufficient to address all environmental impacts generated from the food supply chains. Especially for aquaculture impacts that are not taken into account with LCA are i.e. nutrient and organic matter releases, impacts associated with feed provision, diseases introduction, escapes, and changed usage...

  1. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  2. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  3. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  4. Key events and their effects on cycling behaviour in Dar-es-Salaam : abstract + powerpoint

    OpenAIRE

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper explores key events and investigates their effects on cycling behaviour in the city of Dar-es-Salaam, Tanzania. The objective of the study is to identify specific key events during a person’s life course with a significant effect on change of travel behaviour towards cycling in relation to stage of change. Stage of change is a key construct of the transtheoretical model of behaviour change that defines behavioural readiness (intentions and actions) into six distinct categories (i.e....

  5. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  6. Identifying Key Proteins in Hg Methylation Pathways of Desulfovibrio by Global Proteomics, Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Summers, Anne O. [Univ. of Georgia, Athens, GA (United States). Dept. of Microbiology; Miller, Susan M. [Univ. of California, San Francisco, CA (United States). Dept. of Pharmaceutical Chemistry; Wall, Judy [Univ. of Missouri, Columbia, MO (United States). Dept. of Biochemistry; Lipton, Mary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-06-18

    Elemental mercury, Hg(0) is a contaminant at many DOE sites, especially at Oak Ridge National Laboratory (ORNL) where the spread of spilled Hg and its effects on microbial populations have been monitored for decades. To explore the microbial interactions with Hg, we have devised a global proteomic approach capable of directly detecting Hg-adducts of proteins. This technique developed in the facultative anaerobe, Escherichia coli, allows us to identify the proteins most vulnerable to acute exposure to organomercurials phenyl- and ethyl-mercury (as surrogates for the highly neurotoxic methyl-Hg) (Polacco, et al, 2011). We have found >300 such proteins in all metabolic functional groups and cellular compartments; most are highly conserved and can serve as markers for acute Hg exposure (Zink, et al. 2016, in preparation). We have also discovered that acute Hg exposure severely disrupts thiol, iron and redox homeostases, and electrolyte balance (LaVoie, et al., 2015) Thus, we proposed to bring these techniques to bear on the central problem of identifying the cellular proteins involved in bacterial uptake and methylation of mercury and its release from the cell.

  7. Diversity of key players in the microbial ecosystems of the human body.

    Science.gov (United States)

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  8. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  9. Rubella vaccination in India: identifying broad consequences of vaccine introduction and key knowledge gaps.

    Science.gov (United States)

    Winter, A K; Pramanik, S; Lessler, J; Ferrari, M; Grenfell, B T; Metcalf, C J E

    2018-01-01

    Rubella virus infection typically presents as a mild illness in children; however, infection during pregnancy may cause the birth of an infant with congenital rubella syndrome (CRS). As of February 2017, India began introducing rubella-containing vaccine (RCV) into the public-sector childhood vaccination programme. Low-level RCV coverage among children over several years can result in an increase in CRS incidence by increasing the average age of infection without sufficiently reducing rubella incidence. We evaluated the impact of RCV introduction on CRS incidence across India's heterogeneous demographic and epidemiological contexts. We used a deterministic age-structured model that reflects Indian states' rural and urban area-specific demography and vaccination coverage levels to simulate rubella dynamics and estimate CRS incidence with and without RCV introduction to the public sector. Our analysis suggests that current low-level private-sector vaccination has already slightly increased the burden of CRS in India. We additionally found that the effect of public-sector RCV introduction depends on the basic reproductive number, R 0, of rubella. If R 0 is five, a value empirically estimated from an array of settings, CRS incidence post-RCV introduction will likely decrease. However, if R 0 is seven or nine, some states may experience short-term or annual increases in CRS, even if a long-term total reduction in cases (30 years) is expected. Investment in population-based serological surveys and India's fever/rash surveillance system will be key to monitoring the success of the vaccination programme.

  10. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  11. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  12. Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development[W][OPEN

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-01-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named “fight-club hubs” characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named “switch genes” was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. PMID:25490918

  13. ZEST Flight Test Experiments, Kauai Test Facility, Hawaii

    Science.gov (United States)

    1991-07-01

    present on KTF/PMRF are 3 the Hawaiian monk seal and the Hawaiian hoary bat. The monk seal (Monachus schauinslandi) has established a colony on Niihau ...feeding and resting offshore of the Nohili Ditch (DOE, 1991). 3 The channel between Kauai and Niihau islands is along the migration route of the

  14. Identification of key oil refining technologies for China National Petroleum Co. (CNPC)

    International Nuclear Information System (INIS)

    Liu Haiyan; Yu Jianning; Xu Jian; Fan Yu; Bao Xiaojun

    2007-01-01

    This paper summarizes the results from the project 'Vision of the Key Petroleum Refining Technologies for China National Petroleum Co. (CNPC) in the Early 21st Century' undertaken by the Department of R and D Administration, CNPC, and its affiliate key laboratory, The Key Laboratory of Catalysis operated by China University of Petroleum, Beijing. The objective of the project was to identify the challenges and opportunities of CNPC's petroleum refining business given increasing economy globalization and stricter environmental regulations. Using the modified Delphi method, four key technologies for CNPC's oil refining industry were identified. They are: integrated fluid catalytic cracking (FCC), hydroprocessing, residue hydrocracking, and high-grade lubricant production. The most significant technology will be the integrated FCC technology that can economically increase the yield of light fractions as well as upgrade transportation fuels. In China, FCC units produce about 80% and 30% commercial gasoline and diesel, respectively. To ensure compliance with future environmental legislation, hydroprocessing technologies, including those related to petroleum product hydrorefining and distillate hydrocracking, should be developed. By combining residue hydrocracking and FCC technologies, poorer quality residua can be processed. Supplying high-grade lube oils is one of the main tasks for CNPC's oil refining industry. Development of hydrodewaxing technologies to manufacture API group II/III base oil is the main direction for CNPC's lubricant production business

  15. A Large-Scale RNAi Screen Identifies SGK1 as a Key Survival Kinase for GBM Stem Cells.

    Science.gov (United States)

    Kulkarni, Shreya; Goel-Bhattacharya, Surbhi; Sengupta, Sejuti; Cochran, Brent H

    2018-01-01

    Glioblastoma multiforme (GBM) is the most common type of primary malignant brain cancer and has a very poor prognosis. A subpopulation of cells known as GBM stem-like cells (GBM-SC) have the capacity to initiate and sustain tumor growth and possess molecular characteristics similar to the parental tumor. GBM-SCs are known to be enriched in hypoxic niches and may contribute to therapeutic resistance. Therefore, to identify genetic determinants important for the proliferation and survival of GBM stem cells, an unbiased pooled shRNA screen of 10,000 genes was conducted under normoxic as well as hypoxic conditions. A number of essential genes were identified that are required for GBM-SC growth, under either or both oxygen conditions, in two different GBM-SC lines. Interestingly, only about a third of the essential genes were common to both cell lines. The oxygen environment significantly impacts the cellular genetic dependencies as 30% of the genes required under hypoxia were not required under normoxic conditions. In addition to identifying essential genes already implicated in GBM such as CDK4, KIF11 , and RAN , the screen also identified new genes that have not been previously implicated in GBM stem cell biology. The importance of the serum and glucocorticoid-regulated kinase 1 (SGK1) for cellular survival was validated in multiple patient-derived GBM stem cell lines using shRNA, CRISPR, and pharmacologic inhibitors. However, SGK1 depletion and inhibition has little effect on traditional serum grown glioma lines and on differentiated GBM-SCs indicating its specific importance in GBM stem cell survival. Implications: This study identifies genes required for the growth and survival of GBM stem cells under both normoxic and hypoxic conditions and finds SGK1 as a novel potential drug target for GBM. Mol Cancer Res; 16(1); 103-14. ©2017 AACR . ©2017 American Association for Cancer Research.

  16. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    Science.gov (United States)

    2015-11-12

    polarization control and the CV state and the LO state are separated at a polarizing beam splitter . The CV state is delayed relative to the LO state, and... splitter or loss imperfections. We have identified a number of risks associated with implementing this design . The two most critical risks are: • The...Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY

  17. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  18. Random multiple key streams for encryption with added CBC mode of operation

    Directory of Open Access Journals (Sweden)

    P. Penchalaiah

    2016-09-01

    For the first time, in this paper, we present a construction method to generate multiple random keys from a core-key with highest possible immunity to crack. We are with a particular emphasis on novel technique to secure user data, we have designed a secure and cost effective new cryptosystem called Rbits (Random bits cypher. In different directions we identify that Rbits having highest immunity to crack and presenting various analysis tests in support from this viewpoint and the analyzed results are reported.

  19. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2007-09-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  20. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    International Nuclear Information System (INIS)

    1997-01-01

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual's performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program

  1. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  2. Key principles for adapting South African settlement patterns to climate change

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn

    2017-06-01

    Full Text Available The aim of the paper is to identify key principles for adapting SA settlement patterns to climate change. Section 1 reviews the range of climate-related impacts likely to affect SA settlements using climate change models and scenarios as a context...

  3. Seeking convergence on the key concepts in "no net loss" policy

    DEFF Research Database (Denmark)

    Bull, Joseph William; Gordon, Ascelin; Watson, James E.M.

    2016-01-01

    . The recommendations made in this article, on improving clarity and supporting convergence on key no net loss (NNL) concepts, should help eliminate ambiguity in policy documentation. This is crucial if policymakers are to design robust policies that are (i) transparent, (ii) translatable into practice in a consistent......Biodiversity conservation policies incorporating a no net loss (NNL) principle are being implemented in many countries. However, there are linguistic and conceptual inconsistencies in the use of terms underlying these NNL policies. We identify inconsistencies that emerge in the usage of eight key......, reduce ambiguity and improve clarity in communication and policy documentation. However, we also warn of the challenges in achieving convergence, especially given the linguistic inconsistencies in several of these key concepts among countries in which NNL policies are employed. Policy implications...

  4. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    Science.gov (United States)

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  6. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  7. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  8. SETD2 loss-of-function promotes renal cancer branched evolution through replication stress and impaired DNA repair

    DEFF Research Database (Denmark)

    Kanu, N.; Grönroos, E.; Martinez, P.

    2015-01-01

    Defining mechanisms that generate intratumour heterogeneity and branched evolution may inspire novel therapeutic approaches to limit tumour diversity and adaptation. SETD2 (Su(var), Enhancer of zeste, Trithorax-domain containing 2) trimethylates histone-3 lysine-36 (H3K36me3) at sites of active t...

  9. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  10. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  11. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  12. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  13. Exploring key determinants of virtual worlds business success based on users' experience and perception

    OpenAIRE

    Xu , Xiaobo (Bob)

    2010-01-01

    Given the growth and popularity of virtual worlds, companies have a strong interest in presenting themselves successfully in virtual worlds. We designed an experimental study to identify the key determinants of virtual worlds business success based on users’ experience and perception. The preliminary results indicate that Starbucks, McDonalds, and Paris are the 3 most favorite sites. Furthermore, 5 key determinants (entertainment, functionality, interactivity, reality, and s...

  14. Evidentiary requirements to identify potentially acceptable sites (PAS) in crystalline rock

    International Nuclear Information System (INIS)

    Comella, P.A.; Smith, B.H.

    1985-01-01

    This report contains information on the evidentiary requirements to identify potentially acceptable sites in crystalline rock for waste disposal. Topics addressed include: chronology, key regulatory assumptions, statutory framework for identifying potentially acceptable sites, application of 10 disqualifiers, consideration of favorable and potentially adverse conditions, a composite favorability analysis, and a proposed outline for PAS identification decision document

  15. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  16. Bacteria and Archaea in acidic environments and a key to morphological identification

    Science.gov (United States)

    Robbins, E.I.

    2000-01-01

    Natural and anthropogenic acidic environments are dominated by bacteria and Archaea. As many as 86 genera or species have been identified or isolated from pH morphological characteristics, habitat information and a key for light microscope identification for the non-microbiologist.

  17. KDiamend: a package for detecting key drivers in a molecular ecological network of disease.

    Science.gov (United States)

    Lyu, Mengxuan; Chen, Jiaxing; Jiang, Yiqi; Dong, Wei; Fang, Zhou; Li, Shuaicheng

    2018-04-11

    Microbial abundance profiles are applied widely to understand diseases from the aspect of microbial communities. By investigating the abundance associations of species or genes, we can construct molecular ecological networks (MENs). The MENs are often constructed by calculating the Pearson correlation coefficient (PCC) between genes. In this work, we also applied multimodal mutual information (MMI) to construct MENs. The members which drive the concerned MENs are referred to as key drivers. We proposed a novel method to detect the key drivers. First, we partitioned the MEN into subnetworks. Then we identified the most pertinent subnetworks to the disease by measuring the correlation between the abundance pattern and the delegated phenotype-the variable representing the disease phenotypes. Last, for each identified subnetwork, we detected the key driver by PageRank. We developed a package named KDiamend and applied it to the gut and oral microbial data to detect key drivers for Type 2 diabetes (T2D) and Rheumatoid Arthritis (RA). We detected six T2D-relevant subnetworks and three key drivers of them are related to the carbohydrate metabolic process. In addition, we detected nine subnetworks related to RA, a disease caused by compromised immune systems. The extracted subnetworks include InterPro matches (IPRs) concerned with immunoglobulin, Sporulation, biofilm, Flaviviruses, bacteriophage, etc., while the development of biofilms is regarded as one of the drivers of persistent infections. KDiamend is feasible to detect key drivers and offers insights to uncover the development of diseases. The package is freely available at http://www.deepomics.org/pipelines/3DCD6955FEF2E64A/ .

  18. The histone methyltransferase and putative oncoprotein MMSET is overexpressed in a large variety of human tumors

    DEFF Research Database (Denmark)

    Hudlebusch, Heidi Rye; Santoni-Rugiu, Eric; Simon, Ronald

    2011-01-01

    Multiple myeloma SET (Suppressor of variegation, Enhancer of zeste, and Trithorax) domain (MMSET) is a histone lysine methyltransferase deregulated in a subgroup of multiple myelomas with the t(4;14)(p16;q32) translocation and poor prognosis. With the aim of understanding, if MMSET can be involved...

  19. Independent assessment is key to financial well-being.

    Science.gov (United States)

    Karling, J; Pyper, T

    1999-02-01

    Both traditional group practices and IPAs have felt the impact of changes brought about by managed care. Group practices need to ensure that their financial reporting and cost-accounting methods capture information that is key to decision making. An independent assessment of financial procedures helps identify any outstanding issues and maintain financial well-being. This assessment should be conducted at least quarterly so that potential problems can be resolved, income opportunities explored, and cost-saving measures adopted in a timely manner.

  20. Development of key indicators to quantify the health impacts of climate change on Canadians.

    Science.gov (United States)

    Cheng, June J; Berry, Peter

    2013-10-01

    This study aimed at developing a list of key human health indicators for quantifying the health impacts of climate change in Canada. A literature review was conducted in OVID Medline to identify health morbidity and mortality indicators currently used to quantify climate change impacts. Public health frameworks and other studies of climate change indicators were reviewed to identify criteria with which to evaluate the list of proposed key indicators and a rating scale was developed. Total scores for each indicator were calculated based on the rating scale. A total of 77 health indicators were identified from the literature. After evaluation using the chosen criteria, 8 indicators were identified as the best for use. They include excess daily all-cause mortality due to heat, premature deaths due to air pollution (ozone and particulate matter 2.5), preventable deaths from climate change, disability-adjusted life years lost from climate change, daily all-cause mortality, daily non-accidental mortality, West Nile Disease incidence, and Lyme borreliosis incidence. There is need for further data and research related to health effect quantification in the area of climate change.

  1. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  2. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  3. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  4. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  5. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  6. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    Science.gov (United States)

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  7. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  8. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  9. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  10. Key principles for a national clinical decision support knowledge sharing framework: synthesis of insights from leading subject matter experts.

    Science.gov (United States)

    Kawamoto, Kensaku; Hongsermeier, Tonya; Wright, Adam; Lewis, Janet; Bell, Douglas S; Middleton, Blackford

    2013-01-01

    To identify key principles for establishing a national clinical decision support (CDS) knowledge sharing framework. As part of an initiative by the US Office of the National Coordinator for Health IT (ONC) to establish a framework for national CDS knowledge sharing, key stakeholders were identified. Stakeholders' viewpoints were obtained through surveys and in-depth interviews, and findings and relevant insights were summarized. Based on these insights, key principles were formulated for establishing a national CDS knowledge sharing framework. Nineteen key stakeholders were recruited, including six executives from electronic health record system vendors, seven executives from knowledge content producers, three executives from healthcare provider organizations, and three additional experts in clinical informatics. Based on these stakeholders' insights, five key principles were identified for effectively sharing CDS knowledge nationally. These principles are (1) prioritize and support the creation and maintenance of a national CDS knowledge sharing framework; (2) facilitate the development of high-value content and tooling, preferably in an open-source manner; (3) accelerate the development or licensing of required, pragmatic standards; (4) acknowledge and address medicolegal liability concerns; and (5) establish a self-sustaining business model. Based on the principles identified, a roadmap for national CDS knowledge sharing was developed through the ONC's Advancing CDS initiative. The study findings may serve as a useful guide for ongoing activities by the ONC and others to establish a national framework for sharing CDS knowledge and improving clinical care.

  11. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    Science.gov (United States)

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  12. Community Advisory Boards Guiding Engaged Research Efforts within a Clinical Translational Sciences Award: Key Contextual Factors Explored.

    Science.gov (United States)

    Halladay, Jacqueline R; Donahue, Katrina E; Sleath, Betsy; Reuland, Dan; Black, Adina; Mitchell, C Madeline; Breland, Carol E; Coyne-Beasley, Tamera; Mottus, Kathleen; Watson, Sable Noelle; Lewis, Virginia; Wynn, Mysha; Corbie-Smith, Giselle

    2017-01-01

    Engaging stakeholders in research carries the promise of enhancing the research relevance, transparency, and speed of getting findings into practice. By describing the context and functional aspects of stakeholder groups, like those working as community advisory boards (CABs), others can learn from these experiences and operationalize their own CABs. Our objective is to describe our experiences with diverse CABs affiliated with our community engagement group within our institution's Clinical Translational Sciences Award (CTSA). We identify key contextual elements that are important to administering CABs. A group of investigators, staff, and community members engaged in a 6-month collaboration to describe their experiences of working with six research CABs. We identified the key contextual domains that illustrate how CABS are developed and sustained. Two lead authors, with experience with CABs and identifying contextual domains in other work, led a team of 13 through the process. Additionally, we devised a list of key tips to consider when devising CABs. The final domains include (1) aligned missions among stakeholders (2) resources/support, (3) defined operational processes/shared power, (4) well-described member roles, and (5) understanding and mitigating challenges. The tips are a set of actions that support the domains. Identifying key contextual domains was relatively easy, despite differences in the respective CAB's condition of focus, overall mission, or patient demographics represented. By contextualizing these five domains, other research and community partners can take an informed approach to move forward with CAB planning and engaged research.

  13. How cannabis causes paranoia: using the intravenous administration of ∆9-tetrahydrocannabinol (THC) to identify key cognitive mechanisms leading to paranoia.

    Science.gov (United States)

    Freeman, Daniel; Dunn, Graham; Murray, Robin M; Evans, Nicole; Lister, Rachel; Antley, Angus; Slater, Mel; Godlewska, Beata; Cornish, Robert; Williams, Jonathan; Di Simplicio, Martina; Igoumenou, Artemis; Brenneisen, Rudolf; Tunbridge, Elizabeth M; Harrison, Paul J; Harmer, Catherine J; Cowen, Philip; Morrison, Paul D

    2015-03-01

    Paranoia is receiving increasing attention in its own right, since it is a central experience of psychotic disorders and a marker of the health of a society. Paranoia is associated with use of the most commonly taken illicit drug, cannabis. The objective was to determine whether the principal psychoactive ingredient of cannabis-∆(9)-tetrahydrocannabinol (THC)-causes paranoia and to use the drug as a probe to identify key cognitive mechanisms underlying paranoia. A randomized, placebo-controlled, between-groups test of the effects of intravenous THC was conducted. A total of 121 individuals with paranoid ideation were randomized to receive placebo, THC, or THC preceded by a cognitive awareness condition. Paranoia was assessed extensively via a real social situation, an immersive virtual reality experiment, and standard self-report and interviewer measures. Putative causal factors were assessed. Principal components analysis was used to create a composite paranoia score and composite causal variables to be tested in a mediation analysis. THC significantly increased paranoia, negative affect (anxiety, worry, depression, negative thoughts about the self), and a range of anomalous experiences, and reduced working memory capacity. The increase in negative affect and in anomalous experiences fully accounted for the increase in paranoia. Working memory changes did not lead to paranoia. Making participants aware of the effects of THC had little impact. In this largest study of intravenous THC, it was definitively demonstrated that the drug triggers paranoid thoughts in vulnerable individuals. The most likely mechanism of action causing paranoia was the generation of negative affect and anomalous experiences. © The Author 2014. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  14. Identifying key topics for a description of sexual behavior among Danish adolescents: A qualitative study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson; Maindal, Helle Terkildsen; Olesen, Frede

    . Results: Four major categories of risk behavior were identified: Alcohol consumption is associated with “no condom use”, Nights on the town and meetings in foreign counties or at festivals are associated with one night stands and often lead to unsafe sex, Low self-esteem increases the risk of pushing one...... one Danish Folk High School, but with different social and educational backgrounds. The interview guide was developed from literature reviews and hypotheses based on years of experience with sexually transmitted infections. Data were transcribed verbatim and analyzed using qualitative description...

  15. [Key to chironomid pupal exuviae (Diptera: Chironomidae) of tropical high Andean streams].

    Science.gov (United States)

    Pratt, Narcís; González-Trujillo, Juan David; Ospina-Torres, Rodulfo

    2014-12-01

    The Chironomidae is a cosmopolitan family of Nematoceran flies with more than 20,000 species described. However the diversity of genera and species of the family in the Andean region beyond the 2,000 m.a.s.l are scarcely known. We conducted faunal surveys and biomonitoring research in different streams of Colombia, Ecuador and Peru from May 2005 to October 2011. Based on specimens collections, a taxonomic key was developed to identify pupae and pupal exuviae of 46 genera of midges (Diptera, Chironomidae) collected from streams at high altitude areas on the Andean tropical mountains. We included illustrations and brief taxonomic descriptions for all genera, of which several ones have not yet been formally described; in this latter case we used the nomenclature of Roback & Coffman (1983). For two genera, Cricotopus and Genus 1, keys to the most com- mon morphospecies were provided. Results showed that in this area the chironomid assemblages are dominated by the members of the subfamily Orthocladiinae (22 genera) followed by the Chironominae (13). Six genera of Tanypodinae were identified, while only three and two genera were present from subfamilies Podonominae and Diamesinae. This key may be very useful for both studies about drift in streams, and for biomonitoring purposes.

  16. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2006-10-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required to process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  17. Identification of the key factors for success in the hotel sector

    Directory of Open Access Journals (Sweden)

    Fernando Campa-Planas

    2018-02-01

    Design/methodology: A review of the literature has been carried out, which has provided references related to the hotel sector and different factors that impact it. The knowledge provided by the scientific community through the articles and texts consulted are reflected in this document and allow us to determine the existence of the key factors for success.  Contributions/results: Considering the importance of the hotel sector in the Spanish economy, this study identifies the key factors in the different hotel establishments. However, the materialization of these factors provides and shows us which financial aspects, management systems and other more global aspects, such as longevity or location, enable the company to be successful in the hotel sector.  Originality/value: Based on the literature reviewed, a list of key factors for success in the hotel sector was composed. This also revealed a lack of similar studies on this topic.

  18. Maintaining cell identity

    DEFF Research Database (Denmark)

    Comet, Itys; Riising, Eva M; Leblanc, Benjamin

    2016-01-01

    Enhancer of zeste homologue 2 (EZH2), the catalytic subunit of Polycomb repressive complex 2 (PRC2), has attracted broad research attention in the past few years because of its involvement in the development and maintenance of many types of cancer and the use of specific EZH2 inhibitors in clinic...

  19. Expression of EZH2 and Ki-67 in colorectal cancer and associations with treatment response and prognosis

    NARCIS (Netherlands)

    Fluge, Ø.; Gravdal, K.; Carlsen, E.; Vonen, B.; Kjellevold, K.; Refsum, S.; Lilleng, R.; Eide, T.J.; Halvorsen, T.B.; Tveit, K.M.; Otte, A.P.; Akslen, L.A.; Dahl, O.

    2009-01-01

    Background: Enhancer of zeste homologue 2 (EZH2) is a member of the Polycomb group of genes that is involved in epigenetic silencing and cell cycle regulation. Methods: We studied EZH2 expression in 409 patients with colorectal cancer stages II and III. The patients were included in a randomised

  20. Spotter's Guide for Identifying and Reporting Severe Local Storms.

    Science.gov (United States)

    National Oceanic and Atmospheric Administration (DOC), Rockville, MD.

    This guide is designed to assist personnel working in the National Weather Service's Severe Local Storm Spotter Networks in identifying and reporting severe local storms. Provided are pictures of cloud types for severe storms including tornadoes, hail, thunder, lightning, heavy rains, and waterspouts. Instructions for key indications to watch for…

  1. The changing model of big pharma: impact of key trends.

    Science.gov (United States)

    Gautam, Ajay; Pan, Xiaogang

    2016-03-01

    Recent years have seen exciting breakthroughs in biomedical sciences that are producing truly novel therapeutics for unmet patient needs. However, the pharmaceutical industry is also facing significant barriers in the form of pricing and reimbursement, continued patent expirations and challenging market dynamics. In this article, we have analyzed data from the 1995-2015 period, on key aspects such as revenue distribution, research units, portfolio mix and emerging markets to identify four key trends that help to understand the change in strategic focus, realignment of R&D footprint, the shift from primary care toward specialty drugs and biologics and the growth of emerging markets as major revenue drivers for big pharma. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  2. Strategies to design clinical studies to identify predictive biomarkers in cancer research.

    Science.gov (United States)

    Perez-Gracia, Jose Luis; Sanmamed, Miguel F; Bosch, Ana; Patiño-Garcia, Ana; Schalper, Kurt A; Segura, Victor; Bellmunt, Joaquim; Tabernero, Josep; Sweeney, Christopher J; Choueiri, Toni K; Martín, Miguel; Fusco, Juan Pablo; Rodriguez-Ruiz, Maria Esperanza; Calvo, Alfonso; Prior, Celia; Paz-Ares, Luis; Pio, Ruben; Gonzalez-Billalabeitia, Enrique; Gonzalez Hernandez, Alvaro; Páez, David; Piulats, Jose María; Gurpide, Alfonso; Andueza, Mapi; de Velasco, Guillermo; Pazo, Roberto; Grande, Enrique; Nicolas, Pilar; Abad-Santos, Francisco; Garcia-Donas, Jesus; Castellano, Daniel; Pajares, María J; Suarez, Cristina; Colomer, Ramon; Montuenga, Luis M; Melero, Ignacio

    2017-02-01

    The discovery of reliable biomarkers to predict efficacy and toxicity of anticancer drugs remains one of the key challenges in cancer research. Despite its relevance, no efficient study designs to identify promising candidate biomarkers have been established. This has led to the proliferation of a myriad of exploratory studies using dissimilar strategies, most of which fail to identify any promising targets and are seldom validated. The lack of a proper methodology also determines that many anti-cancer drugs are developed below their potential, due to failure to identify predictive biomarkers. While some drugs will be systematically administered to many patients who will not benefit from them, leading to unnecessary toxicities and costs, others will never reach registration due to our inability to identify the specific patient population in which they are active. Despite these drawbacks, a limited number of outstanding predictive biomarkers have been successfully identified and validated, and have changed the standard practice of oncology. In this manuscript, a multidisciplinary panel reviews how those key biomarkers were identified and, based on those experiences, proposes a methodological framework-the DESIGN guidelines-to standardize the clinical design of biomarker identification studies and to develop future research in this pivotal field. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  4. Identifying Key Factors Relevant for Base Camp Siting

    Science.gov (United States)

    2017-12-01

    centers. 3.2.6.3 Religious and historical sites Respecting sacred sites helps build rapport with the host nation. 3.2.6.4 Local infrastructure...churches, mosques, national libraries, hospitals, cemeteries, historical ruins, religious sites, cultural areas, and other protected sites...controlled and protected wells. • Electricity: town engineer • Academic: government and religious leaders • Trash: private business (local

  5. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  6. Identification of the key ecological factors influencing vegetation degradation in semi-arid agro-pastoral ecotone considering spatial scales

    Science.gov (United States)

    Peng, Yu; Wang, Qinghui; Fan, Min

    2017-11-01

    When assessing re-vegetation project performance and optimizing land management, identification of the key ecological factors inducing vegetation degradation has crucial implications. Rainfall, temperature, elevation, slope, aspect, land use type, and human disturbance are ecological factors affecting the status of vegetation index. However, at different spatial scales, the key factors may vary. Using Helin County, Inner-Mongolia, China as the study site and combining remote sensing image interpretation, field surveying, and mathematical methods, this study assesses key ecological factors affecting vegetation degradation under different spatial scales in a semi-arid agro-pastoral ecotone. It indicates that the key factors are different at various spatial scales. Elevation, rainfall, and temperature are identified as crucial for all spatial extents. Elevation, rainfall and human disturbance are key factors for small-scale quadrats of 300 m × 300 m and 600 m × 600 m, temperature and land use type are key factors for a medium-scale quadrat of 1 km × 1 km, and rainfall, temperature, and land use are key factors for large-scale quadrats of 2 km × 2 km and 5 km × 5 km. For this region, human disturbance is not the key factor for vegetation degradation across spatial scales. It is necessary to consider spatial scale for the identification of key factors determining vegetation characteristics. The eco-restoration programs at various spatial scales should identify key influencing factors according their scales so as to take effective measurements. The new understanding obtained in this study may help to explore the forces which driving vegetation degradation in the degraded regions in the world.

  7. Identifying key soil cyanobacteria easy to isolate and culture for arid soil restoration

    Science.gov (United States)

    Roncero-Ramos, Beatriz; Ángeles Muñoz-Martín, M.; Chamizo, Sonia; Román, Raúl; Rodriguez-Caballero, Emilio; Mateo, Pilar; Cantón, Yolanda

    2017-04-01

    Drylands represent an important fraction of the Earth land's surface. Low cover of vascular plants characterizes these regions, and the large open areas among plants are often colonized by cyanobacteria, mosses, lichens, algae, bryophytes, bacteria and fungi, known as biocrusts. Because these communities are on or within the soil surface, they contribute to improve physicochemical properties of the uppermost soil layers and have important effects on soil fertility and stability, so they could play an important role on soil restoration. Cyanobacteria appear to be a cross component of biocrusts and they have been demonstrated to enhance water availability, soil fertility (fixing atmospheric C and N), and soil aggregation (thanks to their filamentous morphology and the exopolysaccharides they excrete), and significantly reduce water and wind erosion. Besides, they are able to tolerate high temperatures and UV radiation. All these features convert cyanobacteria in pioneer organisms capable of colonizing degraded soils and may be crucial in facilitating the succession of more developed organisms such as vascular plants. Therefore, the use of native cyanobacteria, already adapted to site environmental conditions, could guarantee a successful restoration approach of degraded soils. However, previous to their application for soil restoration, the most representative species inhabiting these soils should be identified. The objective of this study was to identify (morphologically and genetically) and isolate representative native cyanobacteria species from arid soils in SE Spain, characterized for being easily isolated and cultured with the aim of using them to inoculate degraded arid soil. We selected two study areas in Almería, SE Spain, where biocrust cover most of the open spaces between plants: El Cautivo experimental site located in the Tabernas desert and a limestone quarry located at the southeastern edge of the Gádor massif. The first site is characterized by

  8. Identification of key target markets for intermodal freight transport solutions in South Africa

    Directory of Open Access Journals (Sweden)

    Joubert van Eeden

    2010-11-01

    Full Text Available The Accelerated and Shared Growth Initiative for South Africa (AsgiSA identified South Africa's freight logistics challenges as among the key binding constraints on the country's growth aspirations. The research presented here points to the structural imbalance between road and rail freight transport as one of the key contributors to this state of affairs. Most long-distance corridor transport has been captured by road. However, long-distance transport is a market segment that is very suitable for intermodal transportation : rail is utilised for the high-density, long-distance component and road for the feeder and distribution services at the corridor end points. A market segmentation approach is developed to identify the corridors and industries that are natural candidates for such solutions, thereby paving the way for role-players and stakeholders to initiate a dialogue on the development of appropriate solutions.

  9. Salient Key Features of Actual English Instructional Practices in Saudi Arabia

    Science.gov (United States)

    Al-Seghayer, Khalid

    2015-01-01

    This is a comprehensive review of the salient key features of the actual English instructional practices in Saudi Arabia. The goal of this work is to gain insights into the practices and pedagogic approaches to English as a foreign language (EFL) teaching currently employed in this country. In particular, we identify the following central features…

  10. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  11. Cemento-osseous dysplasia of the jaw bones: key radiographic features.

    Science.gov (United States)

    Alsufyani, N A; Lam, E W N

    2011-03-01

    The purpose of this study is to assess possible diagnostic differences between general dentists (GPs) and oral and maxillofacial radiologists (RGs) in the identification of pathognomonic radiographic features of cemento-osseous dysplasia (COD) and its interpretation. Using a systematic objective survey instrument, 3 RGs and 3 GPs reviewed 50 image sets of COD and similarly appearing entities (dense bone island, cementoblastoma, cemento-ossifying fibroma, fibrous dysplasia, complex odontoma and sclerosing osteitis). Participants were asked to identify the presence or absence of radiographic features and then to make an interpretation of the images. RGs identified a well-defined border (odds ratio (OR) 6.67, P < 0.05); radiolucent periphery (OR 8.28, P < 0.005); bilateral occurrence (OR 10.23, P < 0.01); mixed radiolucent/radiopaque internal structure (OR 10.53, P < 0.01); the absence of non-concentric bony expansion (OR 7.63, P < 0.05); and the association with anterior and posterior teeth (OR 4.43, P < 0.05) as key features of COD. Consequently, RGs were able to correctly interpret 79.3% of COD cases. In contrast, GPs identified the absence of root resorption (OR 4.52, P < 0.05) and the association with anterior and posterior teeth (OR 3.22, P = 0.005) as the only key features of COD and were able to correctly interpret 38.7% of COD cases. There are statistically significant differences between RGs and GPs in the identification and interpretation of the radiographic features associated with COD (P < 0.001). We conclude that COD is radiographically discernable from other similarly appearing entities only if the characteristic radiographic features are correctly identified and then correctly interpreted.

  12. Global metabolic analyses identify key differences in metabolite levels between polymyxin-susceptible and polymyxin-resistant Acinetobacter baumannii.

    Science.gov (United States)

    Maifiah, Mohd Hafidz Mahamad; Cheah, Soon-Ee; Johnson, Matthew D; Han, Mei-Ling; Boyce, John D; Thamlikitkul, Visanu; Forrest, Alan; Kaye, Keith S; Hertzog, Paul; Purcell, Anthony W; Song, Jiangning; Velkov, Tony; Creek, Darren J; Li, Jian

    2016-02-29

    Multidrug-resistant Acinetobacter baumannii presents a global medical crisis and polymyxins are used as the last-line therapy. This study aimed to identify metabolic differences between polymyxin-susceptible and polymyxin-resistant A. baumannii using untargeted metabolomics. The metabolome of each A. baumannii strain was measured using liquid chromatography-mass spectrometry. Multivariate and univariate statistics and pathway analyses were employed to elucidate metabolic differences between the polymyxin-susceptible and -resistant A. baumannii strains. Significant differences were identified between the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii strains. The lipopolysaccharide (LPS) deficient, polymyxin-resistant 19606R showed perturbation in specific amino acid and carbohydrate metabolites, particularly pentose phosphate pathway (PPP) and tricarboxylic acid (TCA) cycle intermediates. Levels of nucleotides were lower in the LPS-deficient 19606R. Furthermore, 19606R exhibited a shift in its glycerophospholipid profile towards increased abundance of short-chain lipids compared to the parent polymyxin-susceptible ATCC 19606. In contrast, in a pair of clinical isolates 03-149.1 (polymyxin-susceptible) and 03-149.2 (polymyxin-resistant, due to modification of lipid A), minor metabolic differences were identified. Notably, peptidoglycan biosynthesis metabolites were significantly depleted in both of the aforementioned polymyxin-resistant strains. This is the first comparative untargeted metabolomics study to show substantial differences in the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii.

  13. Reverse engineering of TLX oncogenic transcriptional networks identifies RUNX1 as tumor suppressor in T-ALL.

    Science.gov (United States)

    Della Gatta, Giusy; Palomero, Teresa; Perez-Garcia, Arianne; Ambesi-Impiombato, Alberto; Bansal, Mukesh; Carpenter, Zachary W; De Keersmaecker, Kim; Sole, Xavier; Xu, Luyao; Paietta, Elisabeth; Racevskis, Janis; Wiernik, Peter H; Rowe, Jacob M; Meijerink, Jules P; Califano, Andrea; Ferrando, Adolfo A

    2012-02-26

    The TLX1 and TLX3 transcription factor oncogenes have a key role in the pathogenesis of T cell acute lymphoblastic leukemia (T-ALL). Here we used reverse engineering of global transcriptional networks to decipher the oncogenic regulatory circuit controlled by TLX1 and TLX3. This systems biology analysis defined T cell leukemia homeobox 1 (TLX1) and TLX3 as master regulators of an oncogenic transcriptional circuit governing T-ALL. Notably, a network structure analysis of this hierarchical network identified RUNX1 as a key mediator of the T-ALL induced by TLX1 and TLX3 and predicted a tumor-suppressor role for RUNX1 in T cell transformation. Consistent with these results, we identified recurrent somatic loss-of-function mutations in RUNX1 in human T-ALL. Overall, these results place TLX1 and TLX3 at the top of an oncogenic transcriptional network controlling leukemia development, show the power of network analyses to identify key elements in the regulatory circuits governing human cancer and identify RUNX1 as a tumor-suppressor gene in T-ALL.

  14. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  15. Examining the Key Factors Affecting e-Service Quality of Small Online Apparel Businesses in Malaysia

    OpenAIRE

    Che Nawi Noorshella; Al Mamun Abdullah; Ahmad Raston Nursalihah

    2015-01-01

    e-Service quality (eSQ) is increasingly recognized as an important aspect, as well as the key to determining the competitive advantage and factor in the long-term retention of firms operating online. This study, therefore, is aimed at identifying the key determinants of eSQ among the small online apparel businesses in Malaysia. This study used a cross-sectional design, and data were collected from 765 customers who pur...

  16. Validation of the Chinese Version of the Social Emotional Health Survey-Primary

    Science.gov (United States)

    Wang, Cixin; Yang, Chunyan; Jiang, Xu; Furlong, Michael

    2018-01-01

    The Social Emotional Health Survey-Primary (SEHS-P) was originally developed to assess U.S. elementary students' positive psychological traits: gratitude, zest, optimism, and persistence, and the higher-order latent construct of covitality. The present study evaluated the validity of a Chinese version of SEHS-P with a sample of 653 Chinese…

  17. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    International Nuclear Information System (INIS)

    Brinkmann, Markus; Eichbaum, Kathrin; Kammann, Ulrike; Hudjetz, Sebastian; Cofalla, Catrina; Buchinger, Sebastian; Reifferscheid, Georg; Schüttrumpf, Holger; Preuss, Thomas

    2014-01-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios

  18. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    Energy Technology Data Exchange (ETDEWEB)

    Brinkmann, Markus; Eichbaum, Kathrin [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Kammann, Ulrike [Thünen-Institute of Fisheries Ecology, Palmaille 9, 22767 Hamburg (Germany); Hudjetz, Sebastian [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Cofalla, Catrina [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Buchinger, Sebastian; Reifferscheid, Georg [Federal Institute of Hydrology (BFG), Department G3: Biochemistry, Ecotoxicology, Am Mainzer Tor 1, 56068 Koblenz (Germany); Schüttrumpf, Holger [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Preuss, Thomas [Department of Environmental Biology and Chemodynamics, Institute for Environmental Research,ABBt- Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); and others

    2014-07-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios.

  19. Patient- and Family-Identified Problems of Traumatic Brain Injury: Value and Utility of a Target Outcome Approach to Identifying the Worst Problems

    Directory of Open Access Journals (Sweden)

    Laraine Winter

    2016-01-01

    Full Text Available Purpose: This study aimed to identify the sequelae of traumatic brain injury (TBI that are most troubling to veterans with TBI and their families and identify veteran-family differences in content and ranking. Instead of standardized measures of symptom frequency or severity, which may be insensitive to change or intervention effects, we used a target outcome measure for veterans with TBI and their key family members, which elicited open-ended reports concerning the three most serious TBI-related problems. This was followed by Likert-scaled ratings of difficulty in managing the problem. Methods: In this cross-sectional study, interviews were conducted in veterans’ homes. Participants included 83 veterans with TBI diagnosed at a Veterans Affairs medical rehabilitation service and a key family member of each veteran. We utilized open-ended questions to determine the problems caused by TBI within the last month. Sociodemographic characteristics of veterans and family members, and veterans’ military and medical characteristics were collected. A coding scheme was developed to categorize open-ended responses. Results: Families identified nearly twice as many categories of problems as did veterans, and veterans and families ranked problem categories very differently. Veterans ranked cognitive and physical problems worst; families ranked emotional and interpersonal problems worst. Conclusions: Easily administered open-ended questions about the most troubling TBI-related problems yield novel insights and reveal important veteran-family discrepancies.

  20. A network analysis of the Chinese medicine Lianhua-Qingwen formula to identify its main effective components.

    Science.gov (United States)

    Wang, Chun-Hua; Zhong, Yi; Zhang, Yan; Liu, Jin-Ping; Wang, Yue-Fei; Jia, Wei-Na; Wang, Guo-Cai; Li, Zheng; Zhu, Yan; Gao, Xiu-Mei

    2016-02-01

    Chinese medicine is known to treat complex diseases with multiple components and multiple targets. However, the main effective components and their related key targets and functions remain to be identified. Herein, a network analysis method was developed to identify the main effective components and key targets of a Chinese medicine, Lianhua-Qingwen Formula (LQF). The LQF is commonly used for the prevention and treatment of viral influenza in China. It is composed of 11 herbs, gypsum and menthol with 61 compounds being identified in our previous work. In this paper, these 61 candidate compounds were used to find their related targets and construct the predicted-target (PT) network. An influenza-related protein-protein interaction (PPI) network was constructed and integrated with the PT network. Then the compound-effective target (CET) network and compound-ineffective target network (CIT) were extracted, respectively. A novel approach was developed to identify effective components by comparing CET and CIT networks. As a result, 15 main effective components were identified along with 61 corresponding targets. 7 of these main effective components were further experimentally validated to have antivirus efficacy in vitro. The main effective component-target (MECT) network was further constructed with main effective components and their key targets. Gene Ontology (GO) analysis of the MECT network predicted key functions such as NO production being modulated by the LQF. Interestingly, five effective components were experimentally tested and exhibited inhibitory effects on NO production in the LPS induced RAW 264.7 cell. In summary, we have developed a novel approach to identify the main effective components in a Chinese medicine LQF and experimentally validated some of the predictions.

  1. Identifying Key Features, Cutting Edge Cloud Resources, and Artificial Intelligence Tools to Achieve User-Friendly Water Science in the Cloud

    Science.gov (United States)

    Pierce, S. A.

    2017-12-01

    Decision making for groundwater systems is becoming increasingly important, as shifting water demands increasingly impact aquifers. As buffer systems, aquifers provide room for resilient responses and augment the actual timeframe for hydrological response. Yet the pace impacts, climate shifts, and degradation of water resources is accelerating. To meet these new drivers, groundwater science is transitioning toward the emerging field of Integrated Water Resources Management, or IWRM. IWRM incorporates a broad array of dimensions, methods, and tools to address problems that tend to be complex. Computational tools and accessible cyberinfrastructure (CI) are needed to cross the chasm between science and society. Fortunately cloud computing environments, such as the new Jetstream system, are evolving rapidly. While still targeting scientific user groups systems such as, Jetstream, offer configurable cyberinfrastructure to enable interactive computing and data analysis resources on demand. The web-based interfaces allow researchers to rapidly customize virtual machines, modify computing architecture and increase the usability and access for broader audiences to advanced compute environments. The result enables dexterous configurations and opening up opportunities for IWRM modelers to expand the reach of analyses, number of case studies, and quality of engagement with stakeholders and decision makers. The acute need to identify improved IWRM solutions paired with advanced computational resources refocuses the attention of IWRM researchers on applications, workflows, and intelligent systems that are capable of accelerating progress. IWRM must address key drivers of community concern, implement transdisciplinary methodologies, adapt and apply decision support tools in order to effectively support decisions about groundwater resource management. This presentation will provide an overview of advanced computing services in the cloud using integrated groundwater management case

  2. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  3. Monitoring the HIV continuum of care in key populations across Europe and Central Asia.

    Science.gov (United States)

    Brown, A E; Attawell, K; Hales, D; Rice, B D; Pharris, A; Supervie, V; Van Beckhoven, D; Delpech, V C; An der Heiden, M; Marcus, U; Maly, M; Noori, T

    2018-05-08

    The aim of the study was to measure and compare national continuum of HIV care estimates in Europe and Central Asia in three key subpopulations: men who have sex with men (MSM), people who inject drugs (PWID) and migrants. Responses to a 2016 European Centre for Disease Prevention and Control (ECDC) survey of 55 European and Central Asian countries were used to describe continuums of HIV care for the subpopulations. Data were analysed using three frameworks: Joint United Nations Programme on HIV/AIDS (UNAIDS) 90-90-90 targets; breakpoint analysis identifying reductions between adjacent continuum stages; quadrant analysis categorizing countries using 90% cut-offs for continuum stages. Overall, 29 of 48 countries reported national data for all HIV continuum stages (numbers living with HIV, diagnosed, receiving treatment and virally suppressed). Six countries reported all stages for MSM, seven for PWID and two for migrants. Thirty-one countries did not report data for MSM (34 for PWID and 41 for migrants). In countries that provided key-population data, overall, 63%, 40% and 41% of MSM, PWID and migrants living with HIV were virally suppressed, respectively (compared with 68%, 65% and 68% nationally, for countries reporting key-population data). Variation was observed between countries, with higher outcomes in subpopulations in Western Europe compared with Eastern Europe and Central Asia. Few reporting countries can produce the continuum of HIV care for the three key populations. Where data are available, differences exist in outcomes between the general and key populations. While MSM broadly mirror national outcomes (in the West), PWID and migrants experience poorer treatment and viral suppression. Countries must develop continuum measures for key populations to identify and address inequalities. © 2018 British HIV Association.

  4. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  5. Life cycle assessment in green chemistry: overview of key parameters and methodological concerns

    DEFF Research Database (Denmark)

    Tufvesson, Linda M.; Tufvesson, Pär; Woodley, John

    2013-01-01

    assessment (LCA) is a valuable methodology. However, on the planning stage, a full-scale LCA is considered to be too time consuming and complicated. Two reasons for this have been recognised, the method is too comprehensive and it is hard to find inventory data. In this review, key parameters are presented...... with the purpose to reduce the time-consuming steps in LCA.In this review, several LCAs of so-called ‘green chemicals’ are analysed and key parameters and methodological concerns are identified. Further, some conclusions on the environmental performance of chemicals were drawn.For fossil-based platform chemicals...... chemicals was identified. The environmental performance of bulk chemicals are closely connected to the production of the raw material and thereby different land use aspects. Here, a lot can be learnt from biofuel LCAs. In many of the reviewed articles focusing on bulk chemicals a comparison regarding fossil...

  6. Use of social media in health promotion: purposes, key performance indicators, and evaluation metrics.

    Science.gov (United States)

    Neiger, Brad L; Thackeray, Rosemary; Van Wagenen, Sarah A; Hanson, Carl L; West, Joshua H; Barnes, Michael D; Fagen, Michael C

    2012-03-01

    Despite the expanding use of social media, little has been published about its appropriate role in health promotion, and even less has been written about evaluation. The purpose of this article is threefold: (a) outline purposes for social media in health promotion, (b) identify potential key performance indicators associated with these purposes, and (c) propose evaluation metrics for social media related to the key performance indicators. Process evaluation is presented in this article as an overarching evaluation strategy for social media.

  7. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  8. USING THE PARETO DIAGRAM AND FMEA (FAILURE MODE AND EFFECTS ANALYSIS TO IDENTIFY KEY DEFECTS IN A PRODUCT

    Directory of Open Access Journals (Sweden)

    Michał ZASADZIEŃ

    2014-10-01

    Full Text Available The article presents the results of studies conducted in a company manufacturing aluminium forgings for the automotive industry. The aim of the research was to identify the defects which form during the production process as well as the locations and causes of their occurrence. Selected quality management tools were used in the process. Based on the FMEA and the costs generated by the identified defects, a hierarchy of them was created for the company along with a proposal of improvements in case of the most significant ones in order to reduce their number and increase the detection efficiency.

  9. Identifying Indicators Related to Constructs for Engineering Design Outcome

    Science.gov (United States)

    Wilhelmsen, Cheryl A.; Dixon, Raymond A.

    2016-01-01

    This study ranked constructs articulated by Childress and Rhodes (2008) and identified the key indicators for each construct as a starting point to explore what should be included on an instrument to measure the engineering design process and outcomes of students in high schools that use the PLTW and EbDTM curricula in Idaho. A case-study design…

  10. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  11. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  12. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  13. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  14. Exploiting genomic data to identify proteins involved in abalone reproduction.

    Science.gov (United States)

    Mendoza-Porras, Omar; Botwright, Natasha A; McWilliam, Sean M; Cook, Mathew T; Harris, James O; Wijffels, Gene; Colgrave, Michelle L

    2014-08-28

    Aside from their critical role in reproduction, abalone gonads serve as an indicator of sexual maturity and energy balance, two key considerations for effective abalone culture. Temperate abalone farmers face issues with tank restocking with highly marketable abalone owing to inefficient spawning induction methods. The identification of key proteins in sexually mature abalone will serve as the foundation for a greater understanding of reproductive biology. Addressing this knowledge gap is the first step towards improving abalone aquaculture methods. Proteomic profiling of female and male gonads of greenlip abalone, Haliotis laevigata, was undertaken using liquid chromatography-mass spectrometry. Owing to the incomplete nature of abalone protein databases, in addition to searching against two publicly available databases, a custom database comprising genomic data was used. Overall, 162 and 110 proteins were identified in females and males respectively with 40 proteins common to both sexes. For proteins involved in sexual maturation, sperm and egg structure, motility, acrosomal reaction and fertilization, 23 were identified only in females, 18 only in males and 6 were common. Gene ontology analysis revealed clear differences between the female and male protein profiles reflecting a higher rate of protein synthesis in the ovary and higher metabolic activity in the testis. A comprehensive mass spectrometry-based analysis was performed to profile the abalone gonad proteome providing the foundation for future studies of reproduction in abalone. Key proteins involved in both reproduction and energy balance were identified. Genomic resources were utilised to build a database of molluscan proteins yielding >60% more protein identifications than in a standard workflow employing public protein databases. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Understanding Death Attitudes: The Integration of Movies, Positive Psychology, and Meaning Management

    Science.gov (United States)

    Niemiec, Ryan M.; Schulenberg, Stefan E.

    2011-01-01

    The portrayal of death is one of the most common themes in movies and is often unrealistic, promoting misconceptions to the public. However, there are also many films that portray death acceptance in an instructive way. Such films depict the development of character strengths useful in embracing life and lessening death anxiety, namely zest,…

  16. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  17. Key principles to improve programmes and interventions in complementary feeding.

    Science.gov (United States)

    Lutter, Chessa K; Iannotti, Lora; Creed-Kanashiro, Hilary; Guyon, Agnes; Daelmans, Bernadette; Robert, Rebecca; Haider, Rukhsana

    2013-09-01

    Although there are some examples of successful complementary feeding programmes to promote healthy growth and prevent stunting at the community level, to date there are few, if any, examples of successful programmes at scale. A lack of systematic process and impact evaluations on pilot projects to generate lessons learned has precluded scaling up of effective programmes. Programmes to effect positive change in nutrition rarely follow systematic planning, implementation, and evaluation (PIE) processes to enhance effectiveness over the long term. As a result a set of programme-oriented key principles to promote healthy growth remains elusive. The purpose of this paper is to fill this gap by proposing a set of principles to improve programmes and interventions to promote healthy growth and development. Identifying such principles for programme success has three requirements: rethinking traditional paradigms used to promote improved infant and young child feeding; ensuring better linkages to delivery platforms; and, improving programming. Following the PIE model for programmes and learning from experiences from four relatively large-scale programmes described in this paper, 10 key principles are identified in the areas of programme planning, programme implementation, programme evaluation, and dissemination, replication, and scaling up. Nonetheless, numerous operational research questions remain, some of which are highlighted in this paper. © 2013 John Wiley & Sons Ltd.

  18. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  19. Identification of Key Residues for Enzymatic Carboxylate Reduction

    Directory of Open Access Journals (Sweden)

    Holly Stolterfoht

    2018-02-01

    Full Text Available Carboxylate reductases (CARs, E.C. 1.2.1.30 generate aldehydes from their corresponding carboxylic acid with high selectivity. Little is known about the structure of CARs and their catalytically important amino acid residues. The identification of key residues for carboxylate reduction provides a starting point to gain deeper understanding of enzymatic carboxylate reduction. A multiple sequence alignment of CARs with confirmed activity recently identified in our lab and from the literature revealed a fingerprint of conserved amino acids. We studied the function of conserved residues by multiple sequence alignments and mutational replacements of these residues. In this study, single-site alanine variants of Neurospora crassa CAR were investigated to determine the contribution of conserved residues to the function, expressability or stability of the enzyme. The effect of amino acid replacements was investigated by analyzing enzymatic activity of the variants in vivo and in vitro. Supported by molecular modeling, we interpreted that five of these residues are essential for catalytic activity, or substrate and co-substrate binding. We identified amino acid residues having significant impact on CAR activity. Replacement of His 237, Glu 433, Ser 595, Tyr 844, and Lys 848 by Ala abolish CAR activity, indicating their key role in acid reduction. These results may assist in the functional annotation of CAR coding genes in genomic databases. While some other conserved residues decreased activity or had no significant impact, four residues increased the specific activity of NcCAR variants when replaced by alanine. Finally, we showed that NcCAR wild-type and mutants efficiently reduce aliphatic acids.

  20. Fragmentation patterns of evergreen oak woodlands in Southwestern Iberia: identifying key spatial indicators.

    Science.gov (United States)

    Costa, Augusta; Madeira, Manuel; Lima Santos, José; Plieninger, Tobias; Seixas, Júlia

    2014-01-15

    Mediterranean evergreen oak woodlands (composed of Quercus suber L. and Quercus rotundifolia Lam.) are becoming increasingly fragmented in the human-modified landscapes of Southwestern Portugal and Spain. Previous studies have largely neglected to assess the spatial changes of oak woodlands in relation to their surrounding landscape matrix, and to characterize and quantify woodland boundaries and edges. The present study aims to fill this gap by analyzing fragmentation patterns of oak woodlands over a 50-year period (1958-2007) in three landscapes. Using archived aerial imagery from 1958, 1995 and 2007, for two consecutive periods (1958-1995 and 1995-2007), we calculated a set of landscape metrics to compare woodland fragmentation over time. Our results indicated a continuous woodland fragmentation characterized by their edge dynamics. From 1958 to 2007, the replacement of open farmland by shrubland and by new afforestation areas in the oak woodland landscape surrounding matrix, led to the highest values for edge contrast length trends of 5.0 and 12.3, respectively. Linear discriminant analysis was performed to delineate fragmented woodland structures and identify metric variables that characterize woodland spatial configuration. The edge contrast length with open farmland showed a strong correlation with F1 (correlations ranging between 0.55 and 0.98) and may be used as a proxy for oak woodland mixedness in landscape matrix. The edge dynamics of oak woodlands may result in different patterns of oak recruitment and therefore, its study may be helpful in highlighting future baselines for the sustainable management of oak woodlands. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  2. A Key to the Pupal Exuviae of the Midges (Diptera: Chironomidae) of Everglades National Park, Florida

    Science.gov (United States)

    Jacobsen, Richard E.

    2008-01-01

    A key has been developed for identifying the pupal exuviae of 132 taxa of chironomid midges collected in Everglades National Park, as well as 18 additional species from freshwater habitats adjacent to the Park. Descriptions and illustrations are based upon voucher specimens from extensive collections of chironomid pupal exuviae for faunal surveys and biomonitoring research conducted in ENP and surrounding freshwater areas from 1998 to 2007. The key includes taxonomic comments for confirming identifications, as well as brief summaries of the distribution and ecology of each species in southern Florida waters. Information is also provided on the morphology of chironomid pupal exuviae, recommended references for identifying pupal exuviae, techniques for making slides, and methods to confirm proper identification.

  3. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  4. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  5. Key successes and challenges in providing mental health care in an urban male remand prison: a qualitative study

    OpenAIRE

    Samele, Chiara; Forrester, Andrew; Urqu?a, Norman; Hopkin, Gareth

    2016-01-01

    Purpose This study aimed to describe the workings of an urban male remand prison mental health service exploring the key challenges and successes, levels of integration and collaboration with other services. Method A purposive sampling was used to recruit key prison and healthcare professionals for in-depth interviews. A thematic analysis was used to analyse transcripts based on an initial coding frame of several predefined themes. Other key themes were also identified. Results Twenty-eight i...

  6. Identifying a key physical factor sensitive to the performance of Madden-Julian oscillation simulation in climate models

    Science.gov (United States)

    Kim, Go-Un; Seo, Kyong-Hwan

    2018-01-01

    A key physical factor in regulating the performance of Madden-Julian oscillation (MJO) simulation is examined by using 26 climate model simulations from the World Meteorological Organization's Working Group for Numerical Experimentation/Global Energy and Water Cycle Experiment Atmospheric System Study (WGNE and MJO-Task Force/GASS) global model comparison project. For this, intraseasonal moisture budget equation is analyzed and a simple, efficient physical quantity is developed. The result shows that MJO skill is most sensitive to vertically integrated intraseasonal zonal wind convergence (ZC). In particular, a specific threshold value of the strength of the ZC can be used as distinguishing between good and poor models. An additional finding is that good models exhibit the correct simultaneous convection and large-scale circulation phase relationship. In poor models, however, the peak circulation response appears 3 days after peak rainfall, suggesting unfavorable coupling between convection and circulation. For an improving simulation of the MJO in climate models, we propose that this delay of circulation in response to convection needs to be corrected in the cumulus parameterization scheme.

  7. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  8. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  9. Public perceptions of key performance indicators of healthcare in Alberta, Canada.

    Science.gov (United States)

    Northcott, Herbert C; Harvey, Michael D

    2012-06-01

    To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.

  10. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Key beliefs related to decisions for physical activity engagement among first-in-family students transitioning to university.

    Science.gov (United States)

    Cowie, Eloise; Hamilton, Kyra

    2014-08-01

    The current study investigated key beliefs related to decisions for physical activity (PA) engagement among first-in-family (FIF) students transitioning to university. FIF students (n = 157) completed an online questionnaire assessing standard theory of planned behaviour constructs and belief-based items. One week later, participants completed a follow-up questionnaire assessing self-reported PA during the previous week. Results identified a range of behavioural, normative, and control beliefs that were significantly correlated with both PA intention and behaviour. Various key beliefs were also identified in relation to FIF students' decisions to be regularly physically active, with behavioural beliefs such as "take up too much time", normative beliefs including "friends outside of university", and control beliefs such as "cost", identified. Finally, frequencies of those who strongly or fully accepted these beliefs were analysed, demonstrating that typically, a large number of FIF students did not hold the beliefs, and as such, these are relevant to target in resultant interventions. The current study effectively highlights a number of key beliefs that can be targeted in programs aimed at encouraging FIF students' PA. Further, the study addresses a gap in the literature of targeting FIF students, a cohort at risk for inactivity, and utilises a sound theoretical framework to identify the unique set of beliefs guiding decisions for PA for this at-risk community group.

  12. Local and regional energy companies offering energy services: Key activities and implications for the business model

    International Nuclear Information System (INIS)

    Kindström, Daniel; Ottosson, Mikael

    2016-01-01

    Highlights: • Many companies providing energy services are experiencing difficulties. • This research identifies key activities for the provision of energy services. • Findings are aggregated to the business-model level providing managerial insights. • This research identifies two different business model innovation paths. • Energy companies may need to renew parts of, or the entire, business model. - Abstract: Energy services play a key role in increasing energy efficiency in the industry. The key actors in these services are the local and regional energy companies that are increasingly implementing energy services as part of their market offering and developing service portfolios. Although expectations for energy services have been high, progress has so far been limited, and many companies offering energy services, including energy companies, are experiencing difficulties in implementing energy services and providing them to the market. Overall, this research examines what is needed for local and regional energy companies to successfully implement energy services (and consequently provide them to the market). In doing this, a two-stage process is used: first, we identify key activities for the successful implementation of energy services, and second, we aggregate the findings to the business model level. This research demonstrates that to succeed in implementing energy services, an energy company may need to renew parts or all of its existing product-based business model, formulate a new business model, or develop coexisting multiple business models. By discussing two distinct business model innovation processes, this research demonstrates that there can be different paths to success.

  13. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  14. Robust de novo pathway enrichment with KeyPathwayMiner 5

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; List, Markus; Dissing-Hansen, Martin

    2016-01-01

    Identifying functional modules or novel active pathways, recently termed de novo pathway enrichment, is a computational systems biology challenge that has gained much attention during the last decade. Given a large biological interaction network, KeyPathwayMiner extracts connected subnetworks tha...

  15. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  16. A non-canonical function of Ezh2 preserves immune homeostasis

    NARCIS (Netherlands)

    Vasanthakumar, Ajithkumar; Xu, Dakang; Lun, Aaron Tl; Kueh, Andrew J.; van Gisbergen, Klaas Pjm; Iannarella, Nadia; Li, Xiaofang; Yu, Liang; Wang, Die; Williams, Bryan Rg; Lee, Stanley Cw; Majewski, Ian J.; Godfrey, Dale I.; Smyth, Gordon K.; Alexander, Warren S.; Herold, Marco J.; Kallies, Axel; Nutt, Stephen L.; Allan, Rhys S.

    2017-01-01

    Enhancer of zeste 2 (Ezh2) mainly methylates lysine 27 of histoneH3 (H3K27me3) as part of the polycomb repressive complex 2 (PRC2) together with Suz12 and Eed. However, Ezh2 can also modify non-histone substrates, although it is unclear whether this mechanism has a role during development. Here, we

  17. Applying genotoxicology tools to identify environmental stressors in support of river management

    CSIR Research Space (South Africa)

    Oberholster, Paul J

    2015-09-01

    Full Text Available Although bioassay approaches are useful for identifying chemicals of potential concern, they provide little understanding of the mechanisms of chemical toxicity. Without this understanding, it is difficult to address some of the key challenges...

  18. Key properties of expert movement systems in sport : an ecological dynamics perspective.

    Science.gov (United States)

    Seifert, Ludovic; Button, Chris; Davids, Keith

    2013-03-01

    This paper identifies key properties of expertise in sport predicated on the performer-environment relationship. Weaknesses of traditional approaches to expert performance, which uniquely focus on the performer and the environment separately, are highlighted by an ecological dynamics perspective. Key properties of expert movement systems include 'multi- and meta-stability', 'adaptive variability', 'redundancy', 'degeneracy' and the 'attunement to affordances'. Empirical research on these expert system properties indicates that skill acquisition does not emerge from the internal representation of declarative and procedural knowledge, or the imitation of expert behaviours to linearly reduce a perceived 'gap' separating movements of beginners and a putative expert model. Rather, expert performance corresponds with the ongoing co-adaptation of an individual's behaviours to dynamically changing, interacting constraints, individually perceived and encountered. The functional role of adaptive movement variability is essential to expert performance in many different sports (involving individuals and teams; ball games and outdoor activities; land and aquatic environments). These key properties signify that, in sport performance, although basic movement patterns need to be acquired by developing athletes, there exists no ideal movement template towards which all learners should aspire, since relatively unique functional movement solutions emerge from the interaction of key constraints.

  19. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  20. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  1. Academic Primer Series: Key Papers About Competency-Based Medical Education

    Directory of Open Access Journals (Sweden)

    Robert Cooney

    2017-05-01

    Full Text Available Introduction: Competency-based medical education (CBME presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Methods: Based on the online discussions of the 2016–2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Results: Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. Conclusion: We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  2. Academic Primer Series: Key Papers About Competency-Based Medical Education.

    Science.gov (United States)

    Cooney, Robert; Chan, Teresa M; Gottlieb, Michael; Abraham, Michael; Alden, Sylvia; Mongelluzzo, Jillian; Pasirstein, Michael; Sherbino, Jonathan

    2017-06-01

    Competency-based medical education (CBME) presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Based on the online discussions of the 2016-2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  3. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    NARCIS (Netherlands)

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  4. First- and third-party ground truth for key frame extraction from consumer video clips

    Science.gov (United States)

    Costello, Kathleen; Luo, Jiebo

    2007-02-01

    Extracting key frames (KF) from video is of great interest in many applications, such as video summary, video organization, video compression, and prints from video. KF extraction is not a new problem. However, current literature has been focused mainly on sports or news video. In the consumer video space, the biggest challenges for key frame selection from consumer videos are the unconstrained content and lack of any preimposed structure. In this study, we conduct ground truth collection of key frames from video clips taken by digital cameras (as opposed to camcorders) using both first- and third-party judges. The goals of this study are: (1) to create a reference database of video clips reasonably representative of the consumer video space; (2) to identify associated key frames by which automated algorithms can be compared and judged for effectiveness; and (3) to uncover the criteria used by both first- and thirdparty human judges so these criteria can influence algorithm design. The findings from these ground truths will be discussed.

  5. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; van der Veen, JP Wietze; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A; Spritz, Richard A

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from destruction of melanocytes1, with epidemiologic association with other autoimmune diseases2. In previous linkage and genome-wide association studies (GWAS1, GWAS2), we identified 27 vitiligo susceptibility loci in patients of European (EUR) ancestry. We carried out a third GWAS (GWAS3) in EUR subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new loci and 7 suggestive loci, most encoding immune and apoptotic regulators, some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some corresponding to eQTL at these loci. Together, the identified genes provide a framework for vitiligo genetic architecture and pathobiology, highlight relationships to other autoimmune diseases and melanoma, and offer potential targets for treatment. PMID:27723757

  6. Legislation on violence against women: overview of key components.

    Science.gov (United States)

    Ortiz-Barreda, Gaby; Vives-Cases, Carmen

    2013-01-01

    This study aimed to determine if legislation on violence against women (VAW) worldwide contains key components recommended by the Pan American Health Organization (PAHO) and the United Nations (UN) to help strengthen VAW prevention and provide better integrated victim protection, support, and care. A systematic search for VAW legislation using international legal databases and other electronic sources plus data from previous research identified 124 countries/territories with some type of VAW legislation. Full legal texts were found for legislation from 104 countries/territories. Those available in English, Portuguese, and Spanish were downloaded and compiled and the selection criteria applied (use of any of the common terms related to VAW, including intimate partner violence (IPV), and reference to at least two of six sectors (education, health, judicial system, mass media, police, and social services) with regard to VAW interventions (protection, support, and care). A final sample from 80 countries/territories was selected and analyzed for the presence of key components recommended by PAHO and the UN (reference to the term "violence against women" in the title; definitions of different types of VAW; identification of women as beneficiaries; and promotion of (reference to) the participation of multiple sectors in VAW interventions). Few countries/territories specifically identified women as the beneficiaries of their VAW legislation, including those that labeled their legislation "domestic violence" law ( n = 51), of which only two explicitly mentioned women as complainants/survivors. Only 28 countries/territories defined the main forms of VAW (economic, physical, psychological, and sexual) in their VAW legislation. Most highlighted the role of the judicial system, followed by that of social services and the police. Only 28 mentioned the health sector. Despite considerable efforts worldwide to strengthen VAW legislation, most VAW laws do not incorporate the key

  7. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    Science.gov (United States)

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. Key Mechanisms for Employee-Driven Innovation in Governmental Client Organisations

    DEFF Research Database (Denmark)

    Sørensen, Henrik; Faber, Lene; Wandahl, Søren

    2018-01-01

    the mechanisms of organisational trust, innovation safety, organisational practices, cultural settings and the recognition and rewards structure to motivate employees. The decision-making procedures should be transparent especially to the idea-owner and the employees involved, and the implementation and putting......In order to ensure that knowledge and ideas are transformed into innovative contributions, a systematic approach is important. The aim of this research was to identify the specific mechanisms that are key to implementing an innovation process model when conducting Employee-driven Innovation...... in a governmental client organisation. The methodological approach was an exploratory case study of a governmental client organisation within the Danish construction industry. The units of analysis were groups of employees and managers within the case organisation. The primary mechanisms identified were...

  9. Mapping industrial networks as an approach to identify inter-organisational collaborative potential in new product development

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    2012-01-01

    . Consequently, identifying and selecting potential partners to establish collaboration agreements can be a key activity in the new product development process. This paper explores the implications of mapping industrial networks with the purpose of identifying inter-organisational collaborative potential...

  10. Amyotrophic lateral sclerosis or not: Keys for the diagnosis.

    Science.gov (United States)

    Lenglet, T; Camdessanché, J-P

    2017-05-01

    Amyotrophic lateral sclerosis (ALS) is a degenerative motor neuron disease (MND) which prognosis is poor. Early diagnosis permit to set up immediately adapted treatment and cares. Available diagnostic criteria are based on the detection of both central and peripheral motor neuron injury in bulbar, cervical, thoracic and lumbar regions. Electrodiagnostic (EDX) tests are the key tools to identify peripheral motor neuron involvement. Needle examination records abnormal activities at rest, and looks for neurogenic pattern during muscle contraction. Motor unit potentials morphology is modified primary to recruitment. Motor evoked potentials remain the test of choice to identify impairment of central motor neurons. In the absence of diagnostic biomarker of ALS and among essential investigations of suspected MND, a careful clinical and neurophysiological work-up is essential to rule out the differential diagnosis. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  11. Decommissioning: Regulatory activities and identification of key organizational and human factors safety issues

    International Nuclear Information System (INIS)

    Durbin, N.E.; Melber, B.D.; Lekberg, A.

    2001-12-01

    In the late 1990's the Swedish government decided to shut down Unit 1 of the Barsebaeck nuclear power plant. This report documents some of the efforts made by the Swedish Nuclear Power Inspectorate (SKI) to address human factors and organizational issues in nuclear safety during decommissioning of a nuclear facility. This report gives a brief review of the background to the decommissioning of Barsebaeck 1 and points out key safety issues that can arise during decommissioning. The main regulatory activities that were undertaken were requirements that the plant provide special safety reports on decommissioning focusing on first, the operation of both units until closure of Unit 1 and second, the operation of Unit 2 when Unit 1 was closed. In addition, SKI identified areas that might be affected by decommissioning and called these areas out for special attention. With regard to these areas of special attention, SKI required that the plant provide monthly reports on changing and emerging issues as well as self-assessments of the areas to be addressed in the special safety reports. Ten key safety issues were identified and evaluated with regard to different stages of decommissioning and with regard to the actions taken by Barsebaeck. Some key conclusions from SKI's experience in regulating a decommissioning nuclear power plant conclude the report

  12. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  13. SAH derived potent and selective EZH2 inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Kung, Pei-Pei; Huang, Buwen; Zehnder, Luke; Tatlock, John; Bingham, Patrick; Krivacic, Cody; Gajiwala, Ketan; Diehl, Wade; Yu, Xiu; Maegley, Karen A.

    2015-04-01

    A series of novel enhancer of zeste homolog 2 (EZH2) inhibitors was designed based on the chemical structure of the histone methyltransferase (HMT) inhibitor SAH (S-adenosyl-l-homocysteine). These nucleoside-based EZH2 inhibitors blocked the methylation of nucleosomes at H3K27 in biochemical assays employing both WT PRC2 complex as well as a Y641N mutant PRC2 complex. The most potent compound, 27, displayed IC50’s against both complexes of 270 nM and 70 nM, respectively. To our knowledge, compound 27 is the most potent SAH-derived inhibitor of the EZH2 PRC2 complex yet identified. This compound also displayed improved potency, lipophilic efficiency (LipE), and selectivity profile against other lysine methyltransferases compared with SAH.

  14. RNA-Seq analysis identifies key genes associated with haustorial development in the root hemiparasite Santalum album

    Directory of Open Access Journals (Sweden)

    Xinhua eZhang

    2015-09-01

    Full Text Available Santalum album (sandalwood is one of the economically important plant species in the Santalaceae for its production of highly valued perfume oils. Sandalwood is also a hemiparasitic tree that obtains some of its water and simple nutrients by tapping into other plants through haustoria which are highly specialized organs in parasitic angiosperms. However, an understanding of the molecular mechanisms involved in haustorium development is limited. In this study, RNA sequencing (RNA-seq analyses were performed to identify changes in gene expression and metabolic pathways associated with the development of the S. album haustorium. A total of 56,011 non-redundant contigs with a mean contig size of 618 bp were obtained by de novo assembly of the transcriptome of haustoria and non-haustorial seedling roots. A substantial number of the identified differentially expressed genes were involved in cell wall metabolism and protein metabolism, as well as mitochondrial electron transport functions. Phytohormone-mediated regulation might play an important role during haustorial development. Especially, auxin signaling is likely to be essential for haustorial initiation, and genes related to cytokinin and gibberellin biosynthesis and metabolism are involved in haustorial development. Our results suggest that genes encoding nodulin-like proteins may be important for haustorial morphogenesis in S. album. The obtained sequence data will become a rich resource for future research in this interesting species. This information improves our understanding of haustorium development in root hemiparasitic species and will allow further exploration of the detailed molecular mechanisms underlying plant parasitism.

  15. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  16. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  17. Identification and Characterization of Key Human Performance Issues and Research in the Next Generation Air Transportation System (NextGen)

    Science.gov (United States)

    Lee, Paul U.; Sheridan, Tom; Poage, james L.; Martin, Lynne Hazel; Jobe, Kimberly K.

    2010-01-01

    This report identifies key human-performance-related issues associated with Next Generation Air Transportation System (NextGen) research in the NASA NextGen-Airspace Project. Four Research Focus Areas (RFAs) in the NextGen-Airspace Project - namely Separation Assurance (SA), Airspace Super Density Operations (ASDO), Traffic Flow Management (TFM), and Dynamic Airspace Configuration (DAC) - were examined closely. In the course of the research, it was determined that the identified human performance issues needed to be analyzed in the context of NextGen operations rather than through basic human factors research. The main gaps in human factors research in NextGen were found in the need for accurate identification of key human-systems related issues within the context of specific NextGen concepts and better design of the operational requirements for those concepts. By focusing on human-system related issues for individual concepts, key human performance issues for the four RFAs were identified and described in this report. In addition, mixed equipage airspace with components of two RFAs were characterized to illustrate potential human performance issues that arise from the integration of multiple concepts.

  18. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  19. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  20. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  1. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  2. On-site Labour Productivity of New Zealand Construction Industry: Key Constraints and Improvement Measures

    Directory of Open Access Journals (Sweden)

    Serdar Durdyev

    2011-09-01

    Full Text Available Productivity is key to the survival and growth of any organisation, industry or nation. Some factors constrain the achievement of the set project objectives in the New Zealand building and construction industry and are responsible for the reported steady decline of productivity and performance. This study aims to identify the key constraints to on-site labour productivity and improvement measures. Using the descriptive survey method, views of some project managers, contractors and subcontractors in New Zealand were canvassed via pilot interviews and questionnaire surveys at the qualitative and quantity data gathering stages, respectively. Multi-attribute technique was used to analyse the quantitative data. Results showed that the key external constraints to on-site labour productivity comprise, in order of decreasing impact, statutory compliance, unforeseen events and wider external dynamics. The internal constraints, which contribute 67 percent of the onsite productivity issues, comprise reworks, level of skill and experience of the workforce, adequacy of method of construction, buildability issues, and inadequate supervision and coordination. . The factors underlying each broad category of external and internal constraints are reported. The relative levels of impact of the identified constraints are expected to guide the project team in addressing the constraints in a cost-effective manner.

  3. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  4. Key Design Characteristics for Developing Usable E-Commerce Websites in the Arab World

    Directory of Open Access Journals (Sweden)

    Layla Hasan

    2016-09-01

    Full Text Available This research aims to suggest key design characteristics that are necessary for developing usable e-commerce websites in the Arab world. A comprehensive usability evaluation of four leading Arab e-commerce websites was conducted using the heuristic evaluation method. The results identified major and minor usability problems and major and minor good design characteristics on the selected websites. Based on the results, 51 key design characteristics were suggested. The recommended key design characteristics comprised two levels according to their priority: level one which includes mandatory key design characteristics and level two which includes supplementary design characteristics. The key design characteristics in each level were categorized under specific pages and areas that can be found on any e-commerce website. Such categorizations could direct website evaluators and designers to important pages and areas that should be considered to improve the overall usability of e-commerce websites. The results of this research are particularly important to developing countries which are still facing challenges that may affect the design and accessibility of usable and useful websites. These relate to low speed of accessing the Internet and a lack of website designers who have experience in customers’ needs and websites’ usable design characteristics.

  5. Comparing hair-morphology and molecular methods to identify fecal samples from Neotropical felids.

    Directory of Open Access Journals (Sweden)

    Carlos C Alberts

    Full Text Available To avoid certain problems encountered with more-traditional and invasive methods in behavioral-ecology studies of mammalian predators, such as felids, molecular approaches have been employed to identify feces found in the field. However, this method requires a complete molecular biology laboratory, and usually also requires very fresh fecal samples to avoid DNA degradation. Both conditions are normally absent in the field. To address these difficulties, identification based on morphological characters (length, color, banding, scales and medullar patterns of hairs found in feces could be employed as an alternative. In this study we constructed a morphological identification key for guard hairs of eight Neotropical felids (jaguar, oncilla, Geoffroy's cat, margay, ocelot, Pampas cat, puma and jaguarundi and compared its efficiency to that of a molecular identification method, using the ATP6 region as a marker. For this molecular approach, we simulated some field conditions by postponing sample-conservation procedures. A blind test of the identification key obtained a nearly 70% overall success rate, which we considered equivalent to or better than the results of some molecular methods (probably due to DNA degradation found in other studies. The jaguar, puma and jaguarundi could be unequivocally discriminated from any other Neotropical felid. On a scale ranging from inadequate to excellent, the key proved poor only for the margay, with only 30% of its hairs successfully identified using this key; and have intermediate success rates for the remaining species, the oncilla, Geoffroy's cat, ocelot and Pampas cat, were intermediate. Complementary information about the known distributions of felid populations may be necessary to substantially improve the results obtained with the key. Our own molecular results were even better, since all blind-tested samples were correctly identified. Part of these identifications were made from samples kept in suboptimal

  6. Identifying factors affecting optimal management of agricultural water

    Directory of Open Access Journals (Sweden)

    Masoud Samian

    2015-01-01

    In addition to quantitative methodology such as descriptive statistics and factor analysis a qualitative methodology was employed for dynamic simulation among variables through Vensim software. In this study, the factor analysis technique was used through the Kaiser-Meyer-Olkin (KMO and Bartlett tests. From the results, four key elements were identified as factors affecting the optimal management of agricultural water in Hamedan area. These factors were institutional and legal factors, technical and knowledge factors, economic factors and social factors.

  7. Conceptualizing childhood health problems using survey data: a comparison of key indicators

    Directory of Open Access Journals (Sweden)

    Miller Anton R

    2007-12-01

    Full Text Available Abstract Background Many definitions are being used to conceptualize child health problems. With survey data, commonly used indicators for identifying children with health problems have included chronic condition checklists, measures of activity limitations, elevated service use, and health utility thresholds. This study compares these different indicators in terms of the prevalence rates elicited, and in terms of how the subgroups identified differ. Methods Secondary data analyses used data from the National Longitudinal Survey of Children and Youth, which surveyed a nationally representative sample of Canadian children (n = 13,790. Descriptive analyses compared healthy children to those with health problems, as classified by any of the key indicators. Additional analyses examined differences between subgroups of children captured by a single indicator and those described as having health problems by multiple indicators. Results This study demonstrates that children captured by any of the indicators had poorer health than healthy children, despite the fact that over half the sample (52.2% was characterized as having a health problem by at least one indicator. Rates of child ill health differed by indicator; 5.6% had an activity limitation, 9.2% exhibited a severe health difficulty, 31.7% reported a chronic condition, and 36.6% had elevated service use. Further, the four key indicators captured different types of children. Indicator groupings differed on child and socio-demographic factors. Compared to children identified by more than one indicator, those identified only by the severe health difficulty indicator displayed more cognitive problems (p Conclusion We provide information useful to researchers when selecting indicators from survey data to identify children with health problems. Researchers and policy makers need to be aware of the impact of such definitions on prevalence rates as well as on the composition of children classified as

  8. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  9. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  10. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  11. Community landscapes: an integrative approach to determine overlapping network module hierarchy, identify key nodes and predict network dynamics.

    Directory of Open Access Journals (Sweden)

    István A Kovács

    Full Text Available BACKGROUND: Network communities help the functional organization and evolution of complex networks. However, the development of a method, which is both fast and accurate, provides modular overlaps and partitions of a heterogeneous network, has proven to be rather difficult. METHODOLOGY/PRINCIPAL FINDINGS: Here we introduce the novel concept of ModuLand, an integrative method family determining overlapping network modules as hills of an influence function-based, centrality-type community landscape, and including several widely used modularization methods as special cases. As various adaptations of the method family, we developed several algorithms, which provide an efficient analysis of weighted and directed networks, and (1 determine persvasively overlapping modules with high resolution; (2 uncover a detailed hierarchical network structure allowing an efficient, zoom-in analysis of large networks; (3 allow the determination of key network nodes and (4 help to predict network dynamics. CONCLUSIONS/SIGNIFICANCE: The concept opens a wide range of possibilities to develop new approaches and applications including network routing, classification, comparison and prediction.

  12. Procedural key steps in laparoscopic colorectal surgery, consensus through Delphi methodology.

    Science.gov (United States)

    Dijkstra, Frederieke A; Bosker, Robbert J I; Veeger, Nicolaas J G M; van Det, Marc J; Pierie, Jean Pierre E N

    2015-09-01

    While several procedural training curricula in laparoscopic colorectal surgery have been validated and published, none have focused on dividing surgical procedures into well-identified segments, which can be trained and assessed separately. This enables the surgeon and resident to focus on a specific segment, or combination of segments, of a procedure. Furthermore, it will provide a consistent and uniform method of training for residents rotating through different teaching hospitals. The goal of this study was to determine consensus on the key steps of laparoscopic right hemicolectomy and laparoscopic sigmoid colectomy among experts in our University Medical Center and affiliated hospitals. This will form the basis for the INVEST video-assisted side-by-side training curriculum. The Delphi method was used for determining consensus on key steps of both procedures. A list of 31 steps for laparoscopic right hemicolectomy and 37 steps for laparoscopic sigmoid colectomy was compiled from textbooks and national and international guidelines. In an online questionnaire, 22 experts in 12 hospitals within our teaching region were invited to rate all steps on a Likert scale on importance for the procedure. Consensus was reached in two rounds. Sixteen experts agreed to participate. Of these 16 experts, 14 (88%) completed the questionnaire for both procedures. Of the 14 who completed the first round, 13 (93%) completed the second round. Cronbach's alpha was 0.79 for the right hemicolectomy and 0.91 for the sigmoid colectomy, showing high internal consistency between the experts. For the right hemicolectomy, 25 key steps were established; for the sigmoid colectomy, 24 key steps were established. Expert consensus on the key steps for laparoscopic right hemicolectomy and laparoscopic sigmoid colectomy was reached. These key steps will form the basis for a video-assisted teaching curriculum.

  13. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  14. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants.

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; Wietze van der Veen, J P; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R; Santorico, Stephanie A; Spritz, Richard A

    2016-11-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in patients of European ancestry. We carried out a third GWAS (GWAS3) in European-ancestry subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new significantly associated loci and 7 suggestive loci. Most encode immune and apoptotic regulators, with some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some of which corresponds to expression quantitative trait loci (eQTLs) at these loci. Together, the identified genes provide a framework for the genetic architecture and pathobiology of vitiligo, highlight relationships with other autoimmune diseases and melanoma, and offer potential targets for treatment.

  15. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  16. Identifying Twitter influencer profiles for health promotion in Saudi Arabia.

    Science.gov (United States)

    Albalawi, Yousef; Sixsmith, Jane

    2017-06-01

    New media platforms, such as Twitter, provide the ideal opportunity to positively influence the health of large audiences. Saudi Arabia has one of the highest number of Twitter users of any country, some of whom are very influential in setting agendas and contributing to the dissemination of ideas. Those opinion leaders, both individuals and organizations, influential in the new media environment have the potential to raise awareness of health issues, advocate for health and potentially instigate change at a social level. To realize the potential of the new media platforms for public health, the function of opinion leaders is key. This study aims to identify and profile the most influential Twitter accounts in Saudi Arabia. Multiple measures, including: number of followers and four influence scores, were used to evaluate Twitter accounts. The data were then filtered and analysed using ratio and percentage calculations to identify the most influential users. In total, 99 Saudi Twitter accounts were classified, resulting in the identification of 25 religious men/women, 16 traditional media, 14 sports related, 10 new media, 6 political, 6 company and 4 health accounts. The methods used to identify the key influential Saudi accounts can be applied to inform profile development of Twitter users in other countries. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  18. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  19. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  20. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  1. McArthur River project - the future of Key Lake

    International Nuclear Information System (INIS)

    Spross, J.

    1994-01-01

    The Key Lake mill has operated since the fall of 1983. The ore from both Key Lake open pits will be depleted by 1997. It is planned to use this mill, located about 60 km southwest of McArthur, to process the McArthur River ore. While the geological data collected so far on the McArthur deposit are encouraging, more information of the deposit is needed before any detailed mine planning can begin. The surface drilling program identified the orebody and provided information on the geomechanical and hydrological properties of the overlying sandstone. It was proposed to conduct an underground exploration program to further delineate the orebody. This was approved following a public hearing and review process. This program involves the sinking of a 630 metre deep shaft and the driving of one or two drifts along a portion of the orebody. From these drifts, exploration drilling every 10 m to 15 m through the orebody will provide the information required for the preparation of a feasibility study and an Environmental Impact Statement (EIS). (author). 4 refs., 8 figs

  2. Biomechanical loading on the upper extremity increases from single key tapping to directional tapping.

    Science.gov (United States)

    Qin, Jin; Trudeau, Matthieu; Katz, Jeffrey N; Buchholz, Bryan; Dennerlein, Jack T

    2011-08-01

    Musculoskeletal disorders associated with computer use span the joints of the upper extremity. Computing typically involves tapping in multiple directions. Thus, we sought to describe the loading on the finger, wrist, elbow and shoulder joints in terms of kinematic and kinetic difference across single key switch tapping to directional tapping on multiple keys. An experiment with repeated measures design was conducted. Six subjects tapped with their right index finger on a stand-alone number keypad placed horizontally in three conditions: (1) on single key switch (the number key 5); (2) left and right on number key 4 and 6; (3) top and bottom on number key 8 and 2. A force-torque transducer underneath the keypad measured the fingertip force. An active-marker infrared motion analysis system measured the kinematics of the fingertip, hand, forearm, upper arm and torso. Joint moments for the metacarpophalangeal, wrist, elbow, and shoulder joints were estimated using inverse dynamics. Tapping in the top-bottom orientation introduced the largest biomechanical loading on the upper extremity especially for the proximal joint, followed by tapping in the left-right orientation, and the lowest loading was observed during single key switch tapping. Directional tapping on average increased the fingertip force, joint excursion, and peak-to-peak joint torque by 45%, 190% and 55%, respectively. Identifying the biomechanical loading patterns associated with these fundamental movements of keying improves the understanding of the risks of upper extremity musculoskeletal disorders for computer keyboard users. Copyright © 2010 Elsevier Ltd. All rights reserved.

  3. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    Science.gov (United States)

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  4. Transcriptome analysis reveals key differentially expressed genes involved in wheat grain development

    Directory of Open Access Journals (Sweden)

    Yonglong Yu

    2016-04-01

    Full Text Available Wheat seed development is an important physiological process of seed maturation and directly affects wheat yield and quality. In this study, we performed dynamic transcriptome microarray analysis of an elite Chinese bread wheat cultivar (Jimai 20 during grain development using the GeneChip Wheat Genome Array. Grain morphology and scanning electron microscope observations showed that the period of 11–15 days post-anthesis (DPA was a key stage for the synthesis and accumulation of seed starch. Genome-wide transcriptional profiling and significance analysis of microarrays revealed that the period from 11 to 15 DPA was more important than the 15–20 DPA stage for the synthesis and accumulation of nutritive reserves. Series test of cluster analysis of differential genes revealed five statistically significant gene expression profiles. Gene ontology annotation and enrichment analysis gave further information about differentially expressed genes, and MapMan analysis revealed expression changes within functional groups during seed development. Metabolic pathway network analysis showed that major and minor metabolic pathways regulate one another to ensure regular seed development and nutritive reserve accumulation. We performed gene co-expression network analysis to identify genes that play vital roles in seed development and identified several key genes involved in important metabolic pathways. The transcriptional expression of eight key genes involved in starch and protein synthesis and stress defense was further validated by qRT-PCR. Our results provide new insight into the molecular mechanisms of wheat seed development and the determinants of yield and quality.

  5. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  6. State absolutism and the future of man: A historico-existential ...

    African Journals Online (AJOL)

    The wellbeing of man has been the rationale behind the original call for the erection of a state structure. Therefore, it calls to reason that any state whose existence hampers the well-being of man is but a sham, irrespective of the motive of the contractors. The quest and zest of the Anglo-Saxon contractarians for a state was ...

  7. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    Science.gov (United States)

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  8. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  9. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  10. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  11. Drug packaging. A key factor to be taken into account when choosing a treatment.

    Science.gov (United States)

    2011-10-01

    A drug's packaging contributes to its harm-benefit balance. Highlighting the key practical information and identifying potential sources of error or mix-ups is part and parcel of the correct use of medicines. Select labelling that clearly and prominently displays the important information, including the international nonproprietary name (INN).

  12. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  13. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  14. Identification of Key Issues in Adopting a Web 2.0 E-Portfolio Strategy

    Science.gov (United States)

    McKenna, Gary F.; Stansfield, Mark H.

    2013-01-01

    The purpose of the paper is to identify key issues relating to best practice and sustainability in Web 2.0 as an e-Learning strategy for supporting e-portfolios in Higher Education. A practical guidelines framework was developed for best practices, which can be justified by the lack of available frameworks in the e-Learning literature. A…

  15. Examining the Key Factors Affecting e-Service Quality of Small Online Apparel Businesses in Malaysia

    Directory of Open Access Journals (Sweden)

    Che Nawi Noorshella

    2015-04-01

    Full Text Available e-Service quality (eSQ is increasingly recognized as an important aspect, as well as the key to determining the competitive advantage and factor in the long-term retention of firms operating online. This study, therefore, is aimed at identifying the key determinants of eSQ among the small online apparel businesses in Malaysia. This study used a cross-sectional design, and data were collected from 765 customers who purchased apparel online at the point-of-purchase. Findings of this study indicate that “product information quality,” “website design,” “security and privacy,” and “expected consumer service” are the key determinants of eSQ among small online apparel businesses in Malaysia. The implication for the owner-managers of the apparel businesses in Malaysia is that they must be aware of the significance of the key eSQ indicators while designing their businesses, to attract and retain customers.

  16. Key team physical and technical performance indicators indicative of team quality in the soccer Chinese super league.

    Science.gov (United States)

    Yang, Gai; Leicht, Anthony S; Lago, Carlos; Gómez, Miguel-Ángel

    2018-01-01

    The aim of this study was to identify the key physical and technical performance variables related to team quality in the Chinese Super League (CSL). Teams' performance variables were collected from 240 matches and analysed via analysis of variance between end-of-season-ranked groups and multinomial logistic regression. Significant physical performance differences between groups were identified for sprinting (top-ranked group vs. upper-middle-ranked group) and total distance covered without possession (upper and upper-middle-ranked groups and lower-ranked group). For technical performance, teams in the top-ranked group exhibited a significantly greater amount of possession in opponent's half, number of entry passes in the final 1/3 of the field and the Penalty Area, and 50-50 challenges than lower-ranked teams. Finally, time of possession increased the probability of a win compared with a draw. The current study identified key performance indicators that differentiated end-season team quality within the CSL.

  17. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Directory of Open Access Journals (Sweden)

    Nora Adriana Hernández-Cuevas

    Full Text Available Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron, low-iron medium (around 123 µM iron, iron-deficient medium (around 91 µM iron, and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  18. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Science.gov (United States)

    Hernández-Cuevas, Nora Adriana; Weber, Christian; Hon, Chung-Chau; Guillen, Nancy

    2014-01-01

    Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron), low-iron medium (around 123 µM iron), iron-deficient medium (around 91 µM iron), and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters) and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  19. Identification of key factors regulating self-renewal and differentiation in EML hematopoietic precursor cells by RNA-sequencing analysis.

    Science.gov (United States)

    Zong, Shan; Deng, Shuyun; Chen, Kenian; Wu, Jia Qian

    2014-11-11

    Hematopoietic stem cells (HSCs) are used clinically for transplantation treatment to rebuild a patient's hematopoietic system in many diseases such as leukemia and lymphoma. Elucidating the mechanisms controlling HSCs self-renewal and differentiation is important for application of HSCs for research and clinical uses. However, it is not possible to obtain large quantity of HSCs due to their inability to proliferate in vitro. To overcome this hurdle, we used a mouse bone marrow derived cell line, the EML (Erythroid, Myeloid, and Lymphocytic) cell line, as a model system for this study. RNA-sequencing (RNA-Seq) has been increasingly used to replace microarray for gene expression studies. We report here a detailed method of using RNA-Seq technology to investigate the potential key factors in regulation of EML cell self-renewal and differentiation. The protocol provided in this paper is divided into three parts. The first part explains how to culture EML cells and separate Lin-CD34+ and Lin-CD34- cells. The second part of the protocol offers detailed procedures for total RNA preparation and the subsequent library construction for high-throughput sequencing. The last part describes the method for RNA-Seq data analysis and explains how to use the data to identify differentially expressed transcription factors between Lin-CD34+ and Lin-CD34- cells. The most significantly differentially expressed transcription factors were identified to be the potential key regulators controlling EML cell self-renewal and differentiation. In the discussion section of this paper, we highlight the key steps for successful performance of this experiment. In summary, this paper offers a method of using RNA-Seq technology to identify potential regulators of self-renewal and differentiation in EML cells. The key factors identified are subjected to downstream functional analysis in vitro and in vivo.

  20. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Jorswieck, Eduard A.; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  1. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  2. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  3. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, Dwight A [ORNL; Poore III, Willis P [ORNL

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Mark I plant for those instrumentation systems considered most important for accident management purposes.

  4. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    planning information and services for sexually active young women – in ... towards ensuring the equitable distribution of resources and accessible basic services. 99 ...... denial and disengagement affecting intergenerational dialogue in many ...

  5. Quality Improvement in Hospitals: Identifying and Understanding Behaviors

    Directory of Open Access Journals (Sweden)

    Lukasz M. Mazur

    2012-01-01

    Full Text Available Improving operational performance in hospitals is complicated, particularly if process improvement requires complex behavioral changes. Using single-loop and double-loop learning theory as a foundation, the purpose of this research is to empirically uncover key improvement behaviors and the factors that may be associated with such behaviors in hospitals. A two-phased approach was taken to collect data regarding improvement behaviors and associated factors, and data analysis was conducted using methods proposed by grounded theorists. The contributions of this research are twofold. First, five key behaviors related to process improvement are identified, namely Quick Fixing, Initiating, Conforming, Expediting, and Enhancing. Second, based on these observed behaviors, a set of force field diagrams is developed to structure and organize possible factors that are important to consider when attempting to change improvement behaviors. This begins to fill the gap in the knowledge about what factors drive effective improvement efforts in hospital settings.

  6. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  7. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  8. Recognition of key regions for restoration of phytoplankton communities in the Huai River basin, China

    Science.gov (United States)

    Zhao, Changsen; Liu, Changming; Xia, Jun; Zhang, Yongyong; Yu, Qiang; Eamus, Derek

    2012-02-01

    SummaryHealthy phytoplankton communities are the basis of healthy water ecosystems, and form the foundation of many freshwater food webs. Globally many freshwater ecosystems are degraded because of intensive human activities, so water ecosystem restoration is a burning issue worldwide. Selection of key regions for phytoplankton-related restoration is crucial for an effective aquatic eco-restoration. This paper presents a practical method for identification of key regions for phytoplankton-related restoration, using random forests (RFs) method to cluster sites based on dominance, biodiversity, water chemistry and ecological niche. We sampled phytoplankton for species richness and relative abundance and water quality in the Huai River basin (HRB), China to determine the phytoplankton communities' composition and structure and characterize of their ecological niches. A wider mean niche breadth of a species usually leads to a greater overlap with the niche of other species. Using these data and water quality indices, we identified the key regions for phytoplankton-related river restoration activities. Results indicate that our method for recognition of key regions is effective and practical and its application to the HRB identified the Northern Plain area as the key region for restoration. This area is severely polluted and contributes significantly to the HRB phytoplankton communities. Phytoplankton in this region is highly adaptable to environmental change and therefore will be relatively unharmed by environmental instability induced by restoration measures. During restoration, indices of water temperature, total phosphorus and chemical oxygen demand can be altered with little negative influence on phytoplankton communities, but measures that increase ammonia-nitrogen concentration would be highly detrimental. These results will provide valuable information for policy makers and stakeholders in water ecosystem restoration and sustainable basin management in the HRB.

  9. Key Criteria of "Good Practice" for Constructive Diaspora Engagement in Peacebuilding

    OpenAIRE

    Sinatti, Giulia

    2010-01-01

    textabstractThis discussion paper focuses on the engagement of diasporas in peacebuilding processes in their countries of origin. The main argument put forward in this paper is that, given certain conditions, diasporas carry a potential to fruitfully engage in the field of peacebuilding. After substantiating this claim with a critical discussion of literature and research insight, the issue is further addressed by identifying and collating a set of key criteria of “good practice” for construc...

  10. Identifying extensions required by RUP (Rational Unified Process) to comply with CMM (Capability Maturity Model) levels 2 and 3

    OpenAIRE

    Manzoni, Lisandra Vielmo; Price, Roberto Tom

    2003-01-01

    This paper describes an assessment of the Rational Unified Process (RUP) based on the Capability Maturity Model (CMM). For each key practice (KP) identified in each key process area (KPA) of CMM levels 2 and 3, the Rational Unified Process was assessed to determine whether it satisfied the KP or not. For each KPA, the percentage of the key practices supported was calculated, and the results were tabulated. The report includes considerations about the coverage of each key process area, describ...

  11. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  12. Identifying organizational deficiencies through root-cause analysis

    International Nuclear Information System (INIS)

    Tuli, R.W.; Apostolakis, G.E.

    1996-01-01

    All nuclear power plants incorporate root-cause analysis as an instrument to help identify and isolate key factors judged to be of significance following an incident or accident. Identifying the principal deficiencies can become very difficult when the event involves not only human and machine interaction, but possibly the underlying safety and quality culture of the organization. The current state of root-cause analysis is to conclude the investigation after identifying human and/or hardware failures. In this work, root-cause analysis is taken one step further by examining plant work processes and organizational factors. This extension is considered significant to the success of the analysis, especially when management deficiency is believed to contribute to the incident. The results of root-cause analysis can be most effectively implemented if the organization, as a whole, wishes to improve the overall operation of the plant by preventing similar incidents from occurring again. The study adds to the existing root-cause analysis the ability to localize the causes of undesirable events and to focus on those problems hidden deeply within the work processes that are routinely followed in the operation and maintenance of the facility

  13. An assessment of key health indicators among emergency medical services professionals.

    Science.gov (United States)

    Studnek, Jonathan R; Bentley, Melissa; Crawford, J Mac; Fernandez, Antonio R

    2010-01-01

    were 3,394 (17.0%) individuals classified as current smokers. Finally, logistic regression analysis indicated that when controlling for work-life characteristics and age, BMI and level of physical fitness were associated with preexisting health conditions. This study was the first known baseline assessment of EMS professionals regarding the key health indicators identified by Healthy People 2010. Investigations regarding the impact of health and wellness in relation to workforce stability should be undertaken. Further research should also be conducted to identify strategies to improve the health of the EMS workforce.

  14. KEYING AND ROLE PLAY IN BUSINESS COMMUNICATION: GENDER, AGE AND RACE CUES

    Directory of Open Access Journals (Sweden)

    GABRIELA DUMBRAVĂ

    2013-10-01

    Full Text Available This study comes as a sequel to other two papers published in this journal in 2010 and 2012 being part of a larger research that approaches business communication from the perspective of Goffman’s theory of the relational dimension of meaning. The paper starts from the premise that meaning is generated within the context of each specific interaction, as a result of a culturally determined process of framing, during which inherited patterns of thought and behavior establish well defined positions from which the interlocutors perceive and respond to one another. It also aims at further analyzing the process of keying by identifying the paradigm shifts that individualize business encounters according to gender, age, and race cues, as well as the communication malfunctions induced by keying errors (misunderstandings, conflict and discrimination.

  15. Key barriers to gout care: a systematic review and thematic synthesis of qualitative studies.

    Science.gov (United States)

    Rai, Sharan K; Choi, Hyon K; Choi, Sally H J; Townsend, Anne F; Shojania, Kam; De Vera, Mary A

    2018-04-17

    Gout care remains highly suboptimal, contributing to an increased global disease burden. To understand barriers to gout care, our aim was to provide a systematic review and thematic synthesis of qualitative studies worldwide reporting provider and patient perspectives and experiences with management. We conducted a mapped search of MEDLINE, EMBASE, Cumulative Index to Nursing and Allied Health Literature, and Social Sciences Citation Index databases and selected qualitative studies of provider and patient perspectives on gout management. We used thematic synthesis to combine the included studies and identify key themes across studies. We included 20 studies that reported the experiences and perspectives of 480 gout patients and 120 providers spanning five different countries across three continents. We identified three predominant provider themes: knowledge gaps and management approaches; perceptions and beliefs about gout patients; and system barriers to optimal gout care (e.g. time constraints and a lack of incentives). We also identified four predominant themes among gout patients: limited gout knowledge; interactions with health-care providers; attitudes towards and experiences with taking medication; and practical barriers to long-term medication use. Our systematic review of worldwide literature consistently identified gaps in gout knowledge among providers, which is likely to contribute to patients' lack of appropriate education about the fundamental causes of and essential treatment approaches for gout. Furthermore, system barriers among providers and day-to-day challenges of taking long-term medications among patients are considerable. These factors provide key targets to improve the widespread suboptimal gout care.

  16. The Effects of Quality Management Practices on Key Results: questionnaires sample for the industry of tourist accommodation in Spain

    Directory of Open Access Journals (Sweden)

    José Álvarez García

    2014-12-01

    Full Text Available In this research work, we examine the direct and indirect effects of quality management practices on key results and we identify the relationship between quality practices. To achieve the proposed objective, a structural model was used, taking into account the previous review of the literature, in order to identify the quality practices and causal relationships with the key results. The theoretical model and hypotheses are tested using data collected from a sample of 186 tourist accommodation companies certified with the “Q for Tourist Quality” standard in Spain, from a questionnaire based on quality practices identified in the literature and on the EFQM Model, taking some of the most relevant scales as a reference. The methodology used consists of the application of an Exploratory and Confirmatory Factorial Analysis to validate the scales (reliability, one-dimensionality and validity and define the number of items of each of the measuring instruments of the constructs proposed, to then estimate the causal model proposed, proceeding to test the hypotheses formulated by using the Structural Equation Model (SEM technique. The results achieved support the relationship between quality practices and the direct and positive impact of two of the practices, processes management and quality policy/planning, on the key results. It was also observed that the quality practices that most influence key results are quality policy/planning along with leadership, when considering the total effects (direct and indirect.

  17. Key Mechanisms for Employee-Driven Innovation in Governmental Client Organisations

    DEFF Research Database (Denmark)

    Sørensen, Henrik; Wandahl, Søren; Faber, Lene

    2018-01-01

    the mechanisms of organisational trust, innovation safety, organisational practices, cultural settings and the recognition and rewards structure to motivate employees. The decision-making procedures should be transparent especially to the idea-owner and the employees involved, and the implementation and putting......In order to ensure that knowledge and ideas are transformed into innovative contributions, a systematic approach is important. The aim of this research was to identify the specific mechanisms that are key to implementing an innovation process model when conducting Employee-driven Innovation...... into practice should be fast progressed phases in the innovation process....

  18. Key performance indicators for Australian mental health court liaison services.

    Science.gov (United States)

    Davidson, Fiona; Heffernan, Ed; Greenberg, David; Butler, Tony; Burgess, Philip

    2017-12-01

    The aim of this paper is to describe the development and technical specifications of a framework and national key performance indicators (KPIs) for Australian mental health Court Liaison Services (CLSs) by the National Mental Health Court Liaison Performance Working Group (Working Group). Representatives from each Australian State and Territory were invited to form a Working Group. Through a series of national workshops and meetings, a framework and set of performance indicators were developed using a review of literature and expert opinion. A total of six KPIs for CLSs have been identified and a set of technical specifications have been formed. This paper describes the process and outcomes of a national collaboration to develop a framework and KPIs. The measures have been developed to support future benchmarking activities and to assist services to identify best practice in this area of mental health service delivery.

  19. Identifikasi Waste Pada Proses Produksi Key Set Clarinet Dengan Pendekatan Lean Manufacturing

    Directory of Open Access Journals (Sweden)

    Dana Marsetiya Utama

    2016-07-01

    Full Text Available This study discusses lean manufacturing concept to identify waste in Key Set Clarinet production process at Yamaha Musical Products Indonesia, Ltd. The lean manufacturing concept is done intially by big picture mapping, waste assessment model (WAM, value stream mapping (VSM and cause and effect diagram respectively. The results show that the dominant waste is defect (26.04%, motion (19.34%, inventory (19.22%, and waiting (13.91%.

  20. Key Factors Affecting Construction Safety Performance in Developing Countries: Evidence from Cambodia

    OpenAIRE

    Durdyev, Serdar; Mohamed, Sherif; Lay, Meng Leang; Ismail, Syuhaida

    2017-01-01

    Although proper safety management in construction is of utmost importance; anecdotal evidence suggests that safety is not adequately considered in many developing countries. This paper considers the key variables affecting construction safety performance in Cambodia. Using an empirical questionnaire survey targeting local construction professionals, respondents were invited to rate the level of importance of 30 variables identified from the seminal literature. The data set was subjected to f...

  1. Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling

    KAUST Repository

    Reda, Waleed

    2017-04-17

    We tackle the problem of reducing tail latencies in distributed key-value stores, such as the popular Cassandra database.We focus on workloads of multiget requests, which batch together access to several data elements and parallelize read operations across the data store machines. We first analyze a production trace of a real system and quantify the skew due to multiget sizes, key popularity, and other factors. We then proceed to identify opportunities for reduction of tail latencies by recognizing the composition of aggregate requests and by carefully scheduling bottleneck operations that can otherwise create excessive queues. We design and implement a system called Rein, which reduces latency via inter-multiget scheduling using low overhead techniques. We extensively evaluate Rein via experiments in Amazon Web Services (AWS) and simulations. Our scheduling algorithms reduce the median, 95, and 99 percentile latencies by factors of 1.5, 1.5, and 1.9, respectively.

  2. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  3. Childhood disability in Malawi: a population based assessment using the key informant method.

    Science.gov (United States)

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  4. Application of element logging to lithologic identification of key horizons in Sichuan–Chongqing gas provinces

    Directory of Open Access Journals (Sweden)

    Ping Yin

    2018-03-01

    Full Text Available With the popularization and application of fast drilling technology in Sichuan–Chongqing gas provinces, the returned cuttings are fine and even powdered, so the traditional cutting lithology identification methods are not applicable any longer. In this paper, qualitative lithology identification and quantitative interpretation based on element logging were conducted on the key oil and gas bearing layers in this area according to the principle of elemental geochemistry. The study results show that: (1 different lithologies can be identified easily because of their different element logging characteristics. For example, basalts have the element characteristics of 0.35 0.55. (2 Clastic rocks, carbonate rocks, sulphate and transition rocks in the category of sedimentary rocks can be identified based on the element combination of (Al + Si + Fe and (Ca + Mg + S. Among them, clastic rocks have (Al + Si + Fe >31%, carbonate rocks have (Al + Si + Fe 36%. (3 Then, based on the element combination of (Si + K + Ca+Si/Al and (Al + Si + Fe + K+(Ca + S/Mg, sandstone, mudstone (shale, gypsum, dolomite, limestone and transition rocks can be identified. Finally, a qualitative identification chart and a set of quantitative interpretation software of element logging on key horizons in Sichuan–Chongqing gas provinces were developed to make this method convenient for field application. This method was applied on site in ten wells (such as Well MX207 in Sichuan–Chongqing gas provinces. It is indicated that the coincidence rate of lithology identification is in the range of 88.75–95.22% (averaging 92.42%. Obviously, it can satisfy the requirements of fast lithology identification while drilling of key oil and gas horizons in Sichuan–Chongqing gas provinces. Keywords: Sichuan–Chongqing gas provinces, Key horizon, Element logging, Lithologic identification while drilling, Quantitative lithologic interpretation, Qualitative

  5. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  6. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  7. Which Doctor to Trust: A Recommender System for Identifying the Right Doctors.

    Science.gov (United States)

    Guo, Li; Jin, Bo; Yao, Cuili; Yang, Haoyu; Huang, Degen; Wang, Fei

    2016-07-07

    Key opinion leaders (KOLs) are people who can influence public opinion on a certain subject matter. In the field of medical and health informatics, it is critical to identify KOLs on various disease conditions. However, there have been very few studies on this topic. We aimed to develop a recommender system for identifying KOLs for any specific disease with health care data mining. We exploited an unsupervised aggregation approach for integrating various ranking features to identify doctors who have the potential to be KOLs on a range of diseases. We introduce the design, implementation, and deployment details of the recommender system. This system collects the professional footprints of doctors, such as papers in scientific journals, presentation activities, patient advocacy, and media exposure, and uses them as ranking features to identify KOLs. We collected the information of 2,381,750 doctors in China from 3,657,797 medical journal papers they published, together with their profiles, academic publications, and funding. The empirical results demonstrated that our system outperformed several benchmark systems by a significant margin. Moreover, we conducted a case study in a real-world system to verify the applicability of our proposed method. Our results show that doctors' profiles and their academic publications are key data sources for identifying KOLs in the field of medical and health informatics. Moreover, we deployed the recommender system and applied the data service to a recommender system of the China-based Internet technology company NetEase. Patients can obtain authority ranking lists of doctors with this system on any given disease.

  8. Identifying continuous quality improvement publications: what makes an improvement intervention 'CQI'?

    Science.gov (United States)

    O'Neill, Sean M; Hempel, Susanne; Lim, Yee-Wei; Danz, Marjorie S; Foy, Robbie; Suttorp, Marika J; Shekelle, Paul G; Rubenstein, Lisa V

    2011-12-01

    The term continuous quality improvement (CQI) is often used to refer to a method for improving care, but no consensus statement exists on the definition of CQI. Evidence reviews are critical for advancing science, and depend on reliable definitions for article selection. As a preliminary step towards improving CQI evidence reviews, this study aimed to use expert panel methods to identify key CQI definitional features and develop and test a screening instrument for reliably identifying articles with the key features. We used a previously published method to identify 106 articles meeting the general definition of a quality improvement intervention (QII) from 9427 electronically identified articles from PubMed. Two raters then applied a six-item CQI screen to the 106 articles. Per cent agreement ranged from 55.7% to 75.5% for the six items, and reviewer-adjusted intra-class correlation ranged from 0.43 to 0.62. 'Feedback of systematically collected data' was the most common feature (64%), followed by being at least 'somewhat' adapted to local conditions (61%), feedback at meetings involving participant leaders (46%), using an iterative development process (40%), being at least 'somewhat' data driven (34%), and using a recognised change method (28%). All six features were present in 14.2% of QII articles. We conclude that CQI features can be extracted from QII articles with reasonable reliability, but only a small proportion of QII articles include all features. Further consensus development is needed to support meaningful use of the term CQI for scientific communication.

  9. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  10. Mind the Gap. A systematic review to identify usability and safety challenges and practices during electronic health record implementation.

    Science.gov (United States)

    Ratwani, Raj; Fairbanks, Terry; Savage, Erica; Adams, Katie; Wittie, Michael; Boone, Edna; Hayden, Andrew; Barnes, Janey; Hettinger, Zach; Gettinger, Andrew

    2016-11-16

    Decisions made during electronic health record (EHR) implementations profoundly affect usability and safety. This study aims to identify gaps between the current literature and key stakeholders' perceptions of usability and safety practices and the challenges encountered during the implementation of EHRs. Two approaches were used: a literature review and interviews with key stakeholders. We performed a systematic review of the literature to identify usability and safety challenges and best practices during implementation. A total of 55 articles were reviewed through searches of PubMed, Web of Science and Scopus. We used a qualitative approach to identify key stakeholders' perceptions; semi-structured interviews were conducted with a diverse set of health IT stakeholders to understand their current practices and challenges related to usability during implementation. We used a grounded theory approach: data were coded, sorted, and emerging themes were identified. Conclusions from both sources of data were compared to identify areas of misalignment. We identified six emerging themes from the literature and stakeholder interviews: cost and resources, risk assessment, governance and consensus building, customization, clinical workflow and usability testing, and training. Across these themes, there were misalignments between the literature and stakeholder perspectives, indicating major gaps. Major gaps identified from each of six emerging themes are discussed as critical areas for future research, opportunities for new stakeholder initiatives, and opportunities to better disseminate resources to improve the implementation of EHRs. Our analysis identified practices and challenges across six different emerging themes, illustrated important gaps, and results suggest critical areas for future research and dissemination to improve EHR implementation.

  11. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  12. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  13. Identifying mechanistic similarities in drug responses

    KAUST Repository

    Zhao, C.

    2012-05-15

    Motivation: In early drug development, it would be beneficial to be able to identify those dynamic patterns of gene response that indicate that drugs targeting a particular gene will be likely or not to elicit the desired response. One approach would be to quantitate the degree of similarity between the responses that cells show when exposed to drugs, so that consistencies in the regulation of cellular response processes that produce success or failure can be more readily identified.Results: We track drug response using fluorescent proteins as transcription activity reporters. Our basic assumption is that drugs inducing very similar alteration in transcriptional regulation will produce similar temporal trajectories on many of the reporter proteins and hence be identified as having similarities in their mechanisms of action (MOA). The main body of this work is devoted to characterizing similarity in temporal trajectories/signals. To do so, we must first identify the key points that determine mechanistic similarity between two drug responses. Directly comparing points on the two signals is unrealistic, as it cannot handle delays and speed variations on the time axis. Hence, to capture the similarities between reporter responses, we develop an alignment algorithm that is robust to noise, time delays and is able to find all the contiguous parts of signals centered about a core alignment (reflecting a core mechanism in drug response). Applying the proposed algorithm to a range of real drug experiments shows that the result agrees well with the prior drug MOA knowledge. © The Author 2012. Published by Oxford University Press. All rights reserved.

  14. The peri-implant esthetics: An unforgettable entity

    Science.gov (United States)

    Dhir, Sangeeta

    2011-01-01

    Esthetic demands in today's world of dentistry are scaling new heights, and are driven by the zest to look beautiful. The soft tissue esthetics around implants is the foci of attention, which, if failed to meet, leads to unacceptable esthetic failure. The aim of this article is to give a brief overview of the various vital parameters influencing the esthetics governing the peri-implant area. PMID:21976830

  15. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  16. Revisions and key to the Vernonieae (Compositae) of Thailand

    Science.gov (United States)

    Bunwong, Sukhonthip; Chantaranothai, Pranom; Keeley, Sterling C.

    2014-01-01

    Abstract Seventeen genera and 48 species, in five subtribes, are recognized in Thailand. These include 15 endemic taxa, half of which are in the largest genus, Acilepis, with others in the genera Camchaya, Koyamasia, and Okia. A new monotypic genus, Pulicarioidea, is established with P. annamica, the new name for the species formerly known as Vernonia pulicarioides. New combinations are also made for Acilepis kerrii, Cyanthillium montanum, Koyamasia curtisii and Okia pseudobirmanica. Forty-six characters including habit, leaf, flower, achene and pollen morphology were analyzed using UPGMA. Five clusters of taxa were identified. Keys to genera, species and varieties, descriptions, vernacular names, ecological data and illustrations are provided. PMID:24843297

  17. Exploring the key predictors of retention in emergency nurses.

    Science.gov (United States)

    Sawatzky, Jo-Ann V; Enns, Carol L

    2012-07-01

    To explore the factors that predict the retention of nurses working in emergency departments. The escalating shortage of nurses is one of the most critical issues facing specialty areas, such as the emergency department. Therefore, it is important to identify the key influencing and intermediary factors that affect emergency department nurses' intention to leave. As part of a larger study, a cross-sectional survey was completed by 261 registered nurses working in the 12 designated emergency departments within rural, urban community and tertiary hospitals in Manitoba, Canada. Twenty-six per cent of the respondents will probably/definitely leave their current emergency department jobs within the next year. Engagement was the key predictor of intention to leave (P burnout (P nursing management, professional practice, collaboration with physicians, staffing resources and shift work emerged as significant influencing factors for engagement. Engagement plays a central role in emergency department nurses intention to leave. Addressing the factors that influence engagement may reduce emergency department nurses' intention to leave. This study highlights the value of research-based evidence as the foundation for developing innovative strategies for the retention of emergency department nurses. © 2012 Blackwell Publishing Ltd.

  18. Investigation of the key determinants of Asian nurses' quality of life.

    Science.gov (United States)

    Makabe, Sachiko; Kowitlawakul, Yanika; Nurumal, Mohd Said; Takagai, Junko; Wichaikhum, Orn-Anong; Wangmo, Neyzang; Yap, Suk Foon; Kunaviktikul, Wipada; Komatsu, Junko; Shirakawa, Hideko; Kimura, Yutaka; Asanuma, Yoshihiro

    2018-06-01

    The study aimed to compare nurses' quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were "stress coping ability," "life satisfaction," "Japan," "social support," "job stress," and "Singapore" (adjusted R 2 =0.46). In conclusion, nurses' quality of life differs across Asian countries and is not linked to the country's economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution' minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them.

  19. Curated Collection for Educators: Five Key Papers about the Flipped Classroom Methodology.

    Science.gov (United States)

    King, Andrew; Boysen-Osborn, Megan; Cooney, Robert; Mitzman, Jennifer; Misra, Asit; Williams, Jennifer; Dulani, Tina; Gottlieb, Michael

    2017-10-25

    The flipped classroom (FC) pedagogy is becoming increasingly popular in medical education due to its appeal to the millennial learner and potential benefits in knowledge acquisition. Despite its popularity and effectiveness, the FC educational method is not without challenges. In this article, we identify and summarize several key papers relevant to medical educators interested in exploring the FC teaching methodology. The authors identified an extensive list of papers relevant to FC pedagogy via online discussions within the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented by an open call on Twitter (utilizing the #meded, #FOAMed, and #flippedclassroom hashtags) yielding a list of 33 papers. We then conducted a three-round modified Delphi process within the authorship group, which included both junior and senior clinician educators, to identify the most impactful papers for educators interested in FC pedagogy. The three-round modified Delphi process ranked all of the selected papers and selected the five most highly-rated papers for inclusion. The authorship group reviewed and summarized these papers with specific consideration given to their value to junior faculty educators and faculty developers interested in the flipped classroom approach. The list of papers featured in this article serves as a key reading list for junior clinician educators and faculty developers interested in the flipped classroom technique. The associated commentaries contextualize the importance of these papers for medical educators aiming to optimize their understanding and implementation of the flipped classroom methodology in their teaching and through faculty development.

  20. Waking the health plan giant: Group Health Cooperative stops counting sheep and starts counting key tobacco indicators.

    Science.gov (United States)

    McAfee, T

    1998-01-01

    Implementing a comprehensive approach to decreasing tobacco use in a large health plan requires hard work and commitment on the part of many individuals. We found that major organisational change can be accomplished and sustained. Keys to our success included our decision to remove access barriers to our cessation programmes (including cost); obtaining top leadership buy-in; identifying accountable individuals who owned responsibility for change; measuring key processes and outcomes; and finally keeping at it tenaciously through multiple cycles of improvement.

  1. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  2. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  3. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  4. Integrative biology approach identifies cytokine targeting strategies for psoriasis.

    Science.gov (United States)

    Perera, Gayathri K; Ainali, Chrysanthi; Semenova, Ekaterina; Hundhausen, Christian; Barinaga, Guillermo; Kassen, Deepika; Williams, Andrew E; Mirza, Muddassar M; Balazs, Mercedesz; Wang, Xiaoting; Rodriguez, Robert Sanchez; Alendar, Andrej; Barker, Jonathan; Tsoka, Sophia; Ouyang, Wenjun; Nestle, Frank O

    2014-02-12

    Cytokines are critical checkpoints of inflammation. The treatment of human autoimmune disease has been revolutionized by targeting inflammatory cytokines as key drivers of disease pathogenesis. Despite this, there exist numerous pitfalls when translating preclinical data into the clinic. We developed an integrative biology approach combining human disease transcriptome data sets with clinically relevant in vivo models in an attempt to bridge this translational gap. We chose interleukin-22 (IL-22) as a model cytokine because of its potentially important proinflammatory role in epithelial tissues. Injection of IL-22 into normal human skin grafts produced marked inflammatory skin changes resembling human psoriasis. Injection of anti-IL-22 monoclonal antibody in a human xenotransplant model of psoriasis, developed specifically to test potential therapeutic candidates, efficiently blocked skin inflammation. Bioinformatic analysis integrating both the IL-22 and anti-IL-22 cytokine transcriptomes and mapping them onto a psoriasis disease gene coexpression network identified key cytokine-dependent hub genes. Using knockout mice and small-molecule blockade, we show that one of these hub genes, the so far unexplored serine/threonine kinase PIM1, is a critical checkpoint for human skin inflammation and potential future therapeutic target in psoriasis. Using in silico integration of human data sets and biological models, we were able to identify a new target in the treatment of psoriasis.

  5. A key and checklist to the Neotropical forensically important "Little House Flies" (Diptera: Fanniidae

    Directory of Open Access Journals (Sweden)

    Diana Grisales

    Full Text Available ABSTRACT Fanniidae (Insecta: Diptera is a relatively small family (ca. 350 spp. with five genera, of which Fannia Robineau-Desvoidy, 1830 and Euryomma Stein, 1899 have Neotropical distributions. Some of these species are almost always found in forensic studies. Forensically relevant species have been neglected, despite recent forensic studies that suggest their importance for estimating post-mortem interval (PMI. Thus, current and updated keys to identify adults or larvae on carcasses are unavailable for the most important species. While immature stages are important in estimating PMI, evidence suggests that adults (Fanniidae as well as other families may also be useful for this purpose. Here we provide a key to males of the species of Fanniidae (found on corpses and other decomposing organic matter with a checklist of species that have been used in forensics in the Neotropical region. The key comprises all 38 species of Fannia and Euryomma that have already been successfully used in forensics, and species that are potentially useful for estimating PMI. These records were found after reviews of the literature and data from entomological collections. Photographs and illustrations of the main characters in the key are provided.

  6. Identifying Core Mobile Learning Faculty Competencies Based Integrated Approach: A Delphi Study

    Science.gov (United States)

    Elbarbary, Rafik Said

    2015-01-01

    This study is based on the integrated approach as a concept framework to identify, categorize, and rank a key component of mobile learning core competencies for Egyptian faculty members in higher education. The field investigation framework used four rounds Delphi technique to determine the importance rate of each component of core competencies…

  7. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  8. Curated Collections for Educators: Five Key Papers about Residents as Teachers Curriculum Development.

    Science.gov (United States)

    Krzyzaniak, Sara M; Cherney, Alan; Messman, Anne; Natesan, Sreeja; Overbeck, Michael; Schnapp, Benjamin; Boysen-Osborn, Megan

    2018-02-04

    The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to prepare residents to teach and assess medical students and other learners. In order to achieve this, many programs develop formal residents as teachers (RAT) curricula. Medical educators may seek the guidance of previously published literature during the development of RAT programs at their institutions. The authors sought to identify key articles published on the subject of RAT programs over the last 10 years. The authors utilized a formal literature search with the help of a medical librarian and identified additional articles from virtual discussions among the author group and an open call for articles on Twitter using the hashtag #MedEd. Virtual discussions occurred within an online community of practice, the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. The lead author conducted a four-round modified Delphi process among the author group in order to narrow the broad article list to five key articles on RAT programs. The authors summarize each article and provide considerations for junior faculty as well as faculty developers. Curriculum development and program evaluation should utilize established frameworks and evidence-based approaches. The papers identified by this Delphi process will help faculty use best practices when creating or revising new RAT curriculum. In addition, faculty tasked with guiding junior faculty in this process or creating faculty development programs around curriculum development will find these articles to be a great resource for building content.

  9. Preparedness for physiotherapy in private practice: Novices identify key factors in an interpretive description study.

    Science.gov (United States)

    Atkinson, Robyn; McElroy, Theresa

    2016-04-01

    Physiotherapists in Australia deliver services to a diverse range of clients, across many settings, however little research exists examining graduate preparedness for practice, even in the populous field of private practice. To explore novice physiotherapist perspectives on preparedness for work in private practice. The qualitative approach of interpretive description was used to guide in-depth interviews with 8 novice physiotherapists from 3 universities working in 5 private practices in Melbourne. All interviews were digitally recorded, transcribed verbatim and analyzed thematically. Four main themes influencing graduate preparedness for work in private practice were identified: 1) non-curricular experiences (e.g. sports training) 2) elective curricular: practicum experiences; 3) curricular: attainment of skills specific to private practice; and 4) the private practice setting: supportive colleagues. This combination of non-curricular, curricular, and practice setting factors offered the necessary scaffolding for the graduates to report feeling prepared for work in private practice. Non-curricular activities, radiological instruction, clinical placements, building supportive colleague relations and professional development in private practice are recommended as potential means of building preparedness in novice therapists. Findings have implications for physiotherapy students, educators and private practice clinics looking to recruit new graduates. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Pharmacy patronage: identifying key factors in the decision making process using the determinant attribute approach.

    Science.gov (United States)

    Franic, Duska M; Haddock, Sarah M; Tucker, Leslie Tootle; Wooten, Nathan

    2008-01-01

    To use the determinant attribute approach, a research method commonly used in marketing to identify the wants of various consumer groups, to evaluate consumer pharmacy choice when having a prescription order filled in different pharmacy settings. Cross sectional. Community independent, grocery store, community chain, and discount store pharmacies in Georgia between April 2005 and April 2006. Convenience sample of adult pharmacy consumers (n = 175). Survey measuring consumer preferences on 26 attributes encompassing general pharmacy site features (16 items), pharmacist characteristics (5 items), and pharmacy staff characteristics (5 items). 26 potential determinant attributes for pharmacy selection. 175 consumers were surveyed at community independent (n = 81), grocery store (n = 44), community chain (n = 27), or discount store (n = 23) pharmacy settings. The attributes of pharmacists and staff at all four pharmacy settings were shown to affect pharmacy patronage motives, although consumers frequenting non-community independent pharmacies were also motivated by secondary convenience factors, e.g., hours of operation, and prescription coverage. Most consumers do not perceive pharmacies as merely prescription-distribution centers that vary only by convenience. Prescriptions are not just another economic good. Pharmacy personnel influence pharmacy selection; therefore, optimal staff selection and training is likely the greatest asset and most important investment for ensuring pharmacy success.

  11. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  12. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  13. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  14. Plasma proteomics to identify biomarkers - Application to cardiovascular diseases

    DEFF Research Database (Denmark)

    Beck, Hans Christian; Overgaard, Martin; Melholt Rasmussen, Lars

    2015-01-01

    There is an unmet need for new cardiovascular biomarkers. Despite this only few biomarkers for the diagnosis or screening of cardiovascular diseases have been implemented in the clinic. Thousands of proteins can be analysed in plasma by mass spectrometry-based proteomics technologies. Therefore......, this technology may therefore identify new biomarkers that previously have not been associated with cardiovascular diseases. In this review, we summarize the key challenges and considerations, including strategies, recent discoveries and clinical applications in cardiovascular proteomics that may lead...

  15. Inhibitory Effect of Berberine on Zeste Homolog 2 (Ezh2 ...

    African Journals Online (AJOL)

    homolog 2 (Ezh2) expressions in KYSE450 human esophageal cancer cells. Methods: ... of the AXL receptor kinase. The results of ... effects of estrogen receptor antagonists on ..... protein EZH2 is involved in progression of prostate cancer.

  16. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  17. Key attributes of agricultural innovations in semi-arid smallholder farming systems in south-west Zimbabwe

    Science.gov (United States)

    Mutsvangwa-Sammie, Eness P.; Manzungu, Emmanuel; Siziba, Shephard

    2018-06-01

    In Sub-Sahara Africa, which includes Zimbabwe, about 80% of the population depends on agriculture for subsistence, employment and income. Agricultural production and productivity are, however, low. This has been attributed to a lack of appropriate innovations despite the huge investments that have been made to promote 'innovations' as a means to safeguarding agriculture-based livelihoods, which raises the question of how innovations are conceptualized, designed and implemented. This paper explores the key attributes of agricultural innovations by assessing how innovations are conceptualized, designed and implemented in semi-arid smallholder farming systems in south-west Zimbabwe. The study gathered information from 13 key informants and a household survey of 239 farmer households from Gwanda and Insiza districts. Results showed a multiplicity of understandings of agricultural innovations among different stakeholders. However, novelty/newness, utility and adaptability were identified as the major attributes. In general, farmers characterized agricultural innovations as 'something new and mostly introduced by NGOs' but did not associate them with the key attributes of utility and adaptability. More crop-related innovations were identified despite the area being suitable for livestock production. The paper concludes that, rather than view the multiple and sometimes competing understandings of agricultural innovations as undesirable, this should be used to promote context specific innovations which stand a better chance of enhancing agriculture-based livelihoods.

  18. Use of gas chromatography-olfactometry to identify key odorant compounds in dark chocolate. Comparison of samples before and after conching.

    Science.gov (United States)

    Counet, Christine; Callemien, Delphine; Ouwerx, Caroline; Collin, Sonia

    2002-04-10

    After vacuum distillation and liquid-liquid extraction, the volatile fractions of dark chocolates were analyzed by gas chromatography-olfactometry and gas chromatography-mass spectrometry. Aroma extract dilution analysis revealed the presence of 33 potent odorants in the neutral/basic fraction. Three of these had a strong chocolate flavor: 2-methylpropanal, 2-methylbutanal, and 3-methylbutanal. Many others were characterized by cocoa/praline-flavored/nutty/coffee notes: 2,3-dimethylpyrazine, trimethylpyrazine, tetramethylpyrazine, 3(or 2),5-dimethyl-2(or 3)-ethylpyrazine, 3,5(or 6)-diethyl-2-methylpyrazine, and furfurylpyrrole. Comparisons carried out before and after conching indicate that although no new key odorant is synthesized during the heating process, levels of 2-phenyl-5-methyl-2-hexenal, Furaneol, and branched pyrazines are significantly increased while most Strecker aldehydes are lost by evaporation.

  19. Key sectors of the home automation industry, topical report, January 1993

    International Nuclear Information System (INIS)

    White, K.L.

    1993-01-01

    This is one of a series of topical reports dealing with the strategic, technical, and market development of home automation. Particular emphasis is placed upon identifying those aspects of home automation that will impact the gas industry and gas products. Communication standards, market drivers, key organizations, technical implementation, product opportunities, and market growth projections will all be addressed in this or subsequent reports. These reports will also discuss how the gas industry and gas-fired equipment can use home automation technology to benefit the consumer

  20. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    NARCIS (Netherlands)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M.; Ben, Songtao; Brownson, Kelly M.; Holland, Paulene J.; Birlea, Stanca A.; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M.; Wolkerstorfer, Albert; Wietze van der Veen, J. P.; Bennett, Dorothy C.; Taïeb, Alain; Ezzedine, Khaled; Kemp, E. Helen; Gawkrodger, David J.; Weetman, Anthony P.; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R.; McCormack, Wayne T.; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B.; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A.; Spritz, Richard A.

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in

  1. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  2. Identifying influential factors of business process performance using dependency analysis

    Science.gov (United States)

    Wetzstein, Branimir; Leitner, Philipp; Rosenberg, Florian; Dustdar, Schahram; Leymann, Frank

    2011-02-01

    We present a comprehensive framework for identifying influential factors of business process performance. In particular, our approach combines monitoring of process events and Quality of Service (QoS) measurements with dependency analysis to effectively identify influential factors. The framework uses data mining techniques to construct tree structures to represent dependencies of a key performance indicator (KPI) on process and QoS metrics. These dependency trees allow business analysts to determine how process KPIs depend on lower-level process metrics and QoS characteristics of the IT infrastructure. The structure of the dependencies enables a drill-down analysis of single factors of influence to gain a deeper knowledge why certain KPI targets are not met.

  3. Emergency management in health: key issues and challenges in the UK.

    Science.gov (United States)

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  4. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  5. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  6. IMPROVEMENT OF KEY PROCESSES THROUGH THE ANALYSIS OF VALUE ADDED IN TECHNOLOGY- BASED COMPANIES A SINGLE PROJECT PRODUCTIONS OF THE WATER SECTOR IN CUBA

    Directory of Open Access Journals (Sweden)

    Reina Maylín, Hernández Oro

    2012-01-01

    Full Text Available In this paper, we present the main results of research designed to improve key business processes, using a procedure designed for this purpose, and which includes among its main stages, the analysis of value added by activity, adapting to technology based companies’ productions by one of the water sector project in Cuba. The procedure consistently combines different techniques such as multi-criteria decision analysis for selection of the key processes and analysis of value added by activity to identify key processes to improve and identify opportunities for improvement. The main results are able to identify, classify and relate the processes taking place in the organization, and represent them in a process map, and then determine the key processes for improvement, based on the analysis of value added at each process of each of the activities in it. Derived from the results obtained are proposed and implemented a set of organizational improvements had a positive economic impact for the company under study, allowing a positive conclusion on the feasibility of implementation, flexibility and robustness of the procedure developed in technology-based companies single project productions of the water sector in Cuba to support their business management.

  7. Proteogenomic Analysis Identifies a Novel Human SHANK3 Isoform

    Directory of Open Access Journals (Sweden)

    Fahad Benthani

    2015-05-01

    Full Text Available Mutations of the SHANK3 gene have been associated with autism spectrum disorder. Individuals harboring different SHANK3 mutations display considerable heterogeneity in their cognitive impairment, likely due to the high SHANK3 transcriptional diversity. In this study, we report a novel interaction between the Mutated in colorectal cancer (MCC protein and a newly identified SHANK3 protein isoform in human colon cancer cells and mouse brain tissue. Hence, our proteogenomic analysis identifies a new human long isoform of the key synaptic protein SHANK3 that was not predicted by the human reference genome. Taken together, our findings describe a potential new role for MCC in neurons, a new human SHANK3 long isoform and, importantly, highlight the use of proteomic data towards the re-annotation of GC-rich genomic regions.

  8. Structural characterization of POM6 Fab and mouse prion protein complex identifies key regions for prions conformational conversion.

    Science.gov (United States)

    Baral, Pravas Kumar; Swayampakula, Mridula; Aguzzi, Adriano; James, Michael N G

    2018-05-01

    Conversion of the cellular prion protein PrP C into its pathogenic isoform PrP S c is the hallmark of prion diseases, fatal neurodegenerative diseases affecting many mammalian species including humans. Anti-prion monoclonal antibodies can arrest the progression of prion diseases by stabilizing the cellular form of the prion protein. Here, we present the crystal structure of the POM6 Fab fragment, in complex with the mouse prion protein (moPrP). The prion epitope of POM6 is in close proximity to the epitope recognized by the purportedly toxic antibody fragment, POM1 Fab also complexed with moPrP. The POM6 Fab recognizes a larger binding interface indicating a likely stronger binding compared to POM1. POM6 and POM1 exhibit distinct biological responses. Structural comparisons of the bound mouse prion proteins from the POM6 Fab:moPrP and POM1 Fab:moPrP complexes reveal several key regions of the prion protein that might be involved in initiating mis-folding events. The structural data of moPrP:POM6 Fab complex are available in the PDB under the accession number www.rcsb.org/pdb/search/structidSearch.do?structureId=6AQ7. © 2018 Federation of European Biochemical Societies.

  9. SPARQL-enabled identifier conversion with Identifiers.org.

    Science.gov (United States)

    Wimalaratne, Sarala M; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-06-01

    On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. © The Author 2015. Published by Oxford University Press.

  10. SPARQL-enabled identifier conversion with Identifiers.org

    Science.gov (United States)

    Wimalaratne, Sarala M.; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-01-01

    Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. Availability and implementation: The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. Contact: sarala@ebi.ac.uk PMID:25638809

  11. Food Safety Is a Key Determinant of Fruit and Vegetable Consumption in Urban Beninese Adolescents

    Science.gov (United States)

    Nago, Eunice S.; Verstraeten, Roosmarijn; Lachat, Carl K.; Dossa, Romain A.; Kolsteren, Patrick W.

    2012-01-01

    Objective: To identify the determinants of fruit and vegetable consumption in urban Beninese adolescents and elements to develop a school-based fruit and vegetable program. Design: Sixteen focus groups conducted with a key word guide. Setting and Participants: Two private and 2 public secondary schools in Cotonou, Benin. One hundred fifty-three…

  12. Key Factors Affecting the Price of Airbnb Listings: A Geographically Weighted Approach

    OpenAIRE

    Zhihua Zhang; Rachel J. C. Chen; Lee D. Han; Lu Yang

    2017-01-01

    Airbnb has been increasingly gaining popularity since 2008 due to its low prices and direct interactions with the local community. This paper employed a general linear model (GLM) and a geographically weighted regression (GWR) model to identify the key factors affecting Airbnb listing prices using data sets of 794 samples of Airbnb listings of business units in Metro Nashville, Tennessee. The results showed that the GWR model performs better than the GLM in terms of accuracy and affected vari...

  13. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  14. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    predictability and suggested several key attributes that were necessary to make the concept successful. The goals and objectives of the planned ATD-2 sub-project will incorporate the results of this stakeholder feedback.

  15. Key Biodiversity Areas identification in the Upper Guinea forest biodiversity hotspot

    Directory of Open Access Journals (Sweden)

    O.M.L. Kouame

    2012-08-01

    Full Text Available Priority-setting approaches and tools are commons ways to support the rapid extinction of species and their habitats and the effective allocation of resources for their conservation. The Key Biodiversity Area (KBA approach is a method for the identification of fine-scale priority areas for conservation. This process led bottom-up has been used in the Upper Guinea Forest Ecosystem of West Africa where human-induced changes have increased the extinction risk of several endemic and threatened species. The irreplaceability and vulnerability criteria commonly used in conservation planning have been used to identify key biodiversity areas in Ghana, Cote d’Ivoire, Liberia, Guinea and Sierra Leone. Point locality data were compiled from scientific reports, papers published in scientific journals and museum records. The delineation was conducted following a series of decision rules. In most cases existing IBA polygons and protected areas boundaries were used. For the new sites, temporary boundaries have been drawn and will be confirmed with land-use data. Preliminary KBA data were reviewed by specialists during formal workshops. One hundred and fifty four KBA have been identified in the five countries with 202 globally threatened species. Currently 63% of the KBA are protected. Two AZE sites still exist in the region. This assessment is a first step and is driven from the best available data at the time. There is a need to refine it with recent biodiversity surveys to assist decision-makers in achieving their conservation management goals.

  16. Health systems reforms in Singapore: A qualitative study of key stakeholders.

    Science.gov (United States)

    Ong, Suan Ee; Tyagi, Shilpa; Lim, Jane Mingjie; Chia, Kee Seng; Legido-Quigley, Helena

    2018-02-19

    In response to a growing chronic disease burden and ageing population, Singapore implemented Regional Health Systems (RHS) in 2008. In January 2017, the MOH announced that the six RHS clusters would be reorganised into three in 2018. This qualitative study sought to identify the health system challenges, opportunities, and ways forward for the implementation of the RHS. We conducted semi-structured interviews with 35 key informants from RHS clusters, government, academia, and private and voluntary sectors. Integration, innovation, and people-centeredness were identified as the key principles of the RHS. The RHS was described as an opportunity to holistically care for a person across the care continuum, address social determinants of health, develop new models of care, and work with social and community partners. Challenges to RHS implementation included difficulties aligning the goals, values, and priorities of multiple actors, the need for better integration across clusters, differing care capabilities and capacities across partners, healthcare financing structures that may not reflect RHS goals, scalability and evaluation of pilot programmes, and disease-centricity, provider-centricity, and medicalisation in health and healthcare. Suggested ways forward included building relationships between actors to facilitate integration; exploring innovative new models of care; clear long-term/scale-up plans for successful pilots; healthcare financing reforms to meet changing patient and population needs; and developing evaluation systems reflective of RHS principles and priorities. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Key tumor suppressor genes inactivated by "greater promoter" methylation and somatic mutations in head and neck cancer

    NARCIS (Netherlands)

    Guerrero-Preston, Rafael; Michailidi, Christina; Marchionni, Luigi; Pickering, Curtis R.; Frederick, Mitchell J.; Myers, Jeffrey N.; Yegnasubramanian, Srinivasan; Hadar, Tal; Noordhuis, Maartje G.; Zizkova, Veronika; Fertig, Elana; Agrawal, Nishant; Westra, William; Koch, Wayne; Califano, Joseph; Velculescu, Victor E.; Sidransky, David

    Tumor suppressor genes (TSGs) are commonly inactivated by somatic mutation and/or promoter methylation; yet, recent high-throughput genomic studies have not identified key TSGs inactivated by both mechanisms. We pursued an integrated molecular analysis based on methylation binding domain sequencing

  18. A Visual Analytics Technique for Identifying Heat Spots in Transportation Networks

    Directory of Open Access Journals (Sweden)

    Marian Sorin Nistor

    2016-12-01

    Full Text Available The decision takers of the public transportation system, as part of urban critical infrastructures, need to increase the system resilience. For doing so, we identified analysis tools for biological networks as an adequate basis for visual analytics in that domain. In the paper at hand we therefore translate such methods for transportation systems and show the benefits by applying them on the Munich subway network. Here, visual analytics is used to identify vulnerable stations from different perspectives. The applied technique is presented step by step. Furthermore, the key challenges in applying this technique on transportation systems are identified. Finally, we propose the implementation of the presented features in a management cockpit to integrate the visual analytics mantra for an adequate decision support on transportation systems.

  19. Evaluation of unique identifiers used for citation linking [version 1; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-06-01

    Full Text Available Unique identifiers (UID are seen as an effective tool to create links between identical publications in databases or identify duplicates in a database. The purpose of the present study is to investigate how well UIDs work for citation linking. We have two objectives: Explore the coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match key.   Illustrate how publication sets formed by using UIDs as the match key may affect the bibliometric indicators: Number of publications, number of citations and the average number of citations per publication.   The objectives are addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition.   The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication.   The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis.

  20. Identifying Topics in Microblogs Using Wikipedia.

    Science.gov (United States)

    Yıldırım, Ahmet; Üsküdarlı, Suzan; Özgür, Arzucan

    2016-01-01

    Twitter is an extremely high volume platform for user generated contributions regarding any topic. The wealth of content created at real-time in massive quantities calls for automated approaches to identify the topics of the contributions. Such topics can be utilized in numerous ways, such as public opinion mining, marketing, entertainment, and disaster management. Towards this end, approaches to relate single or partial posts to knowledge base items have been proposed. However, in microblogging systems like Twitter, topics emerge from the culmination of a large number of contributions. Therefore, identifying topics based on collections of posts, where individual posts contribute to some aspect of the greater topic is necessary. Models, such as Latent Dirichlet Allocation (LDA), propose algorithms for relating collections of posts to sets of keywords that represent underlying topics. In these approaches, figuring out what the specific topic(s) the keyword sets represent remains as a separate task. Another issue in topic detection is the scope, which is often limited to specific domain, such as health. This work proposes an approach for identifying domain-independent specific topics related to sets of posts. In this approach, individual posts are processed and then aggregated to identify key tokens, which are then mapped to specific topics. Wikipedia article titles are selected to represent topics, since they are up to date, user-generated, sophisticated articles that span topics of human interest. This paper describes the proposed approach, a prototype implementation, and a case study based on data gathered during the heavily contributed periods corresponding to the four US election debates in 2012. The manually evaluated results (0.96 precision) and other observations from the study are discussed in detail.

  1. Academic Primer Series: Key Papers About Peer Review.

    Science.gov (United States)

    Yarris, Lalena M; Gottlieb, Michael; Scott, Kevin; Sampson, Christopher; Rose, Emily; Chan, Teresa M; Ilgen, Jonathan

    2017-06-01

    Peer review, a cornerstone of academia, promotes rigor and relevance in scientific publishing. As educators are encouraged to adopt a more scholarly approach to medical education, peer review is becoming increasingly important. Junior educators both receive the reviews of their peers, and are also asked to participate as reviewers themselves. As such, it is imperative for junior clinician educators to be well-versed in the art of peer reviewing their colleagues' work. In this article, our goal was to identify and summarize key papers that may be helpful for faculty members interested in learning more about the peer-review process and how to improve their reviewing skills. The online discussions of the 2016-17 Academic Life in Emergency Medicine (ALiEM) Faculty Incubator program included a robust discussion about peer review, which highlighted a number of papers on that topic. We sought to augment this list with further suggestions by guest experts and by an open call on Twitter for other important papers. Via this process, we created a list of 24 total papers on the topic of peer review. After gathering these papers, our authorship group engaged in a consensus-building process incorporating Delphi methods to identify the papers that best described peer review, and also highlighted important tips for new reviewers. We found and reviewed 24 papers. In our results section, we present our authorship group's top five most highly rated papers on the topic of peer review. We also summarize these papers with respect to their relevance to junior faculty members and to faculty developers. We present five key papers on peer review that can be used for faculty development for novice writers and reviewers. These papers represent a mix of foundational and explanatory papers that may provide some basis from which junior faculty members might build upon as they both undergo the peer-review process and act as reviewers in turn.

  2. Meta-Analysis of Placental Transcriptome Data Identifies a Novel Molecular Pathway Related to Preeclampsia

    NARCIS (Netherlands)

    van Uitert, Miranda; Moerland, Perry D.; Enquobahrie, Daniel A.; Laivuori, Hannele; van der Post, Joris A. M.; Ris-Stalpers, Carrie; Afink, Gijs B.

    2015-01-01

    Studies using the placental transcriptome to identify key molecules relevant for preeclampsia are hampered by a relatively small sample size. In addition, they use a variety of bioinformatics and statistical methods, making comparison of findings challenging. To generate a more robust preeclampsia

  3. Grain growth: The key to understand solid-state dewetting of silver thin films

    International Nuclear Information System (INIS)

    Jacquet, P.; Podor, R.; Ravaux, J.; Teisseire, J.; Gozhyk, I.; Jupille, J.; Lazzari, R.

    2016-01-01

    The dynamics of solid-state dewetting of polycrystalline silver thin films in oxygen atmosphere was investigated with in situ and real-time environmental Scanning Electron Microscopy at high temperature combined with Atomic Force Microscopy. Three steps were identified during dewetting: induction, hole propagation without specific rim and sintering. Moreover, it was observed that a very selective grain growth, promoted by surface diffusion, plays a key role all along the process.

  4. GSK126 (EZH2 inhibitor) interferes with ultraviolet A radiation-induced photoaging of human skin fibroblast cells

    Science.gov (United States)

    Qin, Haiyan; Zhang, Guang; Zhang, Lianbo

    2018-01-01

    Polycomb group genes (PcG) encode chromatin modification proteins that are involved in the epigenetic regulation of cell differentiation, proliferation and the aging processes. The key subunit of the PcG complex, enhancer of zeste 2 polycomb repressive complex 2 subunit (EZH2), has a central role in a variety of mechanisms, such as the formation of chromatin structure, gene expression regulation and DNA damage. In the present study, ultraviolet A (UVA) was used to radiate human dermal fibroblasts in order to construct a photo-aged cell model. Subsequently, the cell viability assay, Hoechst staining, apoptosis detection using flow cytometry, senescence-associated β-galactosidase (SA-β-gal) staining and erythrocyte exclusion experiments were performed. GSK126, a histone methylation enzyme inhibitor of EZH2, was used as an experimental factor. Results suggested that GSK126 downregulated the mRNA expression levels of EZH2 and upregulated the mRNA expression levels of BMI-1. Notably, GSK126 affected the transcription of various photoaging-related genes and thus protected against photoaging induced by UVA radiation. PMID:29545866

  5. Proteomic investigations of lysine acetylation identify diverse substrates of mitochondrial deacetylase sirt3

    DEFF Research Database (Denmark)

    Sol, E-ri Maria; Wagner, Sebastian A; Weinert, Brian T

    2012-01-01

    Lysine acetylation is a posttranslational modification that is dynamically regulated by the activity of acetyltransferases and deacetylases. The human and mouse genomes encode 18 different lysine deacetylases (KDACs) which are key regulators of many cellular processes. Identifying substrates...... of KDACs and pinpointing the regulated acetylation sites on target proteins may provide important information about the molecular basis of their functions. Here we apply quantitative proteomics to identify endogenous substrates of the mitochondrial deacetylase Sirtuin 3 (Sirt3) by comparing site...... by modulating acetylation on diverse substrates. The experimental strategy described here is generic and can be applied to identify endogenous substrates of other lysine deacetylases....

  6. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    characterize it. We show that the impact of the secrecy constraint is to reduce the effective number of transmit antennas by the number of antennas at the eavesdropper. Toward this characterization, we provide several schemes achieving the DMT and we highlight disparities between coding for the wiretap channel and coding for secret-key agreement. In the second part of the present work, we consider a fast-fading setting in which the wireless channels change during each channel use. We consider a correlated environment where transmit, legitimate receiver and eavesdropper antennas are correlated. We characterize the optimal strategy achieving the highest secret-key rate. We also identify the impact of correlation matrices and illustrate our analysis with various numerical results. Finally, we study the system from an energy-efficiency point of view and evaluate relevant metrics as the minimum energy required for sharing a secret-key bit and the wideband slope.

  7. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  8. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  9. A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

    Directory of Open Access Journals (Sweden)

    Oliver Hanka

    2011-02-01

    Full Text Available In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems.

  10. [Key vessels assessment and operation highlights in laparoscopic extended right hemicolectomy].

    Science.gov (United States)

    Wang, Hao; Zhao, Quanquan

    2018-03-25

    Laparoscopic radical colectomies have been more widely used gradually, among which laparoscopic extended right hemicolectomy is considered as the most difficult procedure. The difficulty of extended right hemicolectomy lies in the need to dissect lymph nodes along the superior mesenteric vein (SMV) and disconnect numerous and possible aberrant vessels. To address this problem, we emphasize two points in key vessel assessment: getting familiar with the anatomy along the medial-to-lateral approach and having a good understanding about the preoperative imaging presentations. An accurately preoperative imaging assessment by abdominal enhanced CT can help the surgeon understand the relative position of the key vessels to be dealt with during operation and the situation of the possible aberrant vessels so as to guide the procedure more effectively and facilitate the prevention and management of the intraoperative complications. During operation, the operator should pay special attention to the management of the vessels in the ileocolic vessel region, Henle's trunk and middle colon vessels. The operation highlights of the key vessels are as follows: (1) The ileocolic vessels: identifying the Toldt's gap correctly and opening the vascular sheath of the SMV securely; making sure that the duodenum is well protected. (2) Henle's trunk: dissecting along the surface of the Henle's trunk; preserving the anterior superior pancreaticoduodenal vein (ASPDV) and main trunk of the Henle's trunk; disconnecting the roots of the right colic vein (RCV) and right gastroepiploic vein (RGEV), and then dissecting lymph nodes along the surface of the pancreas. (3) The middle colon vessels: identifying the root of the middle colon vessel along the lower edge of the pancreas; avoiding entering behind the pancreas; mobilizing the transverse mesocolon sufficiently along the surface of the pancreas. Finally, we discuss and analyze the disputes currently existing in laparoscopic extended right

  11. OCWM Transportation Institutional Program Update on Collaborative Efforts with Key Stakeholders

    International Nuclear Information System (INIS)

    Saris, E.; Austin, P.; Offner, J.J.

    2004-01-01

    The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) created the Office of National Transportation in 2003 recognizing the need to revitalize and accelerate development of the transportation system. The Department has made a commitment to work through a collaborative planning process before developing specific policies and procedures and making transportation decisions. OCRWM has begun to build the institutional framework to support development of this transportation system. Interactions with stakeholders have been initiated. The authors describe the key stakeholders, identified issues, regional and national planning activities, and mechanisms for interaction

  12. Key Factors Affecting Construction Safety Performance in Developing Countries: Evidence from Cambodia

    Directory of Open Access Journals (Sweden)

    Serdar Durdyev

    2017-12-01

    Full Text Available Although proper safety management in construction is of utmost importance; anecdotal evidence suggests that safety is not adequately considered in many developing countries. This paper considers the key variables affecting construction safety performance in Cambodia. Using an empirical questionnaire survey targeting local construction professionals, respondents were invited to rate the level of importance of 30 variables identified from the seminal literature. The data set was subjected to factor analysis. Correlations between the variables show that five key factors underlie the challenges facing the local industry; management and organisation, resources, site management, cosmetic and workforce. It is found that the forefront construction professionals (top management and government authorities should take more responsibilities for further improvements in safety performance on project sites. Findings and recommendations of this study may be useful to construction professional who are seeking ways to improve safety records in developing countries.

  13. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  14. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  15. Nutrition and healthy ageing: the key ingredients.

    Science.gov (United States)

    Kiefte-de Jong, Jessica C; Mathers, John C; Franco, Oscar H

    2014-05-01

    Healthy longevity is a tangible possibility for many individuals and populations, with nutritional and other lifestyle factors playing a key role in modulating the likelihood of healthy ageing. Nevertheless, studies of effects of nutrients or single foods on ageing often show inconsistent results and ignore the overall framework of dietary habits. Therefore, the use of dietary patterns (e.g. a Mediterranean dietary pattern) and the specific dietary recommendations (e.g. dietary approaches to stop hypertension, Polymeal and the American Healthy Eating Index) are becoming more widespread in promoting lifelong health. A posteriori defined dietary patterns are described frequently in relation to age-related diseases but their generalisability is often a challenge since these are developed specifically for the population under study. Conversely, the dietary guidelines are often developed based on prevention of disease or nutrient deficiency, but often less attention is paid to how well these dietary guidelines promote health outcomes. In the present paper, we provide an overview of the state of the art of dietary patterns and dietary recommendations in relation to life expectancy and the risk of age-related disorders (with emphasis on cardiometabolic diseases and cognitive outcomes). According to both a posteriori and a priori dietary patterns, some key 'ingredients' can be identified that are associated consistently with longevity and better cardiometabolic and cognitive health. These include high intake of fruit, vegetables, fish, (whole) grains and legumes/pulses and potatoes, whereas dietary patterns rich in red meat and sugar-rich foods have been associated with an increased risk of mortality and cardiometabolic outcomes.

  16. Managing Key Risks in Post-Merger IS Integration

    DEFF Research Database (Denmark)

    Alaranta, Mar; Mathiassen, L

    2014-01-01

    Mergers and acquisitions (M&A) require organizations to blend together different information system (IS) configurations. Unfortunately, less than 50 percent of M&A's achieve their goals, with IS integration being a major problem. Here, the authors offer a framework to help managers prepare for......, analyze, and mitigate risks during post-merger IS integration. They identify key risks relating to IS integration content, process, and context, and present five strategies for mitigating those risks. Their framework aims to help managers proactively reduce the impact of adverse events. Adopting...... the framework supported by their templates is straightforward and the time and resources required are minimal. When properly executed, adoption increases the likelihood of successful merger outcomes; the framework is thus a valuable addition to the management tool box and can be applied in collaboration...

  17. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  18. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. Investigation of the key determinants of Asian nurses’ quality of life

    Science.gov (United States)

    MAKABE, Sachiko; KOWITLAWAKUL, Yanika; NURUMAL, Mohd Said; TAKAGAI, Junko; WICHAIKHUM, Orn-Anong; WANGMO, Neyzang; YAP, Suk Foon; KUNAVIKTIKUL, Wipada; KOMATSU, Junko; SHIRAKAWA, Hideko; KIMURA, Yutaka; ASANUMA, Yoshihiro

    2018-01-01

    The study aimed to compare nurses’ quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were “stress coping ability,” “life satisfaction,” “Japan,” “social support,” “job stress,” and “Singapore” (adjusted R2=0.46). In conclusion, nurses’ quality of life differs across Asian countries and is not linked to the country’s economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution’ minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them. PMID:29491251

  20. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  1. Combined Gene Expression and RNAi Screening to Identify Alkylation Damage Survival Pathways from Fly to Human.

    Science.gov (United States)

    Zanotto-Filho, Alfeu; Dashnamoorthy, Ravi; Loranc, Eva; de Souza, Luis H T; Moreira, José C F; Suresh, Uthra; Chen, Yidong; Bishop, Alexander J R

    2016-01-01

    Alkylating agents are a key component of cancer chemotherapy. Several cellular mechanisms are known to be important for its survival, particularly DNA repair and xenobiotic detoxification, yet genomic screens indicate that additional cellular components may be involved. Elucidating these components has value in either identifying key processes that can be modulated to improve chemotherapeutic efficacy or may be altered in some cancers to confer chemoresistance. We therefore set out to reevaluate our prior Drosophila RNAi screening data by comparison to gene expression arrays in order to determine if we could identify any novel processes in alkylation damage survival. We noted a consistent conservation of alkylation survival pathways across platforms and species when the analysis was conducted on a pathway/process level rather than at an individual gene level. Better results were obtained when combining gene lists from two datasets (RNAi screen plus microarray) prior to analysis. In addition to previously identified DNA damage responses (p53 signaling and Nucleotide Excision Repair), DNA-mRNA-protein metabolism (transcription/translation) and proteasome machinery, we also noted a highly conserved cross-species requirement for NRF2, glutathione (GSH)-mediated drug detoxification and Endoplasmic Reticulum stress (ER stress)/Unfolded Protein Responses (UPR) in cells exposed to alkylation. The requirement for GSH, NRF2 and UPR in alkylation survival was validated by metabolomics, protein studies and functional cell assays. From this we conclude that RNAi/gene expression fusion is a valid strategy to rapidly identify key processes that may be extendable to other contexts beyond damage survival.

  2. Combined Gene Expression and RNAi Screening to Identify Alkylation Damage Survival Pathways from Fly to Human.

    Directory of Open Access Journals (Sweden)

    Alfeu Zanotto-Filho

    Full Text Available Alkylating agents are a key component of cancer chemotherapy. Several cellular mechanisms are known to be important for its survival, particularly DNA repair and xenobiotic detoxification, yet genomic screens indicate that additional cellular components may be involved. Elucidating these components has value in either identifying key processes that can be modulated to improve chemotherapeutic efficacy or may be altered in some cancers to confer chemoresistance. We therefore set out to reevaluate our prior Drosophila RNAi screening data by comparison to gene expression arrays in order to determine if we could identify any novel processes in alkylation damage survival. We noted a consistent conservation of alkylation survival pathways across platforms and species when the analysis was conducted on a pathway/process level rather than at an individual gene level. Better results were obtained when combining gene lists from two datasets (RNAi screen plus microarray prior to analysis. In addition to previously identified DNA damage responses (p53 signaling and Nucleotide Excision Repair, DNA-mRNA-protein metabolism (transcription/translation and proteasome machinery, we also noted a highly conserved cross-species requirement for NRF2, glutathione (GSH-mediated drug detoxification and Endoplasmic Reticulum stress (ER stress/Unfolded Protein Responses (UPR in cells exposed to alkylation. The requirement for GSH, NRF2 and UPR in alkylation survival was validated by metabolomics, protein studies and functional cell assays. From this we conclude that RNAi/gene expression fusion is a valid strategy to rapidly identify key processes that may be extendable to other contexts beyond damage survival.

  3. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by

  4. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  5. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  6. Key movement forces in the dairy industry in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Renata Černíková

    2004-01-01

    Full Text Available The paper analyses key movement forces in the dairy industry in the Czech Republic and evaluates their importance in the industry and their influence on the following development of the dairy industry in the Czech Republic.The current most important key movement forces in the dairy industry in the Czech Republic are identified: changes in the long-term industry growth rate and marketing innovations. There is space for growth of the industry – the average consumption of the milk products in the Czech Republic per inhabitant 225,1 kg in 2002 is almost by 17% lower than in 1989 (269 kg per inhabitant and also by 10% lower than the current average consumption in the EU countries (250 kg per inhabitant. There is also space for increase exports from the Czech Republic into the EU countries. The liberalization of the foreign trade with cheeses and curds – “double-zero variation” was positive for the Czech Republic in the first year after the introduction. The share of the import of cheeses and curds on the total export from the EU decreased from 24.6% to 15.5%, and the share of the export of cheeses and curds on the total export from the CR into the EU increased from 10.1% to 19.7%.The key movement forces in the dairy industry in the Czech Republic also are changes in the cost effectiveness; the foreign capital; and key forces resulting from the factors in the macro-environment – the integration of the Czech Republic into the European Union, the government interventions and changes in the government policy.

  7. Identifying continuous quality improvement publications: what makes an improvement intervention ‘CQI’?

    Science.gov (United States)

    Hempel, Susanne; Lim, Yee-Wei; Danz, Marjorie S; Foy, Robbie; Suttorp, Marika J; Shekelle, Paul G; Rubenstein, Lisa V

    2011-01-01

    Background The term continuous quality improvement (CQI) is often used to refer to a method for improving care, but no consensus statement exists on the definition of CQI. Evidence reviews are critical for advancing science, and depend on reliable definitions for article selection. Methods As a preliminary step towards improving CQI evidence reviews, this study aimed to use expert panel methods to identify key CQI definitional features and develop and test a screening instrument for reliably identifying articles with the key features. We used a previously published method to identify 106 articles meeting the general definition of a quality improvement intervention (QII) from 9427 electronically identified articles from PubMed. Two raters then applied a six-item CQI screen to the 106 articles. Results Per cent agreement ranged from 55.7% to 75.5% for the six items, and reviewer-adjusted intra-class correlation ranged from 0.43 to 0.62. ‘Feedback of systematically collected data’ was the most common feature (64%), followed by being at least ‘somewhat’ adapted to local conditions (61%), feedback at meetings involving participant leaders (46%), using an iterative development process (40%), being at least ‘somewhat’ data driven (34%), and using a recognised change method (28%). All six features were present in 14.2% of QII articles. Conclusions We conclude that CQI features can be extracted from QII articles with reasonable reliability, but only a small proportion of QII articles include all features. Further consensus development is needed to support meaningful use of the term CQI for scientific communication. PMID:21727199

  8. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  9. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  10. High-PT Physics with Identified Particles

    Energy Technology Data Exchange (ETDEWEB)

    Fries, R.; Liu, W.

    2009-11-09

    The suppression of high-P{sub T} particles in heavy ion collisions was one of the key discoveries at the Relativistic Heavy Ion Collider. This is usually parameterized by the average rate of momentum-transfer squared to this particle, {cflx q}. Here we argue that measurements of identified particles at high P{sub T} can lead to complementary information about the medium. The leading particle of a jet can change its identity through interactions with the medium. Tracing such flavor conversions could allow us to constrain the mean free path. Here we review the basic concepts of flavor conversions and discuss applications to particle ratios and elliptic flow. We make a prediction that strangeness is enhanced at high P{sub T} at RHIC energies while its elliptic flow is suppressed.

  11. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  12. Kinome-wide shRNA Screen Identifies the Receptor Tyrosine Kinase AXL as a Key Regulator for Mesenchymal Glioblastoma Stem-like Cells

    Directory of Open Access Journals (Sweden)

    Peng Cheng

    2015-05-01

    Full Text Available Glioblastoma is a highly lethal cancer for which novel therapeutics are urgently needed. Two distinct subtypes of glioblastoma stem-like cells (GSCs were recently identified: mesenchymal (MES and proneural (PN. To identify mechanisms to target the more aggressive MES GSCs, we combined transcriptomic expression analysis and kinome-wide short hairpin RNA screening of MES and PN GSCs. In comparison to PN GSCs, we found significant upregulation and phosphorylation of the receptor tyrosine kinase AXL in MES GSCs. Knockdown of AXL significantly decreased MES GSC self-renewal capacity in vitro and inhibited the growth of glioblastoma patient-derived xenografts. Moreover, inhibition of AXL with shRNA or pharmacologic inhibitors also increased cell death significantly more in MES GSCs. Clinically, AXL expression was elevated in the MES GBM subtype and significantly correlated with poor prognosis in multiple cancers. In conclusion, we identified AXL as a potential molecular target for novel approaches to treat glioblastoma and other solid cancers.

  13. A Video Analysis of Intra- and Interprofessional Leadership Behaviors Within "The Burns Suite": Identifying Key Leadership Models.

    Science.gov (United States)

    Sadideen, Hazim; Weldon, Sharon-Marie; Saadeddin, Munir; Loon, Mark; Kneebone, Roger

    2016-01-01

    Leadership is particularly important in complex highly interprofessional health care contexts involving a number of staff, some from the same specialty (intraprofessional), and others from different specialties (interprofessional). The authors recently published the concept of "The Burns Suite" (TBS) as a novel simulation tool to deliver interprofessional and teamwork training. It is unclear which leadership behaviors are the most important in an interprofessional burns resuscitation scenario, and whether they can be modeled on to current leadership theory. The purpose of this study was to perform a comprehensive video analysis of leadership behaviors within TBS. A total of 3 burns resuscitation simulations within TBS were recorded. The video analysis was grounded-theory inspired. Using predefined criteria, actions/interactions deemed as leadership behaviors were identified. Using an inductive iterative process, 8 main leadership behaviors were identified. Cohen's κ coefficient was used to measure inter-rater agreement and calculated as κ = 0.7 (substantial agreement). Each video was watched 4 times, focusing on 1 of the 4 team members per viewing (senior surgeon, senior nurse, trainee surgeon, and trainee nurse). The frequency and types of leadership behavior of each of the 4 team members were recorded. Statistical significance to assess any differences was assessed using analysis of variance, whereby a p Leadership behaviors were triangulated with verbal cues and actions from the videos. All 3 scenarios were successfully completed. The mean scenario length was 22 minutes. A total of 362 leadership behaviors were recorded from the 12 participants. The most evident leadership behaviors of all team members were adhering to guidelines (which effectively equates to following Advanced Trauma and Life Support/Emergency Management of Severe Burns resuscitation guidelines and hence "maintaining standards"), followed by making decisions. Although in terms of total

  14. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    International Nuclear Information System (INIS)

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  15. Exploring the Key Challenges: Adaptability, Sustainability, Interoperability and Security to M-payment

    OpenAIRE

    Rashmi Mantri; Junkang Feng

    2011-01-01

    Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merch...

  16. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  17. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  18. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  19. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  20. Identification of key pathways and genes influencing prognosis in bladder urothelial carcinoma

    Directory of Open Access Journals (Sweden)

    Ning X

    2017-03-01

    Full Text Available Xin Ning, Yaoliang Deng Department of Urology, The First Affiliated Hospital of Guangxi Medical University, Nanning, Guangxi Province, People’s Republic of China Background: Genomic profiling can be used to identify the predictive effect of genomic subsets for determining prognosis in bladder urothelial carcinoma (BUC after radical cystectomy. This study aimed to investigate potential gene and pathway markers associated with prognosis in BUC.Methods: A microarray dataset of BUC was obtained from The Cancer Genome Atlas database. Differentially expressed genes (DEGs were identified by DESeq of the R platform. Kaplan–Meier analysis was applied for prognostic markers. Key pathways and genes were identified using bioinformatics tools, such as gene set enrichment analysis, gene ontology, the Kyoto Encyclopedia of Genes and Genomes, gene multiple association network integration algorithm (GeneMANIA, Search Tool for the Retrieval of Interacting Genes/Proteins, and Molecular Complex Detection.Results: A comparative gene set enrichment analysis of tumor and adjacent normal tissues suggested BUC tumorigenesis resulted mainly from enrichment of cell cycle and DNA damage and repair-related biological processes and pathways, including TP53 and mitotic recombination. Two hundred and fifty-six genes were identified as potential prognosis-related DEGs. Gene ontology and Kyoto Encyclopedia of Genes and Genomes analyses showed that the potential prognosis-related DEGs were enriched in angiogenesis, including the cyclic adenosine monophosphate biosynthetic process, cyclic guanosine monophosphate-protein kinase G, mitogen-activated protein kinase, Rap1, and phosphoinositide-3-kinase-AKT signaling pathway. Nine hub genes, TAGLN, ACTA2, MYH11, CALD1, MYLK, GEM, PRELP, TPM2, and OGN, were identified from the intersection of protein–protein interaction and GeneMANIA networks. Module analysis of protein–protein interaction and GeneMANIA networks mainly showed